From df8d4c7653162eade26e1c547d07279b46d8e6ed Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 11 Jul 2024 18:03:15 +0000 Subject: [PATCH] Auto-Update: 2024-07-11T18:00:19.361133+00:00 --- CVE-2021/CVE-2021-44xx/CVE-2021-4440.json | 6 +- CVE-2023/CVE-2023-344xx/CVE-2023-34435.json | 79 +++- CVE-2023/CVE-2023-412xx/CVE-2023-41251.json | 87 ++++- CVE-2023/CVE-2023-452xx/CVE-2023-45215.json | 69 +++- CVE-2023/CVE-2023-457xx/CVE-2023-45742.json | 80 +++- CVE-2023/CVE-2023-466xx/CVE-2023-46685.json | 54 ++- CVE-2023/CVE-2023-476xx/CVE-2023-47677.json | 78 +++- CVE-2023/CVE-2023-478xx/CVE-2023-47856.json | 70 +++- CVE-2023/CVE-2023-482xx/CVE-2023-48270.json | 69 +++- CVE-2023/CVE-2023-490xx/CVE-2023-49073.json | 69 +++- CVE-2023/CVE-2023-495xx/CVE-2023-49593.json | 54 ++- CVE-2023/CVE-2023-502xx/CVE-2023-50240.json | 70 +++- CVE-2023/CVE-2023-502xx/CVE-2023-50243.json | 70 +++- CVE-2023/CVE-2023-502xx/CVE-2023-50244.json | 70 +++- CVE-2023/CVE-2023-503xx/CVE-2023-50330.json | 91 ++++- CVE-2023/CVE-2023-503xx/CVE-2023-50381.json | 58 ++- CVE-2023/CVE-2023-503xx/CVE-2023-50382.json | 57 ++- CVE-2023/CVE-2023-503xx/CVE-2023-50383.json | 57 ++- CVE-2024/CVE-2024-217xx/CVE-2024-21778.json | 91 ++++- CVE-2024/CVE-2024-235xx/CVE-2024-23562.json | 67 +++- CVE-2024/CVE-2024-315xx/CVE-2024-31504.json | 57 ++- CVE-2024/CVE-2024-327xx/CVE-2024-32753.json | 70 ++++ CVE-2024/CVE-2024-380xx/CVE-2024-38013.json | 118 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38015.json | 70 +++- CVE-2024/CVE-2024-380xx/CVE-2024-38017.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38019.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38020.json | 61 ++- CVE-2024/CVE-2024-380xx/CVE-2024-38021.json | 52 ++- CVE-2024/CVE-2024-380xx/CVE-2024-38022.json | 118 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38023.json | 51 ++- CVE-2024/CVE-2024-380xx/CVE-2024-38024.json | 51 ++- CVE-2024/CVE-2024-380xx/CVE-2024-38025.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38027.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38028.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38030.json | 112 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38031.json | 80 +++- CVE-2024/CVE-2024-380xx/CVE-2024-38032.json | 66 +++- CVE-2024/CVE-2024-380xx/CVE-2024-38033.json | 118 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38034.json | 123 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38041.json | 102 ++++- CVE-2024/CVE-2024-380xx/CVE-2024-38043.json | 102 ++++- CVE-2024/CVE-2024-380xx/CVE-2024-38060.json | 123 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38061.json | 123 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38062.json | 102 ++++- CVE-2024/CVE-2024-380xx/CVE-2024-38064.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38065.json | 113 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38066.json | 116 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38067.json | 80 +++- CVE-2024/CVE-2024-380xx/CVE-2024-38068.json | 128 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38069.json | 108 +++++- CVE-2024/CVE-2024-380xx/CVE-2024-38070.json | 108 +++++- CVE-2024/CVE-2024-392xx/CVE-2024-39202.json | 80 +++- CVE-2024/CVE-2024-393xx/CVE-2024-39317.json | 68 ++++ CVE-2024/CVE-2024-395xx/CVE-2024-39519.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39520.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39521.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39522.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39523.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39524.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39528.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39529.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39530.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39531.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39532.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39533.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39535.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39536.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39537.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39538.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39539.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39540.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39541.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39542.json | 88 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39543.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39545.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39546.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39548.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39549.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39550.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39551.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39552.json | 104 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39553.json | 100 +++++ CVE-2024/CVE-2024-395xx/CVE-2024-39560.json | 4 +- CVE-2024/CVE-2024-399xx/CVE-2024-39904.json | 60 +++ CVE-2024/CVE-2024-399xx/CVE-2024-39905.json | 64 +++ CVE-2024/CVE-2024-64xx/CVE-2024-6484.json | 56 +++ CVE-2024/CVE-2024-64xx/CVE-2024-6485.json | 56 +++ CVE-2024/CVE-2024-66xx/CVE-2024-6680.json | 133 +++++++ CVE-2024/CVE-2024-66xx/CVE-2024-6681.json | 133 +++++++ README.md | 91 +++-- _state.csv | 409 +++++++++++--------- 91 files changed, 8121 insertions(+), 391 deletions(-) create mode 100644 CVE-2024/CVE-2024-327xx/CVE-2024-32753.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39317.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39519.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39520.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39521.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39522.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39523.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39524.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39528.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39529.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39530.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39531.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39532.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39533.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39535.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39536.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39537.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39538.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39539.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39540.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39541.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39542.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39543.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39545.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39546.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39548.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39549.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39550.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39551.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39552.json create mode 100644 CVE-2024/CVE-2024-395xx/CVE-2024-39553.json create mode 100644 CVE-2024/CVE-2024-399xx/CVE-2024-39904.json create mode 100644 CVE-2024/CVE-2024-399xx/CVE-2024-39905.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6484.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6485.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6680.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6681.json diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json index 4ffcf0df696..8b8814013a2 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4440.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4440", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:11.137", - "lastModified": "2024-07-03T01:38:13.980", + "lastModified": "2024-07-11T17:15:09.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://git.kernel.org/stable/c/1424ab4bb386df9cc590c73afa55f13e9b00dea2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://grsecurity.net/cve-2021-4440_linux_cna_case_study", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34435.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34435.json index fde287028b7..8d451752df9 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34435.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34435.json @@ -2,19 +2,23 @@ "id": "CVE-2023-34435", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:02.847", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:03:12.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A firmware update vulnerability exists in the boa formUpload functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network packets can lead to arbitrary firmware update. An attacker can provide a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de actualizaci\u00f3n de firmware en la funcionalidad boa formUpload de Realtek rtl819x Jungle SDK v3.4.11. Unos paquetes de red especialmente manipulados pueden provocar una actualizaci\u00f3n arbitraria del firmware. Un atacante puede proporcionar un archivo malicioso para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -47,10 +71,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1874", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41251.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41251.json index 68d13e86c87..d5a8665d2f4 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41251.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41251.json @@ -2,17 +2,41 @@ "id": "CVE-2023-41251", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:03.203", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:02:49.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa formRoute functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa formRoute de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una solicitud HTTP para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -47,10 +81,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1894", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45215.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45215.json index 358838ee011..4bc455219a3 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45215.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45215.json @@ -2,13 +2,17 @@ "id": "CVE-2023-45215", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:03.423", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:02:41.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa setRepeaterSsid functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa setRepeaterSsid de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes de red especialmente manipuladas pueden provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1891", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45742.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45742.json index a465bf74004..2116aa57415 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45742.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45742.json @@ -2,19 +2,23 @@ "id": "CVE-2023-45742", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:03.643", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:02:30.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow vulnerability exists in the boa updateConfigIntoFlash functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de enteros en la funcionalidad boa updateConfigIntoFlash de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -47,10 +71,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1877", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46685.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46685.json index 8a0d07513d8..0b46b8eec26 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46685.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46685.json @@ -2,13 +2,17 @@ "id": "CVE-2023-46685", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:03.870", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:01:31.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A hard-coded password vulnerability exists in the telnetd functionality of LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. A set of specially crafted network packets can lead to arbitrary command execution." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de contrase\u00f1a codificada en la funcionalidad telnetd de LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. Un conjunto de paquetes de red especialmente manipulados puede provocar la ejecuci\u00f3n de comandos arbitrarios." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1871", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47677.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47677.json index 76ac468aead..be492cb0af8 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47677.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47677.json @@ -2,17 +2,41 @@ "id": "CVE-2023-47677", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:04.120", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:01:17.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (csrf) vulnerability exists in the boa CSRF protection functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network request can lead to CSRF. An attacker can send an HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site request forgery (csrf) en la funcionalidad de protecci\u00f3n boa CSRF de Realtek rtl819x Jungle SDK v3.4.11. Una solicitud de red especialmente manipulada puede generar CSRF. Un atacante puede enviar una solicitud HTTP para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -47,10 +71,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1872", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47856.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47856.json index 253ecf33829..f130c0fdd6f 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47856.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47856.json @@ -2,13 +2,17 @@ "id": "CVE-2023-47856", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:04.337", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:03:27.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa set_RadvdPrefixParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa set_RadvdPrefixParam de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes de red especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1892", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48270.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48270.json index 1a38e3f4044..11b36245743 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48270.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48270.json @@ -2,13 +2,17 @@ "id": "CVE-2023-48270", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:04.573", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:01:06.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa formDnsv6 functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa formDnsv6 de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes de red especialmente manipuladas pueden provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1876", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49073.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49073.json index c598fde8d64..1fc061e1fe2 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49073.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49073.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49073", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:04.803", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:00:30.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa formFilter functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa formFilter de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1875", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49593.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49593.json index 30050b625d1..555d7f34858 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49593.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49593.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49593", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:05.090", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:00:08.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Leftover debug code exists in the boa formSysCmd functionality of LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. A specially crafted network request can lead to arbitrary command execution." + }, + { + "lang": "es", + "value": "Existe c\u00f3digo de depuraci\u00f3n sobrante en la funcionalidad boa formSysCmd de LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. Una solicitud de red especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1873", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50240.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50240.json index 2f2756fdd8a..07c517f7789 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50240.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50240.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50240", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:05.987", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:05:06.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `AdvDefaultPreference` request's parameter." + }, + { + "lang": "es", + "value": "Existen dos vulnerabilidades de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa set_RadvdInterfaceParam de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes de red especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una secuencia de solicitudes para activar estas vulnerabilidades. Este desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria est\u00e1 relacionado con el par\u00e1metro de solicitud `AdvDefaultPreference`." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1893", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50243.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50243.json index 2df2ccea03c..f5cc7ff7e35 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50243.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50243.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50243", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:06.207", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:05:12.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `comment` request's parameter." + }, + { + "lang": "es", + "value": "Existen dos vulnerabilidades de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa formIpQoS de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una serie de solicitudes HTTP para desencadenar estas vulnerabilidades. Este desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria est\u00e1 relacionado con el par\u00e1metro de solicitud \"comment\"." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1895", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50244.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50244.json index 6afe5c2ffda..f1d9cbceaf3 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50244.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50244.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50244", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:06.437", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:05:17.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `entry_name` request's parameter." + }, + { + "lang": "es", + "value": "Existen dos vulnerabilidades de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa formIpQoS de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una serie de solicitudes HTTP para activar estas vulnerabilidades. Este desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria est\u00e1 relacionado con el par\u00e1metro de solicitud `entry_name`." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1895", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50330.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50330.json index 1d41861411a..457402aa548 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50330.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50330.json @@ -2,19 +2,23 @@ "id": "CVE-2023-50330", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:06.657", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:05:39.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa getInfo functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa getInfo de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una serie de solicitudes HTTP para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -32,13 +36,43 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +81,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1903", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50381.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50381.json index ed4ca8199c1..0ce8c808cfe 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50381.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50381.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50381", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:06.873", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:05:51.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `targetAPSsid` request's parameter." + }, + { + "lang": "es", + "value": "Existen tres vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad boa formWsc de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede enviar una serie de solicitudes HTTP para activar estas vulnerabilidades. Esta inyecci\u00f3n de comando est\u00e1 relacionada con el par\u00e1metro de solicitud `targetAPSsid`." } ], "metrics": { @@ -47,10 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50382.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50382.json index 20e64f42ba8..e298666740b 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50382.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50382.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50382", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:07.093", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:05:58.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `peerPin` request's parameter." + }, + { + "lang": "es", + "value": "Existen tres vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad boa formWsc de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede enviar una serie de solicitudes HTTP para activar estas vulnerabilidades. Esta inyecci\u00f3n de comando est\u00e1 relacionada con el par\u00e1metro de solicitud `peerPin`." } ], "metrics": { @@ -47,10 +51,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50383.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50383.json index 736f2baa83b..35dffde4acc 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50383.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50383.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50383", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:07.327", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:06:04.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `localPin` request's parameter." + }, + { + "lang": "es", + "value": "Existen tres vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad boa formWsc de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede enviar una serie de solicitudes HTTP para activar estas vulnerabilidades. Esta inyecci\u00f3n de comando est\u00e1 relacionada con el par\u00e1metro de solicitud \"localPin\"." } ], "metrics": { @@ -47,10 +51,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21778.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21778.json index 84776a9bea7..b482ffebe89 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21778.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21778.json @@ -2,19 +2,23 @@ "id": "CVE-2024-21778", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:07.580", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:06:17.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow vulnerability exists in the configuration file mib_init_value_array functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted .dat file can lead to arbitrary code execution. An attacker can upload a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funcionalidad del archivo de configuraci\u00f3n mib_init_value_array de Realtek rtl819x Jungle SDK v3.4.11. Un archivo .dat especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede cargar un archivo malicioso para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -32,13 +36,43 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +81,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1911", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json index 837540fb09e..37eee35aa4f 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23562", "sourceIdentifier": "psirt@hcl.com", "published": "2024-07-08T16:15:07.797", - "lastModified": "2024-07-10T15:15:10.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T16:08:35.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:domino:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9F7B561B-79F9-45E1-901F-B0976DD7C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:domino:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "09FF8200-5500-420F-93DF-7F7708E76300" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:domino:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B7CA3E60-DC49-4AF6-91D2-507FDE6E0F19" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113822", - "source": "psirt@hcl.com" + "source": "psirt@hcl.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31504.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31504.json index 77db2dbb32f..5aeafbf4b6e 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31504.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31504.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31504", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-08T16:15:08.260", - "lastModified": "2024-07-09T16:22:31.613", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T16:23:42.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,10 +85,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:embedded-solutions:freemodbus:2018-09-12:*:*:*:*:*:*:*", + "matchCriteriaId": "BEA4287A-84E7-4D26-BB8D-3DCC89B6AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/CAPCOMIN/a0361511068dce21a557cf9fa01d0a02", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32753.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32753.json new file mode 100644 index 00000000000..8556cf72c4b --- /dev/null +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32753.json @@ -0,0 +1,70 @@ +{ + "id": "CVE-2024-32753", + "sourceIdentifier": "productsecurity@jci.com", + "published": "2024-07-11T16:15:02.350", + "lastModified": "2024-07-11T16:15:02.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Under certain circumstances the camera may be susceptible to known vulnerabilities associated with the JQuery versions prior to 3.5.0 third-party component" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productsecurity@jci.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ] + }, + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-03", + "source": "productsecurity@jci.com" + }, + { + "url": "https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories", + "source": "productsecurity@jci.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json index 3761dc1733c..2e68c320e8c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38013.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38013", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.060", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:17:38.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows Server Backup Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la copia de seguridad de Microsoft Windows Server" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,108 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json index bb111d49c37..b2795d5181c 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38015.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38015", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.290", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:18:10.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Remote Desktop Gateway (RD Gateway)" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json index fe6e7bf7b5e..ab2fccd30c9 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38017.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38017", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.533", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:20:51.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Microsoft Message Queue Server" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json index a63c8265e68..7945e220b29 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38019.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38019", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:27.750", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:21:19.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de la lihbrer\u00eda Microsoft Windows Performance Data Helper" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json index 9a1fee32d5f..bfbd12c635f 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38020.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38020", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.110", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:49:29.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Outlook Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de Microsoft Outlook" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", + "matchCriteriaId": "C5282C83-86B8-442D-851D-B54E88E8B1F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*", + "matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json index bc78905aa80..ff4344bb7d5 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38021", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.323", - "lastModified": "2024-07-10T22:15:04.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:49:16.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*", + "matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json index ddd9ae8fa8d..fe7734f70a5 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38022", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.537", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:48:59.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Image Acquisition Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Image Acquisition" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,108 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json index ae710c9c0bd..d74b671e080 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38023.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38023", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.760", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:47:34.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft SharePoint Server" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", + "matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38023", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json index 4bab893edfe..87427e8ec8e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38024.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38024", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:28.967", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:46:07.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft SharePoint Server" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", + "matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "B850873B-E635-439C-9720-8BBE59120EE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38024", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json index d9b5186bbbe..9f441c6c4ef 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38025", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.177", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:43:28.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de la librer\u00eda Microsoft Windows Performance Data Helper" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json index b8d36062717..f992113b3f7 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38027.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38027", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.400", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:42:49.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Line Printer Daemon Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio daemon de Windows Line Printer" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json index cc98d4ebe35..9b603bf158b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38028.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38028", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.627", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:42:20.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de la librer\u00eda Microsoft Windows Performance Data Helper" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json index fb9bcb14325..89fc87c078f 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38030.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38030", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:29.893", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:35:21.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Themes Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de Windows Themes" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json index 4038510e980..9999f2adbf4 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38031.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38031", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:30.123", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:32:33.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servidor de Windows Online Certificate Status Protocol (OCSP) " } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json index 7269fa166b0..d9cc71d4cc8 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38032.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38032", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:30.613", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:31:16.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Xbox Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Xbox" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json index 0b6478598a9..6476a2c9777 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38033.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38033", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:31.093", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:27:21.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerShell Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de PowerShell" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,108 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json index 6aeb231e82b..9490b1e575d 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38034.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38034", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:31.423", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:26:19.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Filtering Platform Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Filtering Platform" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json index 320218ad72e..b18676d6f81 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38041.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38041", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:31.807", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:25:14.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del kernel de Windows" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json index fb8a8e442af..3b819b87127 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38043.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38043", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:32.167", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:25:00.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerShell Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de PowerShell" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json index 07ac66bd858..81ef3b6360d 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38060.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38060", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:37.440", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T17:09:20.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Imaging Component Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Windows Imaging Component" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json index d4e7170978e..bb5d2d956d8 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38061.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38061", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:37.770", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T17:08:40.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de activaci\u00f3n remota entre sesiones de DCOM" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json index a6bdf51e3bd..f536f71c065 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38062.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38062", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:38.087", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T17:08:22.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador en modo kernel de Windows" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json index 383f8721c3c..62fe54fee4b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38064.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38064", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:38.427", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T17:07:36.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows TCP/IP Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n TCP/IP de Windows" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json index e4f376ef9a8..8da25aa4290 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38065.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38065", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:38.757", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T17:06:56.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,103 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json index 8c2e2d990c9..20c8e9146a0 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38066.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38066", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.067", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:59:19.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Win32k Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Win32k" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,106 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json index 477ec0f31d5..b5dbb371c80 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38067.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38067", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.367", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:53:35.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servidor de Windows Online Certificate Status Protocol (OCSP)" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json index ebfedb68114..ae5cd527c85 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38068.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38068", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.690", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:53:21.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servidor de Windows Online Certificate Status Protocol (OCSP)" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json index 6b667667415..a6ec082676b 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38069.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38069", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:39.990", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:52:57.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Enroll Engine Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la caracter\u00edstica de seguridad Windows Enroll Engine" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,98 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json index e2b786af61a..401cbadaf28 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38070.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38070", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:40.340", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:50:59.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de caracter\u00edstica de seguridad de Windows LockDown Policy (WLDP)" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,98 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4651", + "matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4651", + "matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3079", + "matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3880", + "matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json index 6af003aafa3..4a8fa2c3acc 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39202.json @@ -2,20 +2,92 @@ "id": "CVE-2024-39202", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-08T16:15:08.490", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T16:13:13.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-823X firmware - 240126 was discovered to contain a remote command execution (RCE) vulnerability via the dhcpd_startip parameter at /goform/set_lan_settings." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el firmware D-Link DIR-823X - 240126 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s del par\u00e1metro dhcpd_startip en /goform/set_lan_settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-823x_ax3000_firmware:240126:*:*:*:*:*:*:*", + "matchCriteriaId": "0E544AB6-2318-4123-BE72-B24D3FD46F61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-823x_ax3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "335234A0-8010-4DE9-A579-90C1E7E07C3C" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39317.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39317.json new file mode 100644 index 00000000000..425e0f07cc8 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39317.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-39317", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T16:15:02.477", + "lastModified": "2024-07-11T16:15:02.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wagtail/wagtail/commit/31b1e8532dfb1b70d8d37d22aff9cbde9109cdf2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/3c941136f79c48446e3858df46e5b668d7f83797", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wagtail/wagtail/commit/b783c096b6d4fd2cfc05f9137a0be288850e99a2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39519.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39519.json new file mode 100644 index 00000000000..5262638b36e --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39519.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39519", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:02.717", + "lastModified": "2024-07-11T16:15:02.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\nOn all ACX 7000 Series platforms running \n\nJunos OS Evolved, and configured with IRBs, if a Customer Edge device (CE) device is dual homed to two Provider Edge devices (PE) a traffic loop will occur when the CE sends multicast packets. This issue can be triggered by IPv4 and IPv6 traffic.\n\n\nThis issue affects Junos OS Evolved:\u00a0\n\nAll versions from 22.2R1-EVO and later versions before 22.4R2-EVO,\n\nThis issue does not affect Junos OS Evolved versions before 22.1R1-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82983", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39520.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39520.json new file mode 100644 index 00000000000..6599e1cf231 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39520.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39520", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:02.963", + "lastModified": "2024-07-11T16:15:02.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An\u00a0Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.\n\nThe Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.\n\nThis issue affects Junos OS Evolved:\n\n * All version before 20.4R3-S6-EVO,\u00a0\n * 21.2-EVO versions before 21.2R3-S4-EVO,\n * 21.4-EVO versions before 21.4R3-S6-EVO,\u00a0\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,\u00a0\n * 22.3-EVO versions before 22.3R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82975", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39521.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39521.json new file mode 100644 index 00000000000..4f87573013e --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39521.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39521", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:03.210", + "lastModified": "2024-07-11T16:15:03.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.\n\nThe Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.\n\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * 21.1-EVO versions 21.1R1-EVO and later before 21.2R3-S8-EVO,\u00a0\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.1-EVO versions before 22.1R3-S6-EVO,\u00a0\n * 22.2-EVO versions before 22.2R3-EVO,\n * 22.3-EVO versions before 22.3R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82975", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39522.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39522.json new file mode 100644 index 00000000000..d971ccfaba3 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39522.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39522", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:03.443", + "lastModified": "2024-07-11T16:15:03.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.\n\nThe Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.\n\n\nThis issue affects Junos OS Evolved:\n\n\n\n * 22.3-EVO versions before 22.3R2-EVO,\n * 22.4-EVO versions before 22.4R1-S1-EVO, 22.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82975", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39523.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39523.json new file mode 100644 index 00000000000..9ef5ae58c41 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39523.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39523", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:03.667", + "lastModified": "2024-07-11T16:15:03.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.\n\nThe Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.\n\nThis issue affects Junos OS Evolved:\u00a0\n\n * All versions before 20.4R3-S7-EVO,\n * 21.2-EVO versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.1-EVO versions before 22.1R3-S6-EVO,\u00a0\n * 22.2-EVO versions before 22.2R3-EVO,\n * 22.3-EVO versions before 22.3R2-EVO,\n * 22.4-EVO versions before 22.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82975", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39524.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39524.json new file mode 100644 index 00000000000..565ee7792cb --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39524.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39524", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:03.890", + "lastModified": "2024-07-11T16:15:03.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.\n\nThe Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.\n\nThis issue affects Junos OS Evolved:\n\nAll versions before 20.4R3-S7-EVO,\n\n21.2-EVO versions before 21.2R3-S8-EVO,\n\n21.4-EVO versions before 21.4R3-S7-EVO,\u00a0\n\n22.2-EVO versions before 22.2R3-EVO,\n\n22.3-EVO versions before 22.3R2-EVO,\n\n22.4-EVO versions before 22.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82975", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39528.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39528.json new file mode 100644 index 00000000000..b9633b2183b --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39528.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39528", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:04.113", + "lastModified": "2024-07-11T16:15:04.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a routing-instance deactivation is triggered, and at the same time a specific SNMP request is received, a segmentation fault occurs which causes rpd to crash and restart.\n\n\n\n\nThis issue affects:\n\n\u00a0 \u00a0Junos OS:\n\n\n\n * All versions before 21.2R3-S8,\u00a0\n * 21.4 versions before 21.4R3-S5,\n * 22.2 versions before 22.2R3-S3,\n * 22.3 versions before 22.3R3-S2,\n * 22.4 versions before 22.4R3,\n * 23.2 versions before 23.2R2.\n\n\n\n\n \u00a0 Junos OS Evolved:\n\n\n\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S5-EVO,\n * 22.2-EVO versions before 22.2R3-S3-EVO,\u00a0\n * 22.3-EVO versions before 22.3R3-S2-EVO,\n * 22.4-EVO versions before 22.4R3-EVO,\n * 23.2-EVO versions before 23.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82987", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39529.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39529.json new file mode 100644 index 00000000000..484cc5f43f0 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39529.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39529", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:04.343", + "lastModified": "2024-07-11T16:15:04.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a\u00a0Denial-of-Service (DoS).\n\n\n\nIf DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes\u00a0a PFE crash and restart, leading to a Denial of Service.\n\nThis issue affects Junos OS: \n * All versions before 21.4R3-S6,\n * 22.2 versions before 22.2R3-S3,\n * 22.3 versions before 22.3R3-S3,\n * 22.4 versions before 22.4R3,\n * 23.2 versions before 23.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-134" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82988", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39530.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39530.json new file mode 100644 index 00000000000..8b3f4f56eaf --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39530.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39530", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T16:15:04.613", + "lastModified": "2024-07-11T16:15:04.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a \n\nDenial-of-Service (DoS).\n\nIf an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.\n\nThis issue affects Junos OS:\n\n\n\n * 21.4 versions from 21.4R3 before 21.4R3-S5,\n * 22.1 versions from 22.1R3 before 22.1R3-S4,\n * 22.2 versions from 22.2R2 before 22.2R3,\n * 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3,\n * 22.4 versions from 22.4R1 before 22.4R2.\n\n\nThis issue does not affect Junos OS versions earlier than 21.4." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82989", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39531.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39531.json new file mode 100644 index 00000000000..48748f47d67 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39531.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39531", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:10.150", + "lastModified": "2024-07-11T17:15:10.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS).\n\nIf a value is configured for DDoS bandwidth or burst parameters for any protocol in\na queue, all protocols which share the same queue will have\ntheir bandwidth or burst value changed to the new value. If, for example, OSPF was configured with a certain bandwidth value, ISIS would also be limited to this value. So inadvertently either the control plane is open for a high level of specific traffic which was supposed to be limited to a lower value, or the limit for a certain protocol is so low that chances to succeed with a volumetric DoS attack are significantly increased.\u00a0\n\n\n\n\nThis issue affects Junos OS Evolved on ACX 7000 Series:\n\n\n\n * All versions before 21.4R3-S7-EVO,\n * 22.1 versions before 22.1R3-S6-EVO,\u00a0\n * 22.2 versions before 22.2R3-S3-EVO,\n * 22.3 versions before 22.3R3-S3-EVO,\u00a0\n * 22.4 versions before 22.4R3-S2-EVO,\n * 23.2 versions before 23.2R2-EVO,\n * 23.4 \n\nversions \n\nbefore 23.4R1-S1-EVO, 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-229" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82991", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json new file mode 100644 index 00000000000..b51e161a3f7 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39532", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:10.403", + "lastModified": "2024-07-11T17:15:10.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An\u00a0Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.\n\nWhen another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 22.1R2-S2,\n * 22.1R3 and later versions,\n * 22.2 versions before 22.2R2-S1, 22.2R3,\n * 22.3 versions before 22.3R1-S2, 22.3R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before before 22.1R3-EVO,\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,\n * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82992", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39533.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39533.json new file mode 100644 index 00000000000..d893124d32e --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39533.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39533", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:10.650", + "lastModified": "2024-07-11T17:15:10.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions\n\nip-source-address\nip-destination-address\narp-type\n\nwhich are not supported for this type of filter, are used in an ethernet switching filter,\u00a0and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect.\n\n\n\n\nThis issue affects Junos OS on QFX5000 Series and EX4600 Series:\n\n * All version before 21.2R3-S7,\u00a0\n * 21.4 versions before 21.4R3-S6,\n * 22.1 versions before 22.1R3-S5,\n * 22.2 versions before 22.2R3-S3,\n * 22.3 versions before 22.3R3-S2,\u00a0\n * 22.4 versions before 22.4R3,\n * 23.2 versions before 23.2R2.\n\n\n\nPlease note that the implemented fix ensures these unsupported match conditions cannot be committed anymore." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-447" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82993", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39535.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39535.json new file mode 100644 index 00000000000..e6fee92ab98 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39535.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39535", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:10.900", + "lastModified": "2024-07-11T17:15:10.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).\n\nWhen a device has a Layer 3 or an IRB interface configured in a VPLS instance and specific traffic is received, the evo-pfemand processes crashes which causes a service outage for the respective FPC until the system is recovered manually.\n\nThis issue only affects Junos OS Evolved 22.4R2-S1 and 22.4R2-S2 releases and is fixed in 22.4R3. No other releases are affected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82995", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39536.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39536.json new file mode 100644 index 00000000000..9ff1c4e3000 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39536.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39536", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:11.190", + "lastModified": "2024-07-11T17:15:11.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\n\nWhen a\u00a0BFD session configured with authentication flaps,\u00a0ppmd memory can leak. Whether the leak happens depends on a\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\n\n\n\nWhether the leak occurs can be monitored with the following CLI command:\n\n> show ppm request-queue\n\n\nFPC \u00a0 \u00a0 Pending-request\nfpc0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\nrequest-total-pending: 2\n\n\nwhere a continuously increasing number of pending requests is indicative of the leak.\u00a0\n\n\n\n\nThis issue affects:\n\nJunos OS:\n\n\n * All versions before 21.2R3-S8,\n * 21.4 versions before 21.4R3-S7,\n * 22.1 versions before 22.1R3-S4,\n * 22.2 versions before 22.2R3-S4,\u00a0\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R2-S2, 22.4R3,\n * 23.1 versions before 23.1R2.\n\n\n\nJunos OS Evolved:\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.2-EVO versions before 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-EVO,\n * 22.4-EVO versions before 22.4R3-EVO,\n * 23.2-EVO versions before 23.2R1-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82996", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39537.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39537.json new file mode 100644 index 00000000000..417d5dafcb0 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39537.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39537", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:11.843", + "lastModified": "2024-07-11T17:15:11.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network-based attacker to cause a limited information disclosure and availability impact to the device.\n\n\n\nDue to a wrong initialization, specific processes which should only be able to communicate internally within the device can be reached over the network via open ports.\n\n\n\n\nThis issue affects\u00a0Junos OS Evolved on ACX 7000 Series:\n\n\n\n * All versions before 21.4R3-S7-EVO,\n * 22.2-EVO \n\nversions \n\nbefore 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-S3-EVO,\n * 22.4-EVO versions before 22.4R3-S2-EVO,\n * 23.2-EVO versions before 23.2R2-EVO,\n * 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82997", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39538.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39538.json new file mode 100644 index 00000000000..423a5801e86 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39538.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39538", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:12.413", + "lastModified": "2024-07-11T17:15:12.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Buffer Copy without Checking Size of Input vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a\u00a0\n\nDenial-of-Service (DoS).When multicast traffic with a specific, valid (S,G) is received, evo-pfemand crashes which leads to an outage of the affected FPC until it is manually recovered.\n\n\nThis issue affects Junos OS Evolved on ACX7000 Series:\n\n\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.2-EVO versions before 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-S3-EVO,\u00a0\n * 22.4-EVO versions before 22.4R3-S2-EVO,\u00a0\n * 23.2-EVO versions before 23.2R2-EVO,\u00a0\n * 23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82998", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json new file mode 100644 index 00000000000..27f98306bee --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39539", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:12.633", + "lastModified": "2024-07-11T17:15:12.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a\u00a0Denial-of-Service (DoS).\n\nIn a subscriber management scenario continuous subscriber logins will trigger a memory leak and eventually lead to an FPC crash and restart.\n\nThis issue affects Junos OS on MX Series:\n\n\n\n * All version before 21.2R3-S6,\n * 21.4 versions before 21.4R3-S6,\n * 22.1 versions before 22.1R3-S5,\n * 22.2 versions before 22.2R3-S3,\u00a0\n * 22.3 versions before 22.3R3-S2,\n * 22.4 versions before 22.4R3,\n * 23.2 versions before 23.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA82999", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json new file mode 100644 index 00000000000..b087d495661 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39540", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:12.883", + "lastModified": "2024-07-11T17:15:12.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.\n\nThis issue affects Junos OS:\n\n21.2 releases from 21.2R3-S5 before 21.2R3-S6.\n\nThis issue does not affect earlier or later releases." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83000", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39541.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39541.json new file mode 100644 index 00000000000..140f45cc2a4 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39541.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39541", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:13.127", + "lastModified": "2024-07-11T17:15:13.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).\n\nWhen conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart.\n\nThis issue affects:\n\nJunos OS:\n\n\n\n * 22.4 versions before 22.4R3-S1,\n * 23.2 versions before 23.2R2,\u00a0\n * 23.4 versions before 23.4R1-S1, 23.4R2,\u00a0\n\n\n\n\nThis issue does not affect Junos OS versions earlier than 22.4R1.\n\nJunos OS Evolved:\n\n\n\n * 22.4-EVO versions before 22.4R3-S2-EVO,\n * 23.2-EVO versions before 23.2R2-EVO,\n * 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO,\n\n\n\n\n\n\nThis issue does not affect Junos OS Evolved versions earlier than \n\nbefore 22.4R1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83001", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39542.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39542.json new file mode 100644 index 00000000000..92e172113c2 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39542.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-39542", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:13.367", + "lastModified": "2024-07-11T17:15:13.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denial-of-Service (DoS).\n\nThis issue can occur in two scenarios:\n\n1. If a device, which is configured with SFLOW and ECMP, receives specific valid transit traffic, which is subject to sampling, the packetio process crashes, which in turn leads to an evo-aftman crash and causes the FPC to stop working until it is restarted. (This scenario is only applicable to PTX but not to ACX or MX.)\n\n2. If a device receives a malformed CFM packet on an interface configured with CFM, the packetio process crashes, which in turn leads to an evo-aftman crash and causes the FPC to stop working until it is restarted.\u00a0Please note that the CVSS score is for the formally more severe issue 1.\n\nThe CVSS score for scenario 2. is: 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\n\n\n\nThis issue affects Junos OS:\n\n\n\n * All versions before\u00a021.2R3-S4,\n * 21.4 versions before 21.4R2,\n * 22.2 versions before 22.2R3-S2;\u00a0\n\n\n\n\nJunos OS Evolved:\n\n\n\n\n * All versions before\u00a021.2R3-S8-EVO,\n * 21.4 versions before 21.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83002", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39543.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39543.json new file mode 100644 index 00000000000..41ba8b7ca7e --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39543.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39543", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:13.583", + "lastModified": "2024-07-11T17:15:13.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Buffer Copy without Checking Size of Input\u00a0vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash,\u00a0creating a Denial of Service (DoS) condition.\u00a0Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects\u00a0\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S8,\u00a0\n * from 21.4 before 21.4R3-S8,\n * from 22.2 before 22.2R3-S4,\u00a0\n * from 22.3 before 22.3R3-S3,\u00a0\n * from 22.4 before 22.4R3-S2,\u00a0\n * from 23.2 before 23.2R2-S1,\u00a0\n * from 23.4 before 23.4R2.\n\n\n\nJunos OS Evolved: * All versions before 21.2R3-S8-EVO,\n * from 21.4 before 21.4R3-S8-EVO,\n * from 22.2 before 22.2R3-S4-EVO,\u00a0\n * from 22.3 before 22.3R3-S3-EVO,\n * from 22.4 before 22.4R3-S2-EVO,\u00a0\n * from 23.2 before 23.2R2-S1-EVO,\n * from 23.4 before 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83004", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39545.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39545.json new file mode 100644 index 00000000000..443b51fcaf2 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39545.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39545", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:13.823", + "lastModified": "2024-07-11T17:15:13.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the the IKE daemon (iked) of Juniper Networks Junos OS on SRX Series, MX Series with SPC3 and NFX350 allows allows an unauthenticated, network-based attacker sending specific mismatching parameters as part of the IPsec negotiation to trigger an iked crash leading to Denial of Service (DoS).\n\nThis issue is applicable to all platforms that run iked.\u00a0This issue affects Junos OS on SRX Series, MX Series with SPC3 and NFX350:\u00a0\n\n\n\n * All versions before 21.2R3-S8,\u00a0\n * from 21.4 before 21.4R3-S7,\u00a0\n * from 22.1 before 22.1R3-S2,\u00a0\n * from 22.2 before 22.2R3-S1,\u00a0\n * from 22.3 before 22.3R2-S1, 22.3R3,\u00a0\n * from 22.4 before 22.4R1-S2, 22.4R2, 22.4R3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83007", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39546.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39546.json new file mode 100644 index 00000000000..4ca39d771f4 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39546.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39546", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:14.163", + "lastModified": "2024-07-11T17:15:14.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.\u00a0\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions prior to 21.2R3-S8-EVO,\u00a0\n * 21.4 versions prior to\u00a0 21.4R3-S6-EVO,\u00a0\n * 22.1 versions prior to 22.1R3-S5-EVO,\u00a0\n * 22.2 versions prior to 22.2R3-S3-EVO,\u00a0\n * 22.3 versions prior to 22.3R3-S3-EVO,\u00a0\n * 22.4 versions prior to 22.4R3-EVO,\u00a0\n * 23.2 versions prior to 23.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83008", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39548.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39548.json new file mode 100644 index 00000000000..14f28778606 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39548.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39548", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:14.730", + "lastModified": "2024-07-11T17:15:14.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted.\n\nThis issue affects both IPv4 and IPv6.\u00a0\n\nChanges in memory usage can be monitored using the following CLI command:\nuser@device> show system memory node | grep evo-aftmann\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S8-EVO,\u00a0\n * 21.3 versions before 21.3R3-S5-EVO,\u00a0\n * 21.4 versions before 21.4R3-S5-EVO,\u00a0\n * 22.1 versions before 22.1R3-S4-EVO,\u00a0\n * 22.2 versions before 22.2R3-S4-EVO,\n * 22.3 versions before 22.3R3-S3-EVO,\n * 22.4 versions before 22.4R2-S2-EVO, 22.4R3-EVO,\u00a0\n * 23.2 versions before 23.2R1-S1-EVO, 23.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83010", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json new file mode 100644 index 00000000000..7a10d030c2e --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39549.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39549", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:15.433", + "lastModified": "2024-07-11T17:15:15.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not properly freed in all circumstances, leading to a Denial of Service (DoS).\n\nConsumed memory can be freed by manually restarting Routing Protocol Daemon (rpd).\n\nMemory utilization could be monitored by:\u00a0\nuser@host> show system memory or show system monitor memory status\n\nThis issue affects:\n\nJunos OS:\u00a0 * All versions before 21.2R3-S8,\u00a0\n * from 21.4 before 21.4R3-S8,\n\n * from 22.2 before 22.2R3-S4,\u00a0\n * from 22.3 before 22.3R3-S3,\u00a0\n * from 22.4 before 22.4R3-S3,\n * from 23.2 before 23.2R2-S1,\u00a0\n * from 23.4 before 23.4R1-S2, 23.4R2,\n * from 24.2 before\u00a024.2R2-EVO.\n\n\nJunos OS Evolved:\n * All versions before 21.2R3-S8-EVO, \n * from 21.4 before 21.4R3-S8-EVO,\n * from 22.2 before 22.2R3-S4-EVO, \n * from 22.3 before 22.3R3-S3-EVO, \n * from 22.4 before 22.4R3-S3-EVO,\n\n * from 23.2 before 23.2R2-S1-EVO, \n * from 23.4 before 23.4R1-S2, 23.4R2,\n * from 24.2 before 24.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83011", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json new file mode 100644 index 00000000000..f0927610b6f --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39550", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:15.900", + "lastModified": "2024-07-11T17:15:15.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process\u00a0of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps)\u00a0to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). \n\nMemory can only be recovered by manually restarting rtlogd process.\u00a0\nThe memory usage can be monitored using the below command.\n\n\u2003\u2003\u2003\u2003user@host> show system processes extensive | match rtlog\u00a0\n\n\n\nThis issue affects Junos OS on MX Series with SPC3 line card:\u00a0\n\n\n\n * from 21.2R3 before 21.2R3-S8,\u00a0\n * from 21.4R2 before 21.4R3-S6,\u00a0\n * from 22.1 before 22.1R3-S5,\u00a0\n * from 22.2 before 22.2R3-S3,\u00a0\n * from 22.3 before 22.3R3-S2,\u00a0\n * from 22.4 before 22.4R3-S1,\u00a0\n * from 23.2 before 23.2R2,\u00a0\n * from 23.4 before 23.4R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83012", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39551.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39551.json new file mode 100644 index 00000000000..915b72e997a --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39551.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39551", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:16.140", + "lastModified": "2024-07-11T17:15:16.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of\u00a0 Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an\u00a0unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS).\u00a0\n\nContinued receipt and processing of these specific packets will sustain the Denial of Service condition.\n\nThe memory usage can be monitored using the below command.\n\n\u2003\u2003user@host> show usp memory segment sha data objcache jsf\u00a0\nThis issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC:\u00a0\n\n * \u200320.4 before 20.4R3-S10,\u00a0\n * \u200321.2 before 21.2R3-S6,\u00a0\n * \u200321.3 before 21.3R3-S5,\u00a0\n * \u200321.4 before 21.4R3-S6,\u00a0\n * \u200322.1 before 22.1R3-S4,\u00a0\n * \u200322.2 before 22.2R3-S2,\u00a0\n * \u200322.3 before 22.3R3-S1,\u00a0\n * \u200322.4 before 22.4R3,\u00a0\n * \u200323.2 before 23.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83013", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39552.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39552.json new file mode 100644 index 00000000000..8df283b2512 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39552.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2024-39552", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:16.370", + "lastModified": "2024-07-11T17:15:16.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS).\n\nWhen a malformed BGP UPDATE packet is received over an established BGP session, RPD crashes and restarts.\n\nContinuous receipt of the malformed BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices.\n\nThis issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session.\n\nThis issue affects:\n \nJuniper Networks Junos OS:\n * All versions earlier than 20.4R3-S9;\n * 21.2 versions earlier than 21.2R3-S7;\n * 21.3 versions earlier than 21.3R3-S5;\n * 21.4 versions earlier than 21.4R3-S6;\n * 22.1 versions earlier than 22.1R3-S4;\n * 22.2 versions earlier than 22.2R3-S3;\n * 22.3 versions earlier than 22.3R3-S2;\n * 22.4 versions earlier than 22.4R3;\n * 23.2 versions earlier than 23.2R2.\n\n\n\nJuniper Networks Junos OS Evolved:\n * All versions earlier than 21.2R3-S7;\n * 21.3-EVO versions earlier than 21.3R3-S5;\n * 21.4-EVO versions earlier than 21.4R3-S8;\n * 22.1-EVO versions earlier than 22.1R3-S4;\n * 22.2-EVO versions earlier than 22.2R3-S3;\n * 22.3-EVO versions earlier than 22.3R3-S2;\n * 22.4-EVO versions earlier than 22.4R3;\n * 23.2-EVO versions earlier than 23.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA75726", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39553.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39553.json new file mode 100644 index 00000000000..375ce540122 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39553.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39553", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-11T17:15:16.620", + "lastModified": "2024-07-11T17:15:16.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Exposure of Resource to Wrong Sphere vulnerability in the sampling service\u00a0of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited availability impacting Denial of Service (DoS) and allows unauthorized network access to the device, potentially impacting system integrity.\n\nThis issue only happens when inline jflow is configured.\n\nThis does not impact any forwarding traffic. The impacted services MSVCS-DB app crashes momentarily and recovers by itself.\u00a0\n\nThis issue affects Juniper Networks Junos OS Evolved:\u00a0\n * 21.4 versions earlier than 21.4R3-S7-EVO;\u00a0\n * 22.2 versions earlier than\u00a022.2R3-S3-EVO;\n * 22.3 versions earlier than 22.3R3-S2-EVO;\n * 22.4 versions earlier than 22.4R3-EVO;\n * 23.2 versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79101", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json index 0e3bbee20c6..ecf08a39df7 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39560", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.140", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T17:15:16.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:\n\nuser@router> show system statistics kernel memory\nMemory \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Size (kB) Percentage When\n\u00a0 Active \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 753092 \u00a0 \u00a0 18.4% Now\n\u00a0 Inactive \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 574300 \u00a0 \u00a0 14.0% Now\n\u00a0 Wired\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 443236 \u00a0 \u00a0 10.8% Now\n\u00a0 Cached\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1911204 \u00a0 \u00a0 46.6% Now\n\u00a0 Buf \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 32768\u00a0 \u00a0 \u00a0 0.8% Now\n\u00a0 Free \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 385072\u00a0 \u00a0 \u00a0 9.4% Now\nKernel Memory\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Now\n\u00a0 Data \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 312908\u00a0 \u00a0 \u00a0 7.6% Now\n\u00a0 Text \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2560\u00a0 \u00a0 \u00a0 0.1% Now\n...\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO." + "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:\n\nuser@router> show system statistics kernel memory\nMemory \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Size (kB) Percentage When\n\u00a0 Active \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 753092 \u00a0 \u00a0 18.4% Now\n\u00a0 Inactive \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 574300 \u00a0 \u00a0 14.0% Now\n\u00a0 Wired\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 443236 \u00a0 \u00a0 10.8% Now\n\u00a0 Cached\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1911204 \u00a0 \u00a0 46.6% Now\n\u00a0 Buf \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 32768\u00a0 \u00a0 \u00a0 0.8% Now\n\u00a0 Free \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 385072\u00a0 \u00a0 \u00a0 9.4% Now\nKernel Memory\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Now\n\u00a0 Data \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 312908\u00a0 \u00a0 \u00a0 7.6% Now\n\u00a0 Text \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2560\u00a0 \u00a0 \u00a0 0.1% Now\n...\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * All versions of 21.2,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39904.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39904.json new file mode 100644 index 00000000000..35258277d9a --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39904.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39904", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T16:15:04.860", + "lastModified": "2024-07-11T16:15:04.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "VNote is a note-taking platform. Prior to 3.18.1, a code execution vulnerability existed in VNote, which allowed an attacker to execute arbitrary programs on the victim's system. A crafted URI can be used in a note to perform this attack using file:/// as a link. For example, file:///C:/WINDOWS/system32/cmd.exe. This allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as file:///C:/WINDOWS/system32/cmd.exe and file:///C:/WINDOWS/system32/calc.exe. This vulnerability can be exploited by creating and sharing specially crafted notes. An attacker could send a crafted note file and perform further attacks. This vulnerability is fixed in 3.18.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vnotex/vnote/commit/3477469b669708ff547037fda9fc2817870428aa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vnotex/vnote/security/advisories/GHSA-vhh5-8wcv-68gj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39905.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39905.json new file mode 100644 index 00000000000..175db1398c4 --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39905.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-39905", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T16:15:05.067", + "lastModified": "2024-07-11T16:15:05.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Red is a fully modular Discord bot. Due to a bug in Red's Core API, 3rd-party cogs using the `@commands.can_manage_channel()` command permission check without additional permission controls may authorize a user to run a command even when that user doesn't have permissions to manage a channel. None of the core commands or core cogs are affected. The maintainers of the project are not aware of any _public_ 3rd-party cog utilizing this API at the time of writing this advisory. The problem was patched and released in version 3.5.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cog-Creators/Red-DiscordBot/commit/0b0b23b9717b40ed4f8715720b199417c8e89750", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cog-Creators/Red-DiscordBot/pull/6398", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-5jq8-q6rj-9gq4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6484.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6484.json new file mode 100644 index 00000000000..7134add52f1 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6484.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6484", + "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "published": "2024-07-11T17:15:17.007", + "lastModified": "2024-07-11T17:15:17.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Bootstrap that exposes users to Cross-Site Scripting (XSS) attacks. The issue is present in the carousel component, where the data-slide and data-slide-to attributes can be exploited through the href attribute of an tag due to inadequate sanitization. This vulnerability could potentially enable attackers to execute arbitrary JavaScript within the victim's browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6484", + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6485.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6485.json new file mode 100644 index 00000000000..1dd33099e37 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6485.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6485", + "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "published": "2024-07-11T17:15:17.240", + "lastModified": "2024-07-11T17:15:17.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6485", + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6680.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6680.json new file mode 100644 index 00000000000..4d256c71faf --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6680.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-6680", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-11T16:15:05.320", + "lastModified": "2024-07-11T16:15:05.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in witmy my-springsecurity-plus up to 2024-07-04. Affected by this vulnerability is an unknown functionality of the file /api/dept/build. The manipulation of the argument params.dataScope leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271153 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/witmy/my-springsecurity-plus/issues/IAAH8A", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.271153", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.271153", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6681.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6681.json new file mode 100644 index 00000000000..0246f3ff194 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6681.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-6681", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-11T17:15:17.467", + "lastModified": "2024-07-11T17:15:17.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in witmy my-springsecurity-plus up to 2024-07-04. Affected by this issue is some unknown functionality of the file /api/dept. The manipulation of the argument params.dataScope leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271154 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/witmy/my-springsecurity-plus/issues/IAAGZY", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.271154", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.271154", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1b029285c26..0b747b6296a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-11T16:00:18.806565+00:00 +2024-07-11T18:00:19.361133+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-11T15:59:57.840000+00:00 +2024-07-11T17:15:17.467000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256682 +256719 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `37` -- [CVE-2024-28872](CVE-2024/CVE-2024-288xx/CVE-2024-28872.json) (`2024-07-11T15:15:11.377`) -- [CVE-2024-37151](CVE-2024/CVE-2024-371xx/CVE-2024-37151.json) (`2024-07-11T15:15:11.847`) -- [CVE-2024-38534](CVE-2024/CVE-2024-385xx/CVE-2024-38534.json) (`2024-07-11T15:15:12.350`) -- [CVE-2024-38535](CVE-2024/CVE-2024-385xx/CVE-2024-38535.json) (`2024-07-11T15:15:12.557`) -- [CVE-2024-38536](CVE-2024/CVE-2024-385xx/CVE-2024-38536.json) (`2024-07-11T15:15:12.760`) -- [CVE-2024-6679](CVE-2024/CVE-2024-66xx/CVE-2024-6679.json) (`2024-07-11T15:15:13.273`) +- [CVE-2024-39532](CVE-2024/CVE-2024-395xx/CVE-2024-39532.json) (`2024-07-11T17:15:10.403`) +- [CVE-2024-39533](CVE-2024/CVE-2024-395xx/CVE-2024-39533.json) (`2024-07-11T17:15:10.650`) +- [CVE-2024-39535](CVE-2024/CVE-2024-395xx/CVE-2024-39535.json) (`2024-07-11T17:15:10.900`) +- [CVE-2024-39536](CVE-2024/CVE-2024-395xx/CVE-2024-39536.json) (`2024-07-11T17:15:11.190`) +- [CVE-2024-39537](CVE-2024/CVE-2024-395xx/CVE-2024-39537.json) (`2024-07-11T17:15:11.843`) +- [CVE-2024-39538](CVE-2024/CVE-2024-395xx/CVE-2024-39538.json) (`2024-07-11T17:15:12.413`) +- [CVE-2024-39539](CVE-2024/CVE-2024-395xx/CVE-2024-39539.json) (`2024-07-11T17:15:12.633`) +- [CVE-2024-39540](CVE-2024/CVE-2024-395xx/CVE-2024-39540.json) (`2024-07-11T17:15:12.883`) +- [CVE-2024-39541](CVE-2024/CVE-2024-395xx/CVE-2024-39541.json) (`2024-07-11T17:15:13.127`) +- [CVE-2024-39542](CVE-2024/CVE-2024-395xx/CVE-2024-39542.json) (`2024-07-11T17:15:13.367`) +- [CVE-2024-39543](CVE-2024/CVE-2024-395xx/CVE-2024-39543.json) (`2024-07-11T17:15:13.583`) +- [CVE-2024-39545](CVE-2024/CVE-2024-395xx/CVE-2024-39545.json) (`2024-07-11T17:15:13.823`) +- [CVE-2024-39546](CVE-2024/CVE-2024-395xx/CVE-2024-39546.json) (`2024-07-11T17:15:14.163`) +- [CVE-2024-39548](CVE-2024/CVE-2024-395xx/CVE-2024-39548.json) (`2024-07-11T17:15:14.730`) +- [CVE-2024-39549](CVE-2024/CVE-2024-395xx/CVE-2024-39549.json) (`2024-07-11T17:15:15.433`) +- [CVE-2024-39550](CVE-2024/CVE-2024-395xx/CVE-2024-39550.json) (`2024-07-11T17:15:15.900`) +- [CVE-2024-39551](CVE-2024/CVE-2024-395xx/CVE-2024-39551.json) (`2024-07-11T17:15:16.140`) +- [CVE-2024-39552](CVE-2024/CVE-2024-395xx/CVE-2024-39552.json) (`2024-07-11T17:15:16.370`) +- [CVE-2024-39553](CVE-2024/CVE-2024-395xx/CVE-2024-39553.json) (`2024-07-11T17:15:16.620`) +- [CVE-2024-39904](CVE-2024/CVE-2024-399xx/CVE-2024-39904.json) (`2024-07-11T16:15:04.860`) +- [CVE-2024-39905](CVE-2024/CVE-2024-399xx/CVE-2024-39905.json) (`2024-07-11T16:15:05.067`) +- [CVE-2024-6484](CVE-2024/CVE-2024-64xx/CVE-2024-6484.json) (`2024-07-11T17:15:17.007`) +- [CVE-2024-6485](CVE-2024/CVE-2024-64xx/CVE-2024-6485.json) (`2024-07-11T17:15:17.240`) +- [CVE-2024-6680](CVE-2024/CVE-2024-66xx/CVE-2024-6680.json) (`2024-07-11T16:15:05.320`) +- [CVE-2024-6681](CVE-2024/CVE-2024-66xx/CVE-2024-6681.json) (`2024-07-11T17:15:17.467`) ### CVEs modified in the last Commit -Recently modified CVEs: `128` +Recently modified CVEs: `52` -- [CVE-2024-40333](CVE-2024/CVE-2024-403xx/CVE-2024-40333.json) (`2024-07-11T15:06:21.320`) -- [CVE-2024-40336](CVE-2024/CVE-2024-403xx/CVE-2024-40336.json) (`2024-07-11T15:06:22.143`) -- [CVE-2024-40726](CVE-2024/CVE-2024-407xx/CVE-2024-40726.json) (`2024-07-11T15:06:22.967`) -- [CVE-2024-40727](CVE-2024/CVE-2024-407xx/CVE-2024-40727.json) (`2024-07-11T15:06:23.850`) -- [CVE-2024-40730](CVE-2024/CVE-2024-407xx/CVE-2024-40730.json) (`2024-07-11T15:06:24.660`) -- [CVE-2024-40731](CVE-2024/CVE-2024-407xx/CVE-2024-40731.json) (`2024-07-11T15:06:25.460`) -- [CVE-2024-40734](CVE-2024/CVE-2024-407xx/CVE-2024-40734.json) (`2024-07-11T15:06:26.257`) -- [CVE-2024-40735](CVE-2024/CVE-2024-407xx/CVE-2024-40735.json) (`2024-07-11T15:06:27.070`) -- [CVE-2024-40736](CVE-2024/CVE-2024-407xx/CVE-2024-40736.json) (`2024-07-11T15:06:27.890`) -- [CVE-2024-40739](CVE-2024/CVE-2024-407xx/CVE-2024-40739.json) (`2024-07-11T15:06:28.767`) -- [CVE-2024-40742](CVE-2024/CVE-2024-407xx/CVE-2024-40742.json) (`2024-07-11T15:06:29.580`) -- [CVE-2024-5488](CVE-2024/CVE-2024-54xx/CVE-2024-5488.json) (`2024-07-11T15:06:31.120`) -- [CVE-2024-5681](CVE-2024/CVE-2024-56xx/CVE-2024-5681.json) (`2024-07-11T15:06:31.987`) -- [CVE-2024-5711](CVE-2024/CVE-2024-57xx/CVE-2024-5711.json) (`2024-07-11T14:54:55.473`) -- [CVE-2024-6026](CVE-2024/CVE-2024-60xx/CVE-2024-6026.json) (`2024-07-11T15:06:33.000`) -- [CVE-2024-6138](CVE-2024/CVE-2024-61xx/CVE-2024-6138.json) (`2024-07-11T15:06:33.753`) -- [CVE-2024-6229](CVE-2024/CVE-2024-62xx/CVE-2024-6229.json) (`2024-07-11T15:03:15.233`) -- [CVE-2024-6235](CVE-2024/CVE-2024-62xx/CVE-2024-6235.json) (`2024-07-11T15:06:34.163`) -- [CVE-2024-6286](CVE-2024/CVE-2024-62xx/CVE-2024-6286.json) (`2024-07-11T15:06:34.997`) -- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-11T14:15:13.510`) -- [CVE-2024-6539](CVE-2024/CVE-2024-65xx/CVE-2024-6539.json) (`2024-07-11T14:56:20.733`) -- [CVE-2024-6602](CVE-2024/CVE-2024-66xx/CVE-2024-6602.json) (`2024-07-11T15:06:37.333`) -- [CVE-2024-6606](CVE-2024/CVE-2024-66xx/CVE-2024-6606.json) (`2024-07-11T15:06:37.647`) -- [CVE-2024-6611](CVE-2024/CVE-2024-66xx/CVE-2024-6611.json) (`2024-07-11T15:06:37.977`) -- [CVE-2024-6612](CVE-2024/CVE-2024-66xx/CVE-2024-6612.json) (`2024-07-11T15:06:38.870`) +- [CVE-2024-38022](CVE-2024/CVE-2024-380xx/CVE-2024-38022.json) (`2024-07-11T16:48:59.647`) +- [CVE-2024-38023](CVE-2024/CVE-2024-380xx/CVE-2024-38023.json) (`2024-07-11T16:47:34.203`) +- [CVE-2024-38024](CVE-2024/CVE-2024-380xx/CVE-2024-38024.json) (`2024-07-11T16:46:07.437`) +- [CVE-2024-38025](CVE-2024/CVE-2024-380xx/CVE-2024-38025.json) (`2024-07-11T16:43:28.747`) +- [CVE-2024-38027](CVE-2024/CVE-2024-380xx/CVE-2024-38027.json) (`2024-07-11T16:42:49.083`) +- [CVE-2024-38028](CVE-2024/CVE-2024-380xx/CVE-2024-38028.json) (`2024-07-11T16:42:20.313`) +- [CVE-2024-38030](CVE-2024/CVE-2024-380xx/CVE-2024-38030.json) (`2024-07-11T16:35:21.450`) +- [CVE-2024-38031](CVE-2024/CVE-2024-380xx/CVE-2024-38031.json) (`2024-07-11T16:32:33.517`) +- [CVE-2024-38032](CVE-2024/CVE-2024-380xx/CVE-2024-38032.json) (`2024-07-11T16:31:16.480`) +- [CVE-2024-38033](CVE-2024/CVE-2024-380xx/CVE-2024-38033.json) (`2024-07-11T16:27:21.303`) +- [CVE-2024-38034](CVE-2024/CVE-2024-380xx/CVE-2024-38034.json) (`2024-07-11T16:26:19.257`) +- [CVE-2024-38041](CVE-2024/CVE-2024-380xx/CVE-2024-38041.json) (`2024-07-11T16:25:14.153`) +- [CVE-2024-38043](CVE-2024/CVE-2024-380xx/CVE-2024-38043.json) (`2024-07-11T16:25:00.517`) +- [CVE-2024-38060](CVE-2024/CVE-2024-380xx/CVE-2024-38060.json) (`2024-07-11T17:09:20.017`) +- [CVE-2024-38061](CVE-2024/CVE-2024-380xx/CVE-2024-38061.json) (`2024-07-11T17:08:40.157`) +- [CVE-2024-38062](CVE-2024/CVE-2024-380xx/CVE-2024-38062.json) (`2024-07-11T17:08:22.053`) +- [CVE-2024-38064](CVE-2024/CVE-2024-380xx/CVE-2024-38064.json) (`2024-07-11T17:07:36.783`) +- [CVE-2024-38065](CVE-2024/CVE-2024-380xx/CVE-2024-38065.json) (`2024-07-11T17:06:56.247`) +- [CVE-2024-38066](CVE-2024/CVE-2024-380xx/CVE-2024-38066.json) (`2024-07-11T16:59:19.463`) +- [CVE-2024-38067](CVE-2024/CVE-2024-380xx/CVE-2024-38067.json) (`2024-07-11T16:53:35.477`) +- [CVE-2024-38068](CVE-2024/CVE-2024-380xx/CVE-2024-38068.json) (`2024-07-11T16:53:21.910`) +- [CVE-2024-38069](CVE-2024/CVE-2024-380xx/CVE-2024-38069.json) (`2024-07-11T16:52:57.883`) +- [CVE-2024-38070](CVE-2024/CVE-2024-380xx/CVE-2024-38070.json) (`2024-07-11T16:50:59.957`) +- [CVE-2024-39202](CVE-2024/CVE-2024-392xx/CVE-2024-39202.json) (`2024-07-11T16:13:13.487`) +- [CVE-2024-39560](CVE-2024/CVE-2024-395xx/CVE-2024-39560.json) (`2024-07-11T17:15:16.867`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 53c7f95e4c2..edcf42b564b 100644 --- a/_state.csv +++ b/_state.csv @@ -156057,7 +156057,7 @@ CVE-2020-27349,0,0,ef3b2d3e612e690132545938179929f176a6ba136a61ce8e2ba5a0f22d8d5 CVE-2020-2735,0,0,5ed2dcc843c2aa0f70c01b3b04a7d2d4a91ff944b2732397fc6241efa2aaecff,2020-04-16T13:46:11.010000 CVE-2020-27350,0,0,af17d465acd51bc162bfc23e932ea96c98e49e911a17cd3c85b21ce58f1c65ff,2022-10-29T02:41:36.810000 CVE-2020-27351,0,0,23ce876d0cc9cd7447f4adbd408d27289c1b3011c303be7d699e76c691aa1761,2020-12-14T19:56:18.940000 -CVE-2020-27352,0,1,4a70666608c218604060a87760bcd82635c9b6aa8ee6362064961aef35a9390d,2024-07-11T15:05:04.077000 +CVE-2020-27352,0,0,4a70666608c218604060a87760bcd82635c9b6aa8ee6362064961aef35a9390d,2024-07-11T15:05:04.077000 CVE-2020-27353,0,0,dc1a7f42a9a4f966e49a5b6386fd9687eba1eac037e40cb29822574f6ad4b163,2024-06-04T23:15:09.320000 CVE-2020-27354,0,0,45dbf196c098dca554d5a1355d73bf4a1e889b5e4842af65035d79e289fb9b14,2024-06-05T00:15:09.547000 CVE-2020-27355,0,0,a2f55d973e1e8b65f87c5f3fb63316f566dec73ca1e0dd417dfb723f7fe99ad0,2024-06-05T00:15:09.617000 @@ -185129,7 +185129,7 @@ CVE-2021-44396,0,0,7c0ba48df549e25e005295bbe627041950189a573d8758add2ca397b502be CVE-2021-44397,0,0,aeede1d53bd2f94396aba7592014a0f445309317bb79c0c7fdefa09f8e68a5cc,2022-10-25T17:40:14.183000 CVE-2021-44398,0,0,555e554f6904e149f92b31d145cec3fd8d8d4f433c4c7cb018d9ef385828e3b5,2022-10-25T17:40:21.837000 CVE-2021-44399,0,0,8351d48ef470fa1034a9534b3958230b5279d3245a336ecc1fca4eba670b40e9,2022-10-25T17:40:29.917000 -CVE-2021-4440,0,0,1cc601a0d6d7cce892d500d0c755a441444f3fafdfb5d5d8299bb852442c5c49,2024-07-03T01:38:13.980000 +CVE-2021-4440,0,1,f3c428f1d1042b3e149d0f61a377258b50b7fc90de1dc431eb65c9248e534f12,2024-07-11T17:15:09.830000 CVE-2021-44400,0,0,4bf726c514ec568544515b2748f948e99c81db36c2c66f97b411537a96b3cae0,2022-10-25T17:40:36.487000 CVE-2021-44401,0,0,68d7d93d9e3f406a7ab164303254465fd18dc424fd00d011aee0e99433fcfe2c,2022-10-25T17:40:42.937000 CVE-2021-44402,0,0,145a71ca0f99e2e160a739601e598a913b8350298bfa2d402e99094a1715380d,2022-10-25T17:40:50.610000 @@ -215077,7 +215077,7 @@ CVE-2023-2111,0,0,d12d5f611db0242bd01d273fc25ed4662a5b74f898d00cba13175efbdabffa CVE-2023-21110,0,0,448ddc060967179af5f5445c64778306c0c9a48146f8ea2fee78ebb2928a75ff,2023-05-24T00:17:35.097000 CVE-2023-21111,0,0,d60f776dfb5277938c8722afaebc3eb264ed711fa330444195ba603c0daaff4f,2023-05-24T00:17:46.907000 CVE-2023-21112,0,0,ee13324abf0bee556eff0ebb74c1e3be9486125c43aac96832142a9bcc1f3d24,2023-05-24T00:17:58.943000 -CVE-2023-21113,0,1,5c37ad87c9b9d0755705ea4fe1325214a1e2dc34c7f084bb3023bc3e357f4208,2024-07-11T15:05:05.923000 +CVE-2023-21113,0,0,5c37ad87c9b9d0755705ea4fe1325214a1e2dc34c7f084bb3023bc3e357f4208,2024-07-11T15:05:05.923000 CVE-2023-21114,0,0,3e2df9d97c140daf83c88d8dfcfaa1f66ada4aa6ce27284c95d2768b9e9d76dc,2024-07-11T13:06:13.187000 CVE-2023-21115,0,0,5f0194f44da9d9dffdb3c52699125e67e44517f46e47e4143ed7d72707ea546d,2023-06-22T20:53:57.617000 CVE-2023-21116,0,0,5bb72a77f614dd0419d663f693bea7386f42d3fd276c840566406d377360d6b2,2023-05-24T00:19:34.900000 @@ -220225,7 +220225,7 @@ CVE-2023-2743,0,0,07b5a1c1e632fc4cdb18a39b75e7c4456f8da5a73c1bdd9433c488aa795a0d CVE-2023-27430,0,0,65eb7158f195bcc2c82ad775125f60030b17d50e1516069cabe1611b0e9f9a02,2023-05-25T16:24:02.267000 CVE-2023-27431,0,0,055078c928111b4649a91146745522f0449cba599662a5605c45451998d1cc4d,2023-11-17T20:05:40.023000 CVE-2023-27432,0,0,8adffe7598efe8015c93cb88d4fa8bef03c06a1fd1676f56c2e5184e44d8011c,2023-06-28T14:31:07.147000 -CVE-2023-27433,0,1,951dbac110451bc5a3ee59ef47264d2914ff05bdd9acb055089bc57d6f25bcbb,2024-07-11T15:15:10.777000 +CVE-2023-27433,0,0,951dbac110451bc5a3ee59ef47264d2914ff05bdd9acb055089bc57d6f25bcbb,2024-07-11T15:15:10.777000 CVE-2023-27434,0,0,462c3c599d83cf9ae5823c6d5e1762e1796f02e0e807cdaa10107961c3a09993,2023-11-17T00:59:13.110000 CVE-2023-27435,0,0,9ee0b26a24164b052dac2fde1a8fceeb40edf049c8cd3b0e7bc5bb12f980dd61,2023-10-05T00:59:40.313000 CVE-2023-27436,0,0,f31d3fc11015ca4a7adce5a26895bf22e2c6d4b93493f8cf48744663acdba6ff,2023-11-15T19:09:41.087000 @@ -223968,7 +223968,7 @@ CVE-2023-32290,0,0,9c4bb9817d78cee1b4574799ae72138f302978bce52c75e2a5c9735dd6937 CVE-2023-32291,0,0,b13582f6df765cf66559182b3cdbd9631340010ec8805f1c99c883fb7685c7b7,2023-12-05T19:18:51.637000 CVE-2023-32292,0,0,5f53c5c7d966a0756c5fa881e0bb188a78cf08738ea5ab4c0cc95dd712222b6e,2023-08-10T03:49:42.763000 CVE-2023-32294,0,0,52188b6bff693079d9ac6f474f38cd8885c0cb6e0c4880457891953576a8f607,2023-09-01T12:06:38.193000 -CVE-2023-32295,0,1,e50c5ab2206bf00b4f1d11ead479c3811757b66e885bebabf6823b11a1f495da,2024-07-11T15:15:10.923000 +CVE-2023-32295,0,0,e50c5ab2206bf00b4f1d11ead479c3811757b66e885bebabf6823b11a1f495da,2024-07-11T15:15:10.923000 CVE-2023-32296,0,0,f03a8ea514506a3657b7ae5de5b3e2a51319bb9a0207095e8feafa10f654e241,2023-09-06T22:33:10.717000 CVE-2023-32297,0,0,6f90250aa340a8e57a797df0e623c259d7306f972ae3fcdd367550a5afb2a55d,2024-05-17T18:36:05.263000 CVE-2023-32298,0,0,ec209ee8ba235a06176757af041551cbc9f28aa90a1f2823c42aac846023b685,2023-11-15T16:17:11.723000 @@ -225787,7 +225787,7 @@ CVE-2023-34431,0,0,6f0393c595d41b17a7d5a7ab727e99a064d4037d7cff7bfe50def7fa8bcfb CVE-2023-34432,0,0,cc36a3c5199b8dc2428fba5c745ba30bde8d7c3a0f3934fb125262a1a53a6c66,2023-11-07T04:15:36.383000 CVE-2023-34433,0,0,35bff557c91a645e1595ccddfae58d91798fc9b7f31c10266856ebb20b39b2c0,2023-07-14T17:58:46.747000 CVE-2023-34434,0,0,4ade5f23c9591ef154ea5bd77572e07040adf9b9529c866cbb600c9fb987cf1a,2023-08-02T03:53:15.197000 -CVE-2023-34435,0,0,6dada05e95e56d5afd0f9c191edbe144449872e6590815baf758274ccc6b71ea,2024-07-08T16:35:46.377000 +CVE-2023-34435,0,1,f43f94979d6a0bb735948615341d7b3792e7ed3ef9b2de17836a3976de95bd0a,2024-07-11T16:03:12.003000 CVE-2023-34436,0,0,bd51acca188896d8c8b370abe84e99c73a2a9a8ca6d2761103e2cb059df3c4af,2024-04-09T21:15:08.297000 CVE-2023-34437,0,0,c34be4fe03127ce025f0036fbdc3fffcbfe3629b273992d21566f7c4cf8a3a67,2023-10-25T14:04:18.780000 CVE-2023-34438,0,0,44b5ba2c53fa79c17e5665aa1383875852e045bd178347f257df66d1927e96e4,2023-11-07T04:15:36.593000 @@ -230850,7 +230850,7 @@ CVE-2023-41248,0,0,cba49f9e7f55635bbe6a462b1deff30351ea39c1e34266bd25e07c4a337c3 CVE-2023-41249,0,0,c5cbcf9c15b2d33deeea6e05e11b85868fdabe3516dcc8049518c64b4b973cc6,2023-08-28T13:35:45.623000 CVE-2023-4125,0,0,dc0dac37ec1a69144218a6d72f85cb1ad0180ea4fd175013c27e4fdd008b16a5,2023-08-08T16:36:43.700000 CVE-2023-41250,0,0,ca6e7f2c0bce9d02f8b42deb441b45400e1158109638e21c0390d8d848032369,2023-08-28T13:35:55.523000 -CVE-2023-41251,0,0,09e3c45331475efaf31fdfc618f549a8d14ab8b8c797e361afc9f94f2cbcce55,2024-07-08T16:35:46.377000 +CVE-2023-41251,0,1,ee35336ee10e9fa71b84802e50c67bca7e9cd2c54eb899ff8514480ab3016dac,2024-07-11T16:02:49.597000 CVE-2023-41252,0,0,70b3405d41b9be36e10ebb851cc0ff289279a8cbb3c66c80775b5a431e5b88a6,2024-02-14T15:01:46.050000 CVE-2023-41253,0,0,5c2bd90c3a0e32aa9109897ffd360ea91faf0b6a82e9241aa20ca3eb8fb1a7f6,2023-10-17T13:41:05.010000 CVE-2023-41254,0,0,5969c1ade2ac81f41b3460139ee77bd62f738ee094051f9b4f4bf9a216ffc848,2023-11-02T15:20:39.743000 @@ -231315,7 +231315,7 @@ CVE-2023-41910,0,0,ddadb74f9e50737d21120f0b88022d8c15ee68cc56eb3c4577229fb7986d3 CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3be67,2023-10-02T19:02:19.277000 CVE-2023-41913,0,0,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000 CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000 -CVE-2023-41915,0,1,eb4af7dc255b20820c2223dbb394a71a5ac4fe4f18ba74d3375c99078da8c66c,2024-07-11T14:15:12.997000 +CVE-2023-41915,0,0,eb4af7dc255b20820c2223dbb394a71a5ac4fe4f18ba74d3375c99078da8c66c,2024-07-11T14:15:12.997000 CVE-2023-41917,0,0,f3161e8d6c620e45be8c901747b972f5e1c375ee92e6d63bc7e00bef339a5387,2024-07-02T12:09:16.907000 CVE-2023-41918,0,0,0856e5fa41285db5b029ff0214e8d51ede0087304c24a711546183f0175c9d9e,2024-07-02T12:09:16.907000 CVE-2023-41919,0,0,6807d33f550dbbb2d90b8f4fce9a8f7ee1053b0fb9f312837bd90277e545973a,2024-07-02T12:09:16.907000 @@ -233234,7 +233234,7 @@ CVE-2023-44847,0,0,cba49a1b873fc30915efb8b7d052a6a483d978ab292b88a5e114d71f695d5 CVE-2023-44848,0,0,ef0da9d1fa134d505d1ced9ba257af557396c56666a8441aefa38c3f9ad924a0,2023-10-14T02:16:39.717000 CVE-2023-4485,0,0,f8ddff49f1e88d9dc86aeb03ea04462ca070eb6b7438f7849aaa70421f6eaac9,2023-11-07T04:22:39.683000 CVE-2023-44852,0,0,d87cc9879129c666974e65587e1ef13aaf22606e4d0f460d3eb6bbe915f83140,2024-04-12T12:43:46.210000 -CVE-2023-44853,0,1,063d78de1e79f39a8a7ba8b021087b2fe317ac5c06b40bbf2260beeeda1a9bd3,2024-07-11T15:05:11.010000 +CVE-2023-44853,0,0,063d78de1e79f39a8a7ba8b021087b2fe317ac5c06b40bbf2260beeeda1a9bd3,2024-07-11T15:05:11.010000 CVE-2023-44854,0,0,022cfa266bd41555241c52fee709741d2a44ad3cf7d945d89a15ad185ec4847c,2024-04-12T12:43:46.210000 CVE-2023-44855,0,0,25f61c2b7922b96b8465d95bc00ce7701b948783d451a1e6fcafb1cfa3862d16,2024-04-12T12:43:46.210000 CVE-2023-44856,0,0,e55c1477812be3a3227ba8ae233cc5dc3f767f5e974aca63fee6ab5d3f5eb07f,2024-04-12T12:43:46.210000 @@ -233461,7 +233461,7 @@ CVE-2023-45209,0,0,d13548e8ddbbdaac5d3f52671e86030a122df1b714f3b254bf7e83ee6e6f3 CVE-2023-4521,0,0,b688f7ebb4a8ae05081b90dfc2d3e5aa63110c07fe8f0a8aec7d54e7490212fe,2023-11-07T04:22:41.103000 CVE-2023-45210,0,0,015445c8d46db4b328a64a863b4689dd675056770aa7f333e4d9c645a082f231,2023-12-11T17:28:08.023000 CVE-2023-45213,0,0,a2b3d1477a2dfd29fc40134a810140d4b9b048c230f577d5a486c601eff0ad0c,2024-02-12T16:44:57.010000 -CVE-2023-45215,0,0,188c5a41b84c65695734a9c0c0ab6f663b6282bb94a35aa760208468a740e622,2024-07-08T16:35:46.377000 +CVE-2023-45215,0,1,4da1a67a44ac0cc0f37889eaa1552cfeb2b5db2b1917ec902eb1e3e4497f451a,2024-07-11T16:02:41.077000 CVE-2023-45217,0,0,b242cd4a28367d0d17ee46fefcd9fd963383a0b11fdff04c8576d650db6a0d85,2024-07-03T01:41:49.660000 CVE-2023-45219,0,0,270bb0600a3f55378c55b5ea38799f305c6eb8bb95c5b79f810dab4de3af729a,2023-10-18T01:32:45.897000 CVE-2023-4522,0,0,21c51931efbb0b6a933132cf5b91fe4ef9967ce64c453416b56e884701256728,2024-03-13T02:15:50.700000 @@ -233734,7 +233734,7 @@ CVE-2023-45647,0,0,2f23ecc0cd5c4bff54e92afced818834abe3bc7324454a0567d468ca5ef8a CVE-2023-45648,0,0,2ce1650a5ad84a003327145dd1e95acaad922f0b8931f62a9005cd79e6adc7fa,2023-11-04T06:15:52.537000 CVE-2023-4565,0,0,f507437a4bf315d5d5f78ae5f152f50807cf0a9438aecd5a51435557389ffe5c,2023-09-29T19:48:19.453000 CVE-2023-45650,0,0,d29bc0a4bb51fcd21278115b410401d195852a6805bc43c1e9fc1ed8a33e6675,2023-10-18T20:53:00.570000 -CVE-2023-45651,0,1,0bfa8e75355b1784b49583fe7c6c3e05b6a12bcc39fde25860f8221a151186c2,2024-07-11T15:15:11.087000 +CVE-2023-45651,0,0,0bfa8e75355b1784b49583fe7c6c3e05b6a12bcc39fde25860f8221a151186c2,2024-07-11T15:15:11.087000 CVE-2023-45652,0,0,6a80c262c9b1000a8feeec1c2abf75fa0ec61ee524feb894b7274cde77a28e45,2024-05-17T18:36:05.263000 CVE-2023-45653,0,0,02e6b84094cc8a18954e8c903f97d13dcc4d334b9119f705dc862314e650f8c6,2023-10-19T17:37:04.863000 CVE-2023-45654,0,0,14e88a4b5268c9d4c04bc136c1aabbb60d4c48be7be5d19bf745091c19b77153,2023-10-19T17:30:30.677000 @@ -233807,7 +233807,7 @@ CVE-2023-45738,0,0,24d6f1a1b3a417d393487482b5186553768760456e4e32f3d7c19f15de0dc CVE-2023-4574,0,0,f29a4eb73db5907ed927f8f06ef47b8eeb3ac1bf7bb4b9c563343ad57f3152b8,2023-09-13T11:15:10.507000 CVE-2023-45740,0,0,7ecb7e5c4293a21f5c68407b97a494cb5881eeca0dbd8238f9894e2681fe7d1f,2024-01-04T17:11:01.707000 CVE-2023-45741,0,0,a9cac9199d5bb6d5af6ce376185a92d883536cb15172f25d4b84b122a5d53a34,2024-01-04T02:34:14.733000 -CVE-2023-45742,0,0,6dac74bcb85c833d6b0f3303612ebbc005c2af61c5cc09db0f67b2ab5e97cadf,2024-07-08T16:35:46.377000 +CVE-2023-45742,0,1,35452ecfeae9584d009014eba0ac410083f89f21227ec55f8af7eb076af13c09,2024-07-11T16:02:30.337000 CVE-2023-45743,0,0,fec80bb9487df5a7980d8aa4ae881534237d0dfac1ea744b997b8d62a4976b45,2024-05-17T18:36:05.263000 CVE-2023-45744,0,0,3039c349958f8a9957c564299ecb2617e92bb14d6e4b5d5e0a70f65121a871a9,2024-04-17T17:15:12.760000 CVE-2023-45745,0,0,8e4283256a0908955963e030a8050e220a49ff67be764dd7f34f30da7ac587b7,2024-06-21T19:15:29.473000 @@ -233960,7 +233960,7 @@ CVE-2023-45912,0,0,e7b70d01df1e6b7ed29be6cef3a5d24a0188fc4204e45db25f76f5dd91970 CVE-2023-45913,0,0,c40f74c949ae9bbaacc006842b23c4c8c294fca4f9f7192a77c5c9b000ec2e25,2024-05-17T02:29:56.590000 CVE-2023-45916,0,0,b4de35a31730ce89637c5d93cae2af2c0f6956624ee8cf845871fb361731df75,2024-01-29T09:15:42.327000 CVE-2023-45918,0,0,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000 -CVE-2023-45919,0,1,361cd7e9ce845b4e9456ae752dbd705f9bb9fd91d71c77fb14877567e5b19231,2024-07-11T15:05:12.067000 +CVE-2023-45919,0,0,361cd7e9ce845b4e9456ae752dbd705f9bb9fd91d71c77fb14877567e5b19231,2024-07-11T15:05:12.067000 CVE-2023-4592,0,0,81f9ec9c7754df484556128f55402d2b2e5da813e76693d6a2e51c67954d6e8c,2023-11-13T18:46:52.950000 CVE-2023-45920,0,0,65d7d2ce0a0262772d3ab5884e97ff83a6493f02729ce45348dc60f1281d548d,2024-05-17T02:29:56.793000 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 @@ -234523,7 +234523,7 @@ CVE-2023-4668,0,0,ee513b85b52c8799d1b66b481c5457414c556270197c3100e05412b338fd6d CVE-2023-46680,0,0,ff3a4d5354a21120d013adbdccbf9f2fc1c594d2723db5f25c6f5a662e26517e,2024-01-02T19:15:11.197000 CVE-2023-46681,0,0,38b9cf3d21f741cd563f6d0d44f1495eaddee583e9a420f1b831278e5d7e4b1d,2024-01-04T02:47:32.570000 CVE-2023-46683,0,0,a352b3622bfa5b727ee4c9e9990b11035967820b7c86353f993767f535c023ce,2024-02-09T02:10:55.253000 -CVE-2023-46685,0,0,97200a29f189658e99fe1ba5bbeeea9fadb3e51965ca97390d907518e7df6826,2024-07-08T16:35:46.377000 +CVE-2023-46685,0,1,de23af69b205a42e56612efee2194c0d92ef2f8510f34beec5a9854f57cf1ceb,2024-07-11T16:01:31.077000 CVE-2023-46686,0,0,6c8587417c6ad35ad5bc9862ffda506549d70ed1e418d96a72befc37ac461ead,2023-12-28T20:08:24.817000 CVE-2023-46687,0,0,4c381fd89a6853349c558c4fb82eeb2b29cd61546ff6e41f902fa36aada3203d,2024-02-15T07:22:46.397000 CVE-2023-46688,0,0,c8cf9dcc97d717964d18601b17175507c314a960f04fee0869b41c8545ba2b52,2023-12-11T17:27:33.120000 @@ -235228,7 +235228,7 @@ CVE-2023-47672,0,0,fe373617440d9a165f45306f73bd3af1017e4c09f55b8e5854e32ea643087 CVE-2023-47673,0,0,97e8bfa3ac10c2246cef6a5031c56b0303fd0cfb3720ff012a9707e2cea87411,2024-02-06T14:15:55.047000 CVE-2023-47674,0,0,eff3cb202c68310b2428576f99bc8606e52e60dd39a497438300d3052e8e1a2c,2023-12-05T19:11:17.703000 CVE-2023-47675,0,0,b5d30eba1ecc4a944b40987d9ab273e9dbd8543d3842a7a31559cdd3ffabaf24,2023-11-22T00:05:28.373000 -CVE-2023-47677,0,0,736a2b41df175b392a473871a794ad48139536301dee66491d0d6d33c598cbfc,2024-07-08T16:35:46.377000 +CVE-2023-47677,0,1,0d47d24a0783fa97e3136ebd993535ab6463f78fdc896415168e62bcf64f882b,2024-07-11T16:01:17.057000 CVE-2023-47678,0,0,1657ec5af66a76b14903f17461c73011e9a72a0e017b8f5746008072f0cbf9c4,2024-07-03T01:42:14.340000 CVE-2023-47679,0,0,6a7281ce75d88db73ee4644105ec6a35308c3adb3e0a17e43a1be4e968fc5b2b,2024-05-17T18:36:05.263000 CVE-2023-4768,0,0,4a45b9a26a63dda75c659ff661d20422bc870280687842f9433a1cb52a94b57e,2023-11-13T18:28:18.260000 @@ -235365,7 +235365,7 @@ CVE-2023-47852,0,0,58591e2175dc1d01194c39d2793a2e9c0c1b66aef41bf14e870b7ea675f39 CVE-2023-47853,0,0,21adcc4e1ccc55a171bd6cfd64cde11094fd5b2a4db4fbd5512c7a00d30a77d7,2023-12-06T02:42:39.890000 CVE-2023-47854,0,0,c02f1eb37f163c506fe64247a2a06addf49c0022447d4a3af79c944fc6f227c6,2023-12-05T18:56:15.067000 CVE-2023-47855,0,0,4b4b659f709a15de11d44ba4a0e6ec2ef33f4ffe58eef6ca770938f8e7ede193,2024-06-21T19:15:29.727000 -CVE-2023-47856,0,0,c627ddf832bafc1abcc96423b10a94bfd355dd6845aad8af1a9316a3a88a4649,2024-07-08T16:35:46.377000 +CVE-2023-47856,0,1,8f623adf0798c6700cf3aa765706a42f00a8840d09f8a772d017fee2d27e213f,2024-07-11T16:03:27.903000 CVE-2023-47857,0,0,e7dfc6a31a27a38a727d766c7f394645abcf5f935754b42b0ca4db0eabc8b382,2024-01-05T22:05:02.297000 CVE-2023-47858,0,0,8605ba0919336d4f060b97e2baa6a2e93f3b650b9ba751d560b3dbcb6e03b676,2024-01-08T19:03:08.097000 CVE-2023-47859,0,0,34ecce44ebe69ab66d7527ecbd5270651b1494b7ce14c4366e184bf10b336e2a,2024-05-17T18:36:05.263000 @@ -235491,7 +235491,7 @@ CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000 CVE-2023-48192,0,0,1285879b16abdcafa4a056b0a2ae5a60d7ab03d27d3ea5f474efd527a8dd754e,2023-11-29T18:00:50.257000 CVE-2023-48193,0,0,8f22f6af3b763f3aba623fad3c683ebc180c071d282e0bec208eec47a39f0489,2024-06-11T12:15:13.230000 -CVE-2023-48194,0,1,365d374bde68242877916b88e49a16d441b185aac65f163a5771b94cc11b811a,2024-07-11T15:05:13.020000 +CVE-2023-48194,0,0,365d374bde68242877916b88e49a16d441b185aac65f163a5771b94cc11b811a,2024-07-11T15:05:13.020000 CVE-2023-48197,0,0,31a398840f5127471e0f8ae2cf500de34989ec8d6ef4a8f37794761f9d27492f,2024-01-24T22:15:14.793000 CVE-2023-48198,0,0,6b14067601810d1ec0f8423179bbed0cc917124b62a5a8159de8ad1221e064ad,2023-11-28T21:15:08.420000 CVE-2023-48199,0,0,f91afcad18bf76cb6985296ef753eff7492fd44ba7cdd52526fa9c10ee40f6b8,2023-11-28T21:15:08.477000 @@ -235561,7 +235561,7 @@ CVE-2023-48265,0,0,b17021609fe4e77772f01fb0192ebb95b1219206f6043e8cd864d7b0ca321 CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d577085088643877b,2024-01-16T20:31:40.710000 CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000 CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000 -CVE-2023-48270,0,0,1fd018fcd296bf7ee1658982c0e0cc24a289761b69799761a76a2ec4f80a3df3,2024-07-08T16:35:46.377000 +CVE-2023-48270,0,1,d226681432b35202f10bb98074d90d0c86fcf0a7b0331789ec0142cea44a5261,2024-07-11T16:01:06.603000 CVE-2023-48271,0,0,29b89ce15ecff722fb5dce9e2958196e4fdba463d344d0ec924d39e2e3f70c2b,2024-06-04T16:57:41.053000 CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000 CVE-2023-48273,0,0,da9994326c920f8a484b3cf1fec61afacbbcc26d1ab9fa95ae2a4d0a1bf4ca30,2024-06-13T18:36:45.417000 @@ -236228,7 +236228,7 @@ CVE-2023-49062,0,0,068484681abaf43841eb99ab0ed862f133e5253b284cc541c1c2972f2bfd5 CVE-2023-49068,0,0,c80c101a6567d5e001bf80bd192cc6c02bc83242cdfebc387037548c73e960a9,2023-12-01T13:53:23.050000 CVE-2023-4907,0,0,8641e26d9489913936718e7eae574611ae3f349b3bc3ae094cd558ba78dcb7a0,2024-01-31T17:15:17.750000 CVE-2023-49070,0,0,0534adf05a11629b68e19c072b5987401c90067fb46308aa630dac9a694c5940,2023-12-29T18:15:39.103000 -CVE-2023-49073,0,0,e5bc497808a94b47070855e9d7f204885178a435e5fecc563f64be7f1b6732b8,2024-07-08T16:35:46.377000 +CVE-2023-49073,0,1,2a69c4407ae45adf60baf11d8aa993141dc3f78b1f8dc71c70987fff6214c4d6,2024-07-11T16:00:30.427000 CVE-2023-49074,0,0,fa99f8d6845ad22e47d22276e5eb8d3e0cc96f3ce21692e5fdf010d5bb56dd92,2024-04-10T13:24:22.187000 CVE-2023-49075,0,0,913e46bb74318ee75a4ddd2acb7f1e5126a9f9e9c3cb15478c7bbdbe3f992f86,2023-12-04T17:53:15.497000 CVE-2023-49076,0,0,08cf9b7057cb4805ab4e567bd39b0c423aa49a71072cd8f82a0f9b8b94966479,2023-12-05T18:14:20.597000 @@ -236601,9 +236601,9 @@ CVE-2023-49588,0,0,7ec79610e583046e04ba22f3bd390b46adfe58917f2f7527a68c9132400e4 CVE-2023-49589,0,0,e8a52df4478ba900a7c92aec77411294163a10ed5c56222bc5600434b667a1a4,2024-01-17T15:16:26.823000 CVE-2023-4959,0,0,04db776c6e31210f290cf97982ae47bf29a6d42dd4d4d0f864bc08235a612800,2023-11-07T04:23:13.267000 CVE-2023-49590,0,0,ddfdc43cd5584b08ea9e208c1444e6b35b5f2b81e80559573e79c58207eede29,2024-02-14T18:15:46.350000 -CVE-2023-49593,0,0,aa321d9e624b8608ab5a453435f6f3a4a1d6a9e2f9f1c15d4e6348f907202b5f,2024-07-08T16:35:46.377000 +CVE-2023-49593,0,1,4244b31670886bae00262057e7ea5fce31f089fb95c593de55a853881c047fff,2024-07-11T16:00:08.623000 CVE-2023-49594,0,0,964827d2c50b016923e83500e345b8daef35686b1d4d840606c086c6b703ab4a,2024-01-17T21:15:11.147000 -CVE-2023-49595,0,1,c6917dcc72f60ca3a333757882a5eff6b2e1ca248259929e1469e25039b78fae,2024-07-11T15:59:57.840000 +CVE-2023-49595,0,0,c6917dcc72f60ca3a333757882a5eff6b2e1ca248259929e1469e25039b78fae,2024-07-11T15:59:57.840000 CVE-2023-49598,0,0,f21311a5870d33c6d00267bfb1edabf32c3f3d36935aaf458c13cbd552a1dbd2,2024-01-02T19:53:48.547000 CVE-2023-49599,0,0,26bc9ca331158350ffd55dbb3e19c0f5df4aa8eba07f3e59287b262d3f247262,2024-01-17T15:14:39.320000 CVE-2023-4960,0,0,ead2f6df7dc3ef62ad43e7bf5719f8fc950bb797ad00a312f90d4c48e90fdf03,2024-01-17T21:53:01.497000 @@ -236802,7 +236802,7 @@ CVE-2023-49860,0,0,373519125ffb9c375bd014db34920580177bc9208316faad877ca23c0b31f CVE-2023-49862,0,0,b48c0031bf43a748157b60072996a94dfd5c2f37946ee88a1fb9c56e12c9b291,2024-01-18T19:29:20.003000 CVE-2023-49863,0,0,02932461837ce456e599d5347619281544005ffbba312276b5b236b220eeddfa,2024-01-18T19:29:12.637000 CVE-2023-49864,0,0,caabff878c529f0de9ad070f34f3da9e4e25da81db8eed5ca57b2e85ad84de42,2024-01-16T21:11:59.307000 -CVE-2023-49867,0,1,f313b9d1adf8384b8d25cb4b4edfb5da10a8f43d17c6572cc713a9b0d68f0052,2024-07-11T15:59:27.847000 +CVE-2023-49867,0,0,f313b9d1adf8384b8d25cb4b4edfb5da10a8f43d17c6572cc713a9b0d68f0052,2024-07-11T15:59:27.847000 CVE-2023-4987,0,0,6c85a8c092ecab1ac4cb37aecee0b86761640468ebdbeb60edc4f55c433fd0c3,2024-05-17T02:31:55.033000 CVE-2023-49870,0,0,74783182470b5eb8192c29f0ef755b48ea457cf10c7cbda36d22882767980c7b,2024-02-14T18:15:46.540000 CVE-2023-49872,0,0,c064128b855406dab2d7e88bf3052013420271344e257d0e801d0aaf4ff967d6,2024-02-14T18:15:46.573000 @@ -237032,12 +237032,12 @@ CVE-2023-50233,0,0,b78609742e0f2f28c0d20a9f01a3025a3d74afcc84015bd692a7bd902e47c CVE-2023-50234,0,0,34879917d77735cb709dd5cf4e2dc1a880a8e42fb2c03ed7e54ab6aee874b96d,2024-05-03T12:48:41.067000 CVE-2023-50235,0,0,2898a8d8b9820b4b30273b2a7b7a493d28a5c0203f1186de63a56bcb89255a23,2024-05-03T12:48:41.067000 CVE-2023-50236,0,0,edc68c5e15a12b128eacbb1e47de53200421bba3b688b99fca6704aa07a019ca,2024-05-15T08:15:08.960000 -CVE-2023-50239,0,1,540930db115af7f87134e906befaa7ec7527e7dd0d86de2cbe4d18bccc8927c7,2024-07-11T15:59:15.867000 +CVE-2023-50239,0,0,540930db115af7f87134e906befaa7ec7527e7dd0d86de2cbe4d18bccc8927c7,2024-07-11T15:59:15.867000 CVE-2023-5024,0,0,e51cd3c3b038e9c6a8d52d79cbdffe449e2e9109436211521e3c1c359b69ccd9,2024-05-17T02:32:47.150000 -CVE-2023-50240,0,0,5d8f0f0b4bdaf1f03ad84a263a7c136f76bfc9780a7beb62d7bab75579dd1694,2024-07-08T16:35:46.377000 +CVE-2023-50240,0,1,a391a9fb3e84952aa075f2a4fc0c9a3c3b63348e45bd3bdfe64f102893df5eb1,2024-07-11T16:05:06.447000 CVE-2023-50241,0,0,cb6ea0c539af061e121d50db536df839f4f28a81636f344882c80f8398fe2f49,2024-02-14T18:15:46.677000 -CVE-2023-50243,0,0,df58f2136a3241defbf8020bb58d6e6f8c9ce83ca58ae9decc59c86eb22e1b1e,2024-07-08T16:35:46.377000 -CVE-2023-50244,0,0,42aeecea34c4872aafd5f35a08201fa37baf0650e39c72fc4bdb7aaf998afc23,2024-07-08T16:35:46.377000 +CVE-2023-50243,0,1,492fda9669b7b727e84028f310df2cc70007600a3f47d5afadda3cc6417b13e7,2024-07-11T16:05:12.113000 +CVE-2023-50244,0,1,024e074f21eab0bcedc22ff13ff173a9e503e3f7510850d7e8a2bc8fa5eaf549,2024-07-11T16:05:17.420000 CVE-2023-50245,0,0,ae70f9a22f5f2e0c6bc03868f1726d51ceccb05493f8fa8af6bb1280d29aa953,2023-12-14T17:57:33.607000 CVE-2023-50246,0,0,6000fd137d949c92d8802ddfea2ccff2a3aa916c26ff269e2b166368fa4cfdbf,2023-12-19T01:30:29.763000 CVE-2023-50247,0,0,a486057be94db2ccb78e7f0b7a91195c1b39097df436b70cbfedbacb70a44243,2023-12-19T18:56:13.660000 @@ -237096,7 +237096,7 @@ CVE-2023-50327,0,0,4ac712dffcd1f1c4b53977407e24f03df8a1a98bc1590bcf5dcf9ee731acb CVE-2023-50328,0,0,c91130ba3f9ddc2ebdf3492575beb2c1b37638d3ccc25fedc166b56de832b25e,2024-02-02T15:14:08.183000 CVE-2023-50329,0,0,c3996b85e767403dee6ef3ec638f8a7c14f70f560ff4071208b157c3aa6944c1,2024-02-14T18:15:46.740000 CVE-2023-5033,0,0,a8137856b7c17fe570dbfa27fa7a49fbb2f52f430847cb66103605b0ca38cc28,2024-05-17T02:32:48.123000 -CVE-2023-50330,0,0,e1fd9bca7bd9f1269dbee0dc76a30673031ca8531ef5d695bff82a61efb1cc4a,2024-07-08T16:35:46.377000 +CVE-2023-50330,0,1,b525d93b3c4d91a91a04dd18825d8a0596c14c17634318b2192e0d123bd49879,2024-07-11T16:05:39.800000 CVE-2023-50332,0,0,2661acaf1530e8fdd7633a72e0a0d51c6d395a42811cebf46c566521c6efb1cf,2024-01-05T17:28:31 CVE-2023-50333,0,0,3bc8916e8ffdc178d718e7ca15b11143a656670c1b8d1b43b7731a9a9fe0f555,2024-01-08T19:04:13.117000 CVE-2023-50335,0,0,cae5f07833a7a9df9ac72eb54c497826ae153eb2a9c91e65327b11d4a43d0b8f,2024-02-14T18:15:46.773000 @@ -237138,9 +237138,9 @@ CVE-2023-50378,0,0,0f4c193757a21745622df68ec0aa88b8a213c4603a70a54e94c4c05a8dadb CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000 CVE-2023-5038,0,0,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000 CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000 -CVE-2023-50381,0,0,60fa07c832dc911bebd73444c2313684b0b37fee788535d44ff6b21a313b599c,2024-07-08T16:35:46.377000 -CVE-2023-50382,0,0,bea5d214f186ec9da80e3335b8e6a2263ec7c53e66f405dd5e8d6588a701a5e8,2024-07-08T16:35:46.377000 -CVE-2023-50383,0,0,cca495a78abe63c897c4571d8c5476451154d8808db798131dfc345a991c3442,2024-07-08T16:35:46.377000 +CVE-2023-50381,0,1,a85aaa98646b0006ab51d07fd233414f056db82cf29de2f9b34f887af3d1b67d,2024-07-11T16:05:51.633000 +CVE-2023-50382,0,1,00deef0ccde3314a26d015bc90f67d2ffe812561270c86e8bc8ce93879d7442d,2024-07-11T16:05:58.387000 +CVE-2023-50383,0,1,5a53ad4a82c7976ed3ec37c44b4601247d0f067f21e75c7326637792c806d4c2,2024-07-11T16:06:04.837000 CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000 CVE-2023-50387,0,0,86a696af4d06d31d7c5b6089ba1f856732aed20b18c54efa9645210962ecc2d6,2024-06-10T17:16:15.963000 CVE-2023-50395,0,0,1428a30e7f791887f351d6276b38dd6e66ef73f4c78586f3c8084af9d6bd298b,2024-02-13T20:35:06.703000 @@ -237315,8 +237315,8 @@ CVE-2023-5080,0,0,6a142fa9fe4d669768c0073981351de1258996b6b98c92dd7c3370c182d505 CVE-2023-50803,0,0,e0245185683406393930132a94b475da6a0b1d1d07df0fd68bc97ce9d56e1e90,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,75c8b32f1c902851b302714bc7a121b33ef1436156799cadcb21e4914ed2667f,2024-06-27T16:42:15.310000 CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 -CVE-2023-50806,0,1,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000 -CVE-2023-50807,0,1,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 +CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000 +CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6db7e,2024-02-13T18:23:02.393000 CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000 CVE-2023-50811,0,0,e4d21463d439be20b918caa6cf8d80372ece22f0ede7a7aef6305c4c982019a5,2024-04-29T19:52:21.503000 @@ -240028,7 +240028,7 @@ CVE-2023-6489,0,0,8be5137422e44d9e775f7530defb6286a84af9abdf8da8a38a11072ad60f9c CVE-2023-6491,0,0,cdf7c06784d4d39eba71b6fb1604eda595538e62c28add78cc43a71a5a4b75fd,2024-06-07T14:56:05.647000 CVE-2023-6492,0,0,202ca7b5bc9878cc8ce748874f3e7b02ae4737632c455777af5a1838eccbc49d,2024-06-17T12:43:31.090000 CVE-2023-6493,0,0,f1b44774d19dee2dde0db6057c1c8da6a9052c466b0c843005cf7e84e74e5bad,2024-01-10T15:10:40.807000 -CVE-2023-6494,0,1,80dcbf3f6d7d049ebe223948e82130bdff4600f7af5680262795b83b3fc9c537,2024-07-11T15:05:17.510000 +CVE-2023-6494,0,0,80dcbf3f6d7d049ebe223948e82130bdff4600f7af5680262795b83b3fc9c537,2024-07-11T15:05:17.510000 CVE-2023-6495,0,0,1666fb84290d79451fa115e60c1f7722eb45964f03f7f090509d5d4ec773b462,2024-06-20T12:44:01.637000 CVE-2023-6496,0,0,87b56518aaf4afd4545cd371dac346e93b19b056714958fa1a42154914cf88c5,2024-01-17T20:24:42.663000 CVE-2023-6497,0,0,5c328723b0d6eb2b6ecefa341ec54fae28ffb5f772896759b50e3e0ea4100eb7,2024-02-01T04:14:30.527000 @@ -243435,7 +243435,7 @@ CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448 CVE-2024-21523,0,0,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b829f,2024-07-11T13:05:54.930000 CVE-2024-21524,0,0,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000 CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 -CVE-2024-21526,0,1,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 +CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae6543935d,2024-05-17T02:38:05.063000 @@ -243558,7 +243558,7 @@ CVE-2024-21737,0,0,a90af93e6af88ab1e63750439f8a51408da352f40c4dd8d5d341f3011c62b CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819f3a,2024-01-11T22:54:02.190000 CVE-2024-21739,0,0,07f93ee1de6db4cd150e8044f6df8dfeec5c0df6671390dcd392c083d70bdcb1,2024-06-26T12:44:29.693000 CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000 -CVE-2024-21740,0,1,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 +CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000 CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000 @@ -243588,7 +243588,7 @@ CVE-2024-21773,0,0,c0e4344a82222deab8e235cd4d4af199cda76b795391156ebbba4fe72f747 CVE-2024-21774,0,0,1a683c4386593938143db88bd83b2bc14ad5e978ab332a4ec1c1701b534f41d6,2024-05-17T18:36:05.263000 CVE-2024-21775,0,0,2f16842bbda9918b4d7f1a6bf73bd7ee820e77b1f7db2f51cb1f9c6ad1d501ef,2024-06-07T09:15:10.467000 CVE-2024-21777,0,0,44618f6eca8c187e802d1fb8a5513e5c3f7a7b0ff0972cb292dc18c9e5673eb1,2024-05-17T18:36:05.263000 -CVE-2024-21778,0,0,167b5b08b26b86d8781b21a49ba9f2dda6a7ba3cfcaebb01801fff67590fa461,2024-07-08T16:35:46.377000 +CVE-2024-21778,0,1,956806b00eec16defbaff883449797c068ffb84a50507512df3e8a0ebf7c170b,2024-07-11T16:06:17.240000 CVE-2024-2178,0,0,9dc28451a90e8f509a9a1b870b1413dd7a56d7478bbeb05656b49782563314d4,2024-06-03T14:46:24.250000 CVE-2024-21780,0,0,21259f34a12221d2399755ce217ed35ba01de3b0090ff86fbe168411ec254b71,2024-07-05T18:15:25.117000 CVE-2024-21782,0,0,a54768f93a9b07a30680122b1877fb41eae0f01a5d667d71a8861ee6fcf71d48,2024-02-14T18:04:45.380000 @@ -244397,7 +244397,7 @@ CVE-2024-23147,0,0,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e0 CVE-2024-23148,0,0,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 CVE-2024-23149,0,0,242d8caf5deb75b9fbd1f60b635cd54b2b743a36dfa977ecbeafb68c5bb6441d,2024-06-25T12:24:17.873000 CVE-2024-23150,0,0,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 -CVE-2024-23151,0,1,53d13e8b9ba2cd63d85aa3df3bb17c4d39810557d3e3d9a803388619628364a3,2024-07-11T15:05:24.300000 +CVE-2024-23151,0,0,53d13e8b9ba2cd63d85aa3df3bb17c4d39810557d3e3d9a803388619628364a3,2024-07-11T15:05:24.300000 CVE-2024-23152,0,0,c5c382b3ba462bda0286084969263304e92f041f435cc9b3b38363a1158fa042,2024-06-25T12:24:17.873000 CVE-2024-23153,0,0,a9475572f3855658e511a61491406daf3a3db34baa0f7eeec4405b900cc5c36f,2024-07-03T01:47:35.377000 CVE-2024-23154,0,0,602e96827d2a402dbec8eeda4b14e220087b363940e263d35c0ecc3fd1600d12,2024-07-03T01:47:35.613000 @@ -244692,7 +244692,7 @@ CVE-2024-23558,0,0,0e030b3ddee305097ecf13a5fc93f84821f79454ea82e12098abf6fd591f4 CVE-2024-23559,0,0,a67d6aa6c2589ae3d37731867bb9f648e4b5d30ad4eba2e61f15676037d7636b,2024-04-15T19:15:09.577000 CVE-2024-23560,0,0,39262a3d1a015486541c11a9acaae3509226c69e322cbf4650c4cfad43009fa6,2024-04-16T13:24:07.103000 CVE-2024-23561,0,0,a22fcf5dfd91b5d6ac506750080d833a3983c3c231b1230f7c5930b307faa639,2024-04-16T13:24:07.103000 -CVE-2024-23562,0,0,549b68fa5cd09a375dc6d38e72f60a5d61478f63bfd7b71b2f4aec0d55022b0e,2024-07-10T15:15:10.893000 +CVE-2024-23562,0,1,2238e5f89ffb73e416454504866132c48ce1e441009ffdb7019bfd0c1312467d,2024-07-11T16:08:35.477000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,19b2dcf6e3c1e0697b2bea4d3507ea8b750bc4bf3b04f60b20452c989aaf2ffa,2024-05-14T16:13:02.773000 CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 @@ -244802,7 +244802,7 @@ CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c CVE-2024-23692,0,0,69dc5620f25e89b82c3c217a9f13f591bf678b6676983ea09fe8288d200080b3,2024-07-10T14:05:27.370000 CVE-2024-23695,0,0,97b1bbf9668e4f1ff263ecc5095fb2ce50165cd2bc27914c0badab59b62b53eb,2024-07-11T13:06:13.187000 CVE-2024-23696,0,0,189ee607710420766ee01561621adc5b7bb56059b2d08cc9a92c0d5f1f7c4d8e,2024-07-11T13:06:13.187000 -CVE-2024-23697,0,1,17c4488491744d62a05050e622b3358721ca6fdbe4baba48f22a7b460908a580,2024-07-11T15:05:24.920000 +CVE-2024-23697,0,0,17c4488491744d62a05050e622b3358721ca6fdbe4baba48f22a7b460908a580,2024-07-11T15:05:24.920000 CVE-2024-23698,0,0,40d89ec45289d1881bb4b87dba8c0bb9402bcb28d0514ce7732acc7634aad369,2024-07-11T13:06:13.187000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 CVE-2024-23704,0,0,3ab2415bdb26ba29dae3109785e9f4b7ad9e6e4e471a3ed83e21564f6ce311e3,2024-07-03T01:47:59.750000 @@ -244813,7 +244813,7 @@ CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68 CVE-2024-23709,0,0,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000 CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 -CVE-2024-23711,0,1,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 +CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000 @@ -244828,7 +244828,7 @@ CVE-2024-23731,0,0,204152b9ab32090d3f201504afd34c062c39bfd578f661ea797bbd83dd0dc CVE-2024-23732,0,0,042666c99b3635fb407c7af7c818760f4159a23a8e9e6c2822d5ba07aae8999c,2024-01-26T21:11:51.840000 CVE-2024-23734,0,0,3ab7c6257ca38ed9d7477d57e04d8b8398661cc4195ecc99bf38a750580483b1,2024-04-10T19:49:51.183000 CVE-2024-23735,0,0,cc8e5b54f96dbe13960a98eb0656f3844c314b70a551360f5a5c0009603693b8,2024-04-10T19:49:51.183000 -CVE-2024-23736,0,1,bcd223ae0db7879befee0415fb371b15c3be00a7450081b37507ddd44cb2eebb,2024-07-11T15:05:26.800000 +CVE-2024-23736,0,0,bcd223ae0db7879befee0415fb371b15c3be00a7450081b37507ddd44cb2eebb,2024-07-11T15:05:26.800000 CVE-2024-23737,0,0,d4ffd6dd100fdc4a0d40bd51b5a0ee6bddac8cf5eac0ee6a0f29c8fa7350a5f1,2024-07-02T12:09:16.907000 CVE-2024-23738,0,0,84fc715227e9c81d0ea24ba6cabdcd4b9ebaaa4af8fffc242edc7617abf88d5e,2024-05-17T02:36:37.750000 CVE-2024-23739,0,0,1dc14ca5b2f1048d31e09e11f0d951d9c59e5d8342f40e05e67a4d783040d706,2024-02-16T16:15:57.830000 @@ -244857,7 +244857,7 @@ CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000 CVE-2024-23765,0,0,a9bf9ddaf0ea53521841e4a7d5249d26363bad2b049c64b95ac86a5fafa6d151,2024-06-27T12:47:19.847000 CVE-2024-23766,0,0,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000 -CVE-2024-23767,0,1,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000 +CVE-2024-23767,0,0,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000 CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000 CVE-2024-2377,0,0,3193bacb38964a76865be4cdd2e9adb774f62e3213cbbc5f66850373a4fcad8d,2024-04-30T17:52:35.057000 @@ -245569,7 +245569,7 @@ CVE-2024-24963,0,0,f7ac6d9beae69472289af258cfa7df94f3fb587efc26344b96102b05f5639 CVE-2024-24964,0,0,6aeb3e68bcce4e30c320efc8bbc0ba8ea40b022ead3c928aca7667e8626ff2cf,2024-03-12T12:40:13.500000 CVE-2024-24966,0,0,a6e715310d1619966fe5747d39679f64ae1b61eb46bb4d8fceaf05df6847efb8,2024-02-14T18:04:45.380000 CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd8b,2024-05-17T02:38:15.830000 -CVE-2024-24974,0,1,58746381295b34b611cdb4edd106ea5da27c78c578480d54a0db25ca5467d003,2024-07-11T14:47:54.920000 +CVE-2024-24974,0,0,58746381295b34b611cdb4edd106ea5da27c78c578480d54a0db25ca5467d003,2024-07-11T14:47:54.920000 CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000 @@ -245622,7 +245622,7 @@ CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525 CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000 CVE-2024-2507,0,0,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000 CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000 -CVE-2024-25076,0,1,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000 +CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000 CVE-2024-25077,0,0,7eac67ae98b31640cc323f8f90a86c0baf27eb357da01b5c4f82ab8eafeeba64,2024-07-11T13:05:54.930000 CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 @@ -246616,7 +246616,7 @@ CVE-2024-26586,0,0,db0ea9b3345f5fd7a96c34d4148df3d02fd7f8fdc030d1d623c6c871c61c6 CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000 CVE-2024-26588,0,0,a12e329faae009d801e11973c8a72020a4a4a89d8da3b097e68d3f4be6ee8827,2024-03-18T18:02:15.647000 CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b7555f,2024-03-18T17:56:56.953000 -CVE-2024-2659,0,1,b83fd8ab8e061134bb60113327231a109e3796c337cb9867ba6104dc42d78ef5,2024-07-11T15:05:36.393000 +CVE-2024-2659,0,0,b83fd8ab8e061134bb60113327231a109e3796c337cb9867ba6104dc42d78ef5,2024-07-11T15:05:36.393000 CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000 CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000 CVE-2024-26592,0,0,195dd56f81d7c1170ff6ffa2e3f15abaac7ab70f9840c18d47f5736f2d0726df,2024-05-29T06:16:36.020000 @@ -246651,7 +246651,7 @@ CVE-2024-26618,0,0,b4ee02e43411773445d9502213c0c8ee13dbb28e9adadb6062e2443b8f287 CVE-2024-26619,0,0,4bc519bd153c025ad692ee69af117d5945ba0b94f5c3e5862c457953e2f5d4bd,2024-03-12T12:40:13.500000 CVE-2024-2662,0,0,f67fa5f3bbbaf2e8acff0e892a68fc06e4217f99a75dec53361b235392202bd4,2024-05-14T16:13:02.773000 CVE-2024-26620,0,0,d9644d90006553a6ef7df3ce5b7de0b26190c676351738b9b2539bec3ef4ee61,2024-03-12T12:40:13.500000 -CVE-2024-26621,0,1,8c52ea307cbfe42c219bd75a4f03872be3a0d33c33581f01c9650a5759221bf8,2024-07-11T14:15:13.210000 +CVE-2024-26621,0,0,8c52ea307cbfe42c219bd75a4f03872be3a0d33c33581f01c9650a5759221bf8,2024-07-11T14:15:13.210000 CVE-2024-26622,0,0,429b8c79ac7bc8a6f352b05f3ec787ee7dce1baf63c22803c7866fe6ab98869f,2024-06-25T22:15:19.240000 CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000 CVE-2024-26624,0,0,9575e38401ed951dd513d0e1852942215c7c9e9bc3c5371fd0da3ac3a0eac967,2024-03-27T14:15:10.163000 @@ -247489,7 +247489,7 @@ CVE-2024-27453,0,0,4fa62fb0431b68f90533abee1343406b0149f9efe637bd75fc3a77179a8be CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 -CVE-2024-27459,0,1,1c710877657ae7244cb55fca6385dc18847bb0964570ba742574dcae6bd24b68,2024-07-11T14:47:26.447000 +CVE-2024-27459,0,0,1c710877657ae7244cb55fca6385dc18847bb0964570ba742574dcae6bd24b68,2024-07-11T14:47:26.447000 CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000 CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 @@ -247537,7 +247537,7 @@ CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c5 CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000 CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000 -CVE-2024-27602,0,1,ff68a7dfbe76578be745d2be853eb13367fbf75dc768ea067191484500d8515d,2024-07-11T15:05:30.183000 +CVE-2024-27602,0,0,ff68a7dfbe76578be745d2be853eb13367fbf75dc768ea067191484500d8515d,2024-07-11T15:05:30.183000 CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000 CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000 CVE-2024-27609,0,0,f5d2fceb3a71c480d99c4c75cd0a83ffe0e0dd3a726d0869ef9aadec6a003cba,2024-04-01T01:12:59.077000 @@ -247552,7 +247552,7 @@ CVE-2024-27623,0,0,2fddee8e74e15c6e7895f22777fd9ac33928389d1ff6851e7ceeb0e05ed9e CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7b4c,2024-03-05T14:27:46.090000 CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000 CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000 -CVE-2024-27628,0,1,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c7d2,2024-07-11T15:05:31.010000 +CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c7d2,2024-07-11T15:05:31.010000 CVE-2024-27629,0,0,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000 CVE-2024-2763,0,0,915a4db607b8067b26a412109e7e5ccfc1290182e3b3b563c2eda7d6ee1f9e77,2024-05-17T02:38:28.787000 CVE-2024-27630,0,0,c166a75eb868b94e3d44b8631307a3b16a1a3175bacac14103c1a38615b66cc2,2024-04-11T06:15:06.270000 @@ -247715,7 +247715,7 @@ CVE-2024-2790,0,0,beedd0090f34846cee86bfcc16559ecd216425fdfa14e63be8297a23ca53ac CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 CVE-2024-27901,0,0,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 -CVE-2024-27903,0,1,7a16b56caf0aadbdfc143727319a91c26c6417220b554521d1e591b4babb7dec,2024-07-11T14:46:26.300000 +CVE-2024-27903,0,0,7a16b56caf0aadbdfc143727319a91c26c6417220b554521d1e591b4babb7dec,2024-07-11T14:46:26.300000 CVE-2024-27905,0,0,11f71bd2f04a983e03ffa738540da2ab3b19fd866be937104a685343c8bfc7f6,2024-05-17T02:37:34.130000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 @@ -248291,7 +248291,7 @@ CVE-2024-28869,0,0,bed6e8ba3681250027e8ebaede92ab26ffb4384953b59d036748ca14616df CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b49,2024-07-03T01:53:38.087000 CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d0161c,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000 -CVE-2024-28872,1,1,ea98a920229e26ec637d5da3a2fcb14be46e73e0827865714c33420c5094748e,2024-07-11T15:15:11.377000 +CVE-2024-28872,0,0,ea98a920229e26ec637d5da3a2fcb14be46e73e0827865714c33420c5094748e,2024-07-11T15:15:11.377000 CVE-2024-28877,0,0,883039bbb8a02fedae5005218a87450c4b734f262948f425805257c253ab9e71,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 @@ -248526,7 +248526,7 @@ CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000 CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29152,0,0,c92904cfed16837c6741a6aae634cd863038c196f5243ffb888a5a789d858f82,2024-06-25T20:15:11.353000 -CVE-2024-29153,0,1,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000 +CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000 @@ -248692,7 +248692,7 @@ CVE-2024-29454,0,0,aa15960195507983d36d6e2ba6fe52c5783793504e2d3e8d91a9bb9866998 CVE-2024-29455,0,0,34e13e15e8ba1247bab4074112a2a8e07941c50f23ef976a2aa4934ef2701aea,2024-05-27T01:15:15.573000 CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000 CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000 -CVE-2024-29461,0,1,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000 +CVE-2024-29461,0,0,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000 CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000 CVE-2024-2947,0,0,b68097f442084c413bcea33d1d0c33d19fa9ae07d0edeb3af3b79bd708e6dc65,2024-06-12T09:15:17.717000 @@ -248801,16 +248801,16 @@ CVE-2024-29774,0,0,b6d746daf0a9f89389e69183d03895d6675922cbbb66d6ef5358d6a524251 CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a707,2024-03-27T15:49:41.437000 CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000 CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000 -CVE-2024-29778,0,1,7078d531588620b0c0a9a375e79820625449ca74fed04f4f1c661ccf6ea1bfeb,2024-07-11T14:29:52.413000 +CVE-2024-29778,0,0,7078d531588620b0c0a9a375e79820625449ca74fed04f4f1c661ccf6ea1bfeb,2024-07-11T14:29:52.413000 CVE-2024-2978,0,0,10402db073fcc83eb9c3960e5a0172007bd5a71eeec44391bbdfbccc34dc921e,2024-05-17T02:38:40.007000 -CVE-2024-29780,0,1,ff87a8b15c39bcf6bb6551c6c4365634fc9c65ec4425784140a90dbc2abce6ed,2024-07-11T14:32:47.390000 -CVE-2024-29781,0,1,63313f0b9e181cbad852afadaa2499622f864bd882c6aa203150c0c579f83bd1,2024-07-11T14:35:15.730000 +CVE-2024-29780,0,0,ff87a8b15c39bcf6bb6551c6c4365634fc9c65ec4425784140a90dbc2abce6ed,2024-07-11T14:32:47.390000 +CVE-2024-29781,0,0,63313f0b9e181cbad852afadaa2499622f864bd882c6aa203150c0c579f83bd1,2024-07-11T14:35:15.730000 CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000 CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000 CVE-2024-29784,0,0,ba30017bc144f71b7965325aaa3311ae3dfeac682cda889e9f2a82b841d1ef8a,2024-07-11T13:53:03.173000 -CVE-2024-29785,0,1,9c4015230d39c343f799f72d25ace92e517029eb78fba9439d139dca26282d4c,2024-07-11T14:26:38.663000 -CVE-2024-29786,0,1,e1868240b5396da7688572c39896b1abbc484d583db68ded9c72ec430f89b162,2024-07-11T14:10:32.990000 -CVE-2024-29787,0,1,c9997f4a551624f9a0dd794be1a718140cce0102248650b8c444287c7a404243,2024-07-11T14:05:47.960000 +CVE-2024-29785,0,0,9c4015230d39c343f799f72d25ace92e517029eb78fba9439d139dca26282d4c,2024-07-11T14:26:38.663000 +CVE-2024-29786,0,0,e1868240b5396da7688572c39896b1abbc484d583db68ded9c72ec430f89b162,2024-07-11T14:10:32.990000 +CVE-2024-29787,0,0,c9997f4a551624f9a0dd794be1a718140cce0102248650b8c444287c7a404243,2024-07-11T14:05:47.960000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000 @@ -248873,7 +248873,7 @@ CVE-2024-29843,0,0,0e7cac2423043e71c46c0b1e43ac9a8c810800e1746f633c825d47d92993e CVE-2024-29844,0,0,0b2bf20574d5156f6a667769b4d5660c6c41f0f9a81de3ca328a866e5a169d72,2024-04-15T13:15:31.997000 CVE-2024-29846,0,0,ecf705f8a3f3d5200a5c3119a1c5f5c4508879a9b659519aff9f7061bee1cc64,2024-07-03T01:52:46.270000 CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875c84,2024-07-03T01:52:46.980000 -CVE-2024-29849,0,1,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000 +CVE-2024-29849,0,0,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000 CVE-2024-2985,0,0,fa2452bdca8bf817e9c39173e50c9398ab81e8bbe363c5d181d5470655c888f8,2024-05-17T02:38:40.683000 CVE-2024-29850,0,0,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000 CVE-2024-29851,0,0,218edcf6feb0effa72e3a8c5b814479d3c2c35c93f48749732d1e5886bf0b9db,2024-05-24T01:15:30.977000 @@ -249987,28 +249987,28 @@ CVE-2024-31308,0,0,5e2ae5593f1ea9760ae6e8cbc575821053a6196641c6e6bb427e79b97acb4 CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db555819d8,2024-05-01T18:15:23.233000 CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000 CVE-2024-31310,0,0,39c8b5f3047a90424057280556e039d7fcd0c87d4c13a730727031fa30d92c6d,2024-07-11T13:06:13.187000 -CVE-2024-31311,0,1,bc87f5eff00ede1d1c04389c216e60b2a2a407288e31ea28ec5028c636a65054,2024-07-11T15:05:38.153000 +CVE-2024-31311,0,0,bc87f5eff00ede1d1c04389c216e60b2a2a407288e31ea28ec5028c636a65054,2024-07-11T15:05:38.153000 CVE-2024-31312,0,0,3e59aee3cfa2f94cb0ef2f4dd0a4353f30db5e3e79096083a0ada05027297595,2024-07-11T13:06:13.187000 CVE-2024-31313,0,0,0fa1a93bf76d2578fececf6790601468789f9798bc4a9d3c04594cde67bd0b37,2024-07-11T13:06:13.187000 CVE-2024-31314,0,0,f79a503fa2b5e6b0ca89cfce664066f03d71aa556965c71aeebf162d04cdcf57,2024-07-11T13:06:13.187000 -CVE-2024-31315,0,1,285e9341c5dea2df00bd2c416691a1faeb9d23f21a318a12574fefeadc97541f,2024-07-11T15:05:39.143000 -CVE-2024-31316,0,1,32fc8a7b1b224122566c3d79a73274ea9359c3c71dbd47a6b8920e485bc01265,2024-07-11T15:05:39.377000 -CVE-2024-31317,0,1,800d561c71c022ae12380b47f0bffa09b01b8580803da3962bc9386025c4d930,2024-07-11T15:05:39.587000 +CVE-2024-31315,0,0,285e9341c5dea2df00bd2c416691a1faeb9d23f21a318a12574fefeadc97541f,2024-07-11T15:05:39.143000 +CVE-2024-31316,0,0,32fc8a7b1b224122566c3d79a73274ea9359c3c71dbd47a6b8920e485bc01265,2024-07-11T15:05:39.377000 +CVE-2024-31317,0,0,800d561c71c022ae12380b47f0bffa09b01b8580803da3962bc9386025c4d930,2024-07-11T15:05:39.587000 CVE-2024-31318,0,0,0d84f6fe565a6fef6c3462da1416e29e0311757f0491192516023b784222f940,2024-07-11T13:05:54.930000 CVE-2024-31319,0,0,d82c7bc64b10488b9b1926aa61d01961ce06d41701085112500f540f682b462a,2024-07-11T13:05:54.930000 CVE-2024-31320,0,0,fd0c569760394346ae816f996a976a14ed1c320bd30c9cc5b55f0ef9b67b63e1,2024-07-11T13:05:54.930000 -CVE-2024-31322,0,1,d20c4b5ba34b42a0392eed2de4ecf00db6c97fef76cc64c816a4b4ded912e267,2024-07-11T15:05:40.467000 +CVE-2024-31322,0,0,d20c4b5ba34b42a0392eed2de4ecf00db6c97fef76cc64c816a4b4ded912e267,2024-07-11T15:05:40.467000 CVE-2024-31323,0,0,a544d9a9ff2aa21c5fbb6fe91279f4ddfa1669db09487516ebfbf1d931a1974e,2024-07-11T13:05:54.930000 -CVE-2024-31324,0,1,97d477007c60c4e7e015994eba22a07898b7757a6832226ecfcf605a078ce0fe,2024-07-11T15:05:41.280000 +CVE-2024-31324,0,0,97d477007c60c4e7e015994eba22a07898b7757a6832226ecfcf605a078ce0fe,2024-07-11T15:05:41.280000 CVE-2024-31325,0,0,80e33a4833f6237bc4765f36ccc9a7e3eece55e1504b9aeb71a9c9792949a23e,2024-07-11T13:05:54.930000 CVE-2024-31326,0,0,284eae06442124a693f10717424ff9de135112a9a37355db24d271d9f53a0149,2024-07-11T13:05:54.930000 -CVE-2024-31327,0,1,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 +CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 CVE-2024-3133,0,0,a7a7a4865524243743a9c88c08b8282b249ad835f6a96871747e7128048107a2,2024-06-07T19:15:24.213000 CVE-2024-31331,0,0,ee3681b08cae6852ac0e24740bae3fb33eb861eb45c84d3034c14aed4d2a99ec,2024-07-11T13:05:54.930000 -CVE-2024-31332,0,1,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 -CVE-2024-31334,0,1,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 +CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 +CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,7b94e1c7e2fff90cd056259c618020e41ea9dda128606e5b08242f9be882f42e,2024-07-11T13:05:54.930000 -CVE-2024-31339,0,1,1b3aa03c0632b08b72325f6db66c9d2fa95219630c9b26fbdff47f9b0fe118cb,2024-07-11T15:05:42.757000 +CVE-2024-31339,0,0,1b3aa03c0632b08b72325f6db66c9d2fa95219630c9b26fbdff47f9b0fe118cb,2024-07-11T15:05:42.757000 CVE-2024-3134,0,0,e04064345e517c38325e3c54708d3b5c2565ae5cbcc3f4d3393427e4c611d4fe,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31341,0,0,d4166215cbddfa0324e008e571dea19e89ceb3a6d8e359be3d6c61b47b5bedf9,2024-05-17T18:36:05.263000 @@ -250166,7 +250166,7 @@ CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d9 CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000 -CVE-2024-31504,0,0,99a488f4090bf5d86c347d87f39e3694242654292610f00e4fc87fb32bb4d500,2024-07-09T16:22:31.613000 +CVE-2024-31504,0,1,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-3151,0,0,9347bf7ac28e84ca877a361b1eac7ef280766a4b0b29aa18ee59e0ed7a4dbbe2,2024-05-17T02:39:45.290000 @@ -250329,7 +250329,7 @@ CVE-2024-31890,0,0,eda850bb7869648d895763435641ab97f0cfe4aeba8f677c829b9f47f4e39 CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000 CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000 CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000 -CVE-2024-31897,0,1,a9f6dffdef42db63de321f283f9008f4cc590873723e0b6ff14df57c7407f3ac,2024-07-11T14:52:52.907000 +CVE-2024-31897,0,0,a9f6dffdef42db63de321f283f9008f4cc590873723e0b6ff14df57c7407f3ac,2024-07-11T14:52:52.907000 CVE-2024-31898,0,0,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000 CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000 CVE-2024-31902,0,0,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000 @@ -250958,11 +250958,12 @@ CVE-2024-32745,0,0,d87072ecdb1e4f8a0773ba4e4f91279addf64348f8d708e8345ba18186060 CVE-2024-32746,0,0,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000 CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000 CVE-2024-32752,0,0,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000 +CVE-2024-32753,1,1,7c48ff88153a955bfe5322e553e87f5a01e1ddca111c16d84f43d76cba84a859,2024-07-11T16:15:02.350000 CVE-2024-32754,0,0,607be943cbec19ebc26898f36a5e33ae0135cc060ad9e54e1f721e2b27b87741,2024-07-05T12:55:51.367000 CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000 -CVE-2024-32759,0,1,e561891056edc630b07789b7eea3e9c4ca316a3bd4320f86e19aed48b57191eb,2024-07-11T15:15:11.627000 +CVE-2024-32759,0,0,e561891056edc630b07789b7eea3e9c4ca316a3bd4320f86e19aed48b57191eb,2024-07-11T15:15:11.627000 CVE-2024-3276,0,0,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1fe,2024-07-08T14:19:01.997000 CVE-2024-32760,0,0,67074d2cb149a548f5ca201a895261189c469e9d7c384fe074a8d7f159cb359a,2024-06-10T18:15:34.203000 CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000 @@ -251073,26 +251074,26 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9 CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000 CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000 CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000 -CVE-2024-32891,0,1,c51a973b7029c344fedc0ca35231006f50e6ba4e1865b40154956cad18052b36,2024-07-11T14:05:11.717000 -CVE-2024-32892,0,1,6a017ad3b0c485077b83258ac2bcaa1581888670cd70963636eab58dba47d221,2024-07-11T14:04:49.010000 -CVE-2024-32893,0,1,b11c36070d9dea986999a56213dd8e5d4f6f27474c49daf549b45061c7426f08,2024-07-11T14:04:33.807000 -CVE-2024-32894,0,1,ba70a76f8b71eb537b49cee6f7fa1a0772490fb4332fb5fa1e4daabf4368ae19,2024-07-11T14:03:46.810000 +CVE-2024-32891,0,0,c51a973b7029c344fedc0ca35231006f50e6ba4e1865b40154956cad18052b36,2024-07-11T14:05:11.717000 +CVE-2024-32892,0,0,6a017ad3b0c485077b83258ac2bcaa1581888670cd70963636eab58dba47d221,2024-07-11T14:04:49.010000 +CVE-2024-32893,0,0,b11c36070d9dea986999a56213dd8e5d4f6f27474c49daf549b45061c7426f08,2024-07-11T14:04:33.807000 +CVE-2024-32894,0,0,ba70a76f8b71eb537b49cee6f7fa1a0772490fb4332fb5fa1e4daabf4368ae19,2024-07-11T14:03:46.810000 CVE-2024-32895,0,0,3b5e93f479d0a309808bc7ab37e73f0b736af7b90a097c9affa7582da06b56cb,2024-07-11T13:58:33.960000 CVE-2024-32896,0,0,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000 -CVE-2024-32897,0,1,90e26042088ada707b934da98a5303718a15c9664281ad13fb45655a7f047677,2024-07-11T14:28:06.287000 -CVE-2024-32898,0,1,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f63479422a,2024-07-11T14:28:44.707000 -CVE-2024-32899,0,1,340496ecc0d2e0aeac26e79f6c9fe8ba7bf118c672601a30b8ddfc0e1352d2fa,2024-07-11T14:22:06.627000 +CVE-2024-32897,0,0,90e26042088ada707b934da98a5303718a15c9664281ad13fb45655a7f047677,2024-07-11T14:28:06.287000 +CVE-2024-32898,0,0,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f63479422a,2024-07-11T14:28:44.707000 +CVE-2024-32899,0,0,340496ecc0d2e0aeac26e79f6c9fe8ba7bf118c672601a30b8ddfc0e1352d2fa,2024-07-11T14:22:06.627000 CVE-2024-3290,0,0,0ad1b84ced42c9f8a7789dc01b4a01dc3eea4ac518ae7e87d453cc71fd0f450a,2024-05-17T18:35:35.070000 -CVE-2024-32900,0,1,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000 -CVE-2024-32901,0,1,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000 +CVE-2024-32900,0,0,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000 +CVE-2024-32901,0,0,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000 CVE-2024-32902,0,0,3ebbe8411081db4082bdb0363bed0385f59552cb49e3c4245a8448b5cd92c0aa,2024-06-17T12:43:31.090000 -CVE-2024-32903,0,1,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000 -CVE-2024-32904,0,1,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000 -CVE-2024-32905,0,1,2eb41f0e9cf9f3f2b219d556555b371f4f2bedea99fc9e25c35c0e862b4a23e1,2024-07-11T15:13:21.467000 -CVE-2024-32906,0,1,09fc4e5210ea82962a397f90475a93836b6dc6161443f25a2b71164b58f1e099,2024-07-11T15:13:02.713000 -CVE-2024-32907,0,1,14dfd1aaa25a46fea5214540e8b9086c0e794eff9e7591e8b296e1769fd633c5,2024-07-11T15:10:44.407000 -CVE-2024-32908,0,1,312c1682636aeea08a2f2a9045f0fc01526c00f32557a30c9ee32dc9a3e3ada2,2024-07-11T15:07:31.087000 -CVE-2024-32909,0,1,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000 +CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000 +CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000 +CVE-2024-32905,0,0,2eb41f0e9cf9f3f2b219d556555b371f4f2bedea99fc9e25c35c0e862b4a23e1,2024-07-11T15:13:21.467000 +CVE-2024-32906,0,0,09fc4e5210ea82962a397f90475a93836b6dc6161443f25a2b71164b58f1e099,2024-07-11T15:13:02.713000 +CVE-2024-32907,0,0,14dfd1aaa25a46fea5214540e8b9086c0e794eff9e7591e8b296e1769fd633c5,2024-07-11T15:10:44.407000 +CVE-2024-32908,0,0,312c1682636aeea08a2f2a9045f0fc01526c00f32557a30c9ee32dc9a3e3ada2,2024-07-11T15:07:31.087000 +CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000 CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000 CVE-2024-32910,0,0,29cf6a0531855d50f315c3452df6e0eb31144ad7ac2ecf6b02a60ca456807cc8,2024-06-17T12:43:31.090000 CVE-2024-32911,0,0,e16102a4588453c66372cc339d8de78a8fe0bf75217d40b17bff15240917476b,2024-06-17T12:43:31.090000 @@ -251275,7 +251276,7 @@ CVE-2024-33308,0,0,c51602bb951dc504524489be700ba980c6849c038059ed7b24a552934a0ff CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867601,2024-05-17T02:39:23.810000 CVE-2024-3331,0,0,5769fc47c1644a784687913176ff51174f40b1dc158ef3146eb07b8f4d35b9c7,2024-06-27T19:25:12.067000 CVE-2024-3332,0,0,6475dd8615470e05caa4cfca0bde81007e5136e29693035b9a6ba3bc47d4e7b4,2024-07-05T12:55:51.367000 -CVE-2024-33326,0,1,d73ab10e37e6fff7acaaff3cdf41abf13e6156ac0dfdf9f1bbe625be5e918e4a,2024-07-11T15:05:43.450000 +CVE-2024-33326,0,0,d73ab10e37e6fff7acaaff3cdf41abf13e6156ac0dfdf9f1bbe625be5e918e4a,2024-07-11T15:05:43.450000 CVE-2024-33327,0,0,11853dac14c64dea04c3fc1d14076059697e4360541f7f4148789b175d5cb655,2024-07-11T04:15:04.777000 CVE-2024-33328,0,0,fcc2c106d7db5e2b3ce84edb4c966112499f1f44ab7ff06c82fffe3937775387,2024-07-11T04:15:04.947000 CVE-2024-33329,0,0,01adda01577489cdd90fc465b37d3b119462b0d0936052d760de6d53a020a4a5,2024-07-11T04:15:05.070000 @@ -251759,7 +251760,7 @@ CVE-2024-34096,0,0,b211b538fffe9abfd3a63762f76226325b711bcb377209279662a8a0721f8 CVE-2024-34097,0,0,80fabf82621e388228ad3681519752bd50189e2d3b21266b60e2b336e675dc88,2024-05-15T16:40:19.330000 CVE-2024-34098,0,0,b12c4c03c14c7ac462d32d4a1e50d77fdbffead011cc26736694e970715f1621,2024-05-15T16:40:19.330000 CVE-2024-34099,0,0,a5986ac74e6b192dfee0f6656002b6da38300bc4846a845af7e18d0e591fa17c,2024-05-15T16:40:19.330000 -CVE-2024-3410,0,1,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000 +CVE-2024-3410,0,0,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000 CVE-2024-34100,0,0,d3c0a25a5afbb7abe23e48a0ccffbfabed32f430bdde6425683076da7ff2f5a6,2024-05-15T16:40:19.330000 CVE-2024-34101,0,0,d4650521d311c5f5db989961cb59afe8f4d3fccf28beebc265bb44f9beb6fac8,2024-05-15T16:40:19.330000 CVE-2024-34102,0,0,8b1e6e557dce53483243926c2b72d923bdfc128d2c064f0699990d66fcdbe8e2,2024-07-09T16:00:38.170000 @@ -252093,8 +252094,8 @@ CVE-2024-34599,0,0,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71 CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000 CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000 CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 -CVE-2024-34602,0,1,a60646663cb8bf2eacd70cfaa4af39d147258b355ffc1f4917ce8b43a426de00,2024-07-11T14:49:05.190000 -CVE-2024-34603,0,1,b2a7efbfdb851e561adba39caae4f17a953dcd69be4ed4e578d4b1a9a528f9aa,2024-07-11T14:48:47.467000 +CVE-2024-34602,0,0,a60646663cb8bf2eacd70cfaa4af39d147258b355ffc1f4917ce8b43a426de00,2024-07-11T14:49:05.190000 +CVE-2024-34603,0,0,b2a7efbfdb851e561adba39caae4f17a953dcd69be4ed4e578d4b1a9a528f9aa,2024-07-11T14:48:47.467000 CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000 CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000 CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000 @@ -252142,10 +252143,10 @@ CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16 CVE-2024-34720,0,0,ad9e8e18334149cc86a5b7493717ca793d637ad8533bb7504c9258989530a492,2024-07-11T13:05:54.930000 CVE-2024-34721,0,0,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000 CVE-2024-34722,0,0,c260ecb3dbfb3ee293b3ce1efe4ba187888cf5868c63b0406fd7450095747907,2024-07-11T13:05:54.930000 -CVE-2024-34723,0,1,36e1d31ff280bd2515129a3078844d3841f9954790c36988b12cf571242a9f30,2024-07-11T15:05:45.123000 +CVE-2024-34723,0,0,36e1d31ff280bd2515129a3078844d3841f9954790c36988b12cf571242a9f30,2024-07-11T15:05:45.123000 CVE-2024-34724,0,0,4da53c90a9b873ce90ea05a00658380d5b584241eb1232fc8a30445b4f3d9630,2024-07-11T13:05:54.930000 CVE-2024-34725,0,0,98e9d37a940b2073d776990c8ea0e21b460d0fca7f102ef542f0502f179475c7,2024-07-11T13:05:54.930000 -CVE-2024-34726,0,1,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 +CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-3473,0,0,ecf07ac84ad9a3f593fb990c7a6940d333eabefd6a4358103eba0f21665023d1,2024-05-02T18:00:37.360000 CVE-2024-3474,0,0,92034c6e8e03ef9947dcf9fd02cc16997c4bf0b4b196a87ecd9d32a4fbd7f10b,2024-05-02T13:27:25.103000 CVE-2024-34749,0,0,fe5f41bd42e695276d38161b9a2d636fec6ebfca2120aa0bc8cb065f0e443352,2024-06-04T19:20:02.877000 @@ -252626,7 +252627,7 @@ CVE-2024-35669,0,0,50fdf0a24706bbfb18b8d81f89a1a124dc9b63509d660740d809f07073f8b CVE-2024-3567,0,0,6c98824b61fbf01fa2e17d4630ab262f6d678625fc1c8f56ac29573cad1df238,2024-06-10T18:39:52.067000 CVE-2024-35670,0,0,b47b6d86ae05a8cb55f18ead8897a2d59e2d4fe072a8348cc9c3af0c4830540f,2024-06-11T14:32:50.147000 CVE-2024-35671,0,0,fd5ff04d66fb106c6ca271e8de1db731d8e556a5aecc794bb3c98d6bdac41f1f,2024-06-13T18:36:45.417000 -CVE-2024-35672,0,1,36402c609c6f10c2c4ab99769d453a53c0ccdb977852c177a10eab32a78fbc3e,2024-07-11T15:15:11.733000 +CVE-2024-35672,0,0,36402c609c6f10c2c4ab99769d453a53c0ccdb977852c177a10eab32a78fbc3e,2024-07-11T15:15:11.733000 CVE-2024-35673,0,0,2711db729ce9cbebdbfc8bb8cda940b111717768b11f75e605988c758f807568,2024-06-14T18:14:49.347000 CVE-2024-35674,0,0,83ea165a8a309b2a7c99f91f27d6ab747e72840d8c9398d8fec8255e0f1eb9a7,2024-06-18T18:10:50.157000 CVE-2024-35675,0,0,2ddb4dad047f65a8b834345449c654352fcacfb965b8ff1d42078ac11d7774c5,2024-06-10T02:52:08.267000 @@ -253291,9 +253292,9 @@ CVE-2024-3643,0,0,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d CVE-2024-3644,0,0,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000 -CVE-2024-36451,0,1,0282b5798612593892f8b22f51a38ce8164272f8754ea7af1c514e9b953ab154,2024-07-11T15:05:47.857000 +CVE-2024-36451,0,0,0282b5798612593892f8b22f51a38ce8164272f8754ea7af1c514e9b953ab154,2024-07-11T15:05:47.857000 CVE-2024-36452,0,0,de0ddf9ec46c34a45ea45b28170f7953241f05d2c2c229b8d849dbb88c728f2a,2024-07-11T13:05:54.930000 -CVE-2024-36453,0,1,4f2b528f0e3096ddd2a4aee4fe033e97d4113146188596ed5c407d648083f582,2024-07-11T15:05:48.797000 +CVE-2024-36453,0,0,4f2b528f0e3096ddd2a4aee4fe033e97d4113146188596ed5c407d648083f582,2024-07-11T15:05:48.797000 CVE-2024-36454,0,0,119ecbd34abcc47a263eca5a7b8a20f07f9103015a4c85c0f4c832e1c8eae2d9,2024-06-13T18:36:09.013000 CVE-2024-36459,0,0,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 @@ -253320,7 +253321,7 @@ CVE-2024-36500,0,0,257fd399a14a7141c50c9e2046f94aaac781c0de172f7af5b46d8dab39ba2 CVE-2024-36501,0,0,31cf8d7c71722235c9f044b51d6c28f28965439d43fd3f0fcf21214d656b125f,2024-06-17T12:42:04.623000 CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc44342549d0,2024-06-17T12:42:04.623000 CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000 -CVE-2024-3651,0,1,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 +CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 CVE-2024-36526,0,0,1ef54497acba69e484a273933341aeb22209d47656c43c34648a5bf39e748b3e,2024-07-09T18:18:38.713000 @@ -253375,7 +253376,7 @@ CVE-2024-36670,0,0,98051372c03c4f8daf963a6b52983fb8a9582924dc9f1a3de21e1b0831613 CVE-2024-36673,0,0,c3fdb493385fd7349af8a7f0f647aa65a0c25320dc90b659d1425197d89ce5bd,2024-06-11T18:27:20.950000 CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000 CVE-2024-36675,0,0,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000 -CVE-2024-36676,0,1,a6f2730c67158cf77e7177475d528da2c111a9270c55f8edde3fbb0f8476e94d,2024-07-11T15:05:49.017000 +CVE-2024-36676,0,0,a6f2730c67158cf77e7177475d528da2c111a9270c55f8edde3fbb0f8476e94d,2024-07-11T15:05:49.017000 CVE-2024-36677,0,0,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000 CVE-2024-36678,0,0,c0825943f1d5219c9624193357755cc06a7e20f8bcb4f135a8b3456b8cac03b6,2024-07-03T02:03:29.450000 CVE-2024-36679,0,0,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0c1d,2024-07-03T02:03:30.273000 @@ -253663,7 +253664,7 @@ CVE-2024-37148,0,0,80bea212d724fd8426f29ccd28ad47ac03ff4315e23f67a8b6a1a81a53973 CVE-2024-37149,0,0,62da2a22ca18555c3b147f38a3030ae567e778beceec162cc580c895135a35f0,2024-07-11T13:05:54.930000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000 -CVE-2024-37151,1,1,e318eb9efc28cf4a8de13391434038dbda7c22f59eebc0c8cb67a28655779714,2024-07-11T15:15:11.847000 +CVE-2024-37151,0,0,e318eb9efc28cf4a8de13391434038dbda7c22f59eebc0c8cb67a28655779714,2024-07-11T15:15:11.847000 CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000 CVE-2024-37153,0,0,61a2831c55890f9a410cc075d806b38e60c3b9609259f6ca16f7a060d646905b,2024-06-07T14:56:05.647000 CVE-2024-37154,0,0,58669c60bd370ee58122b9f7af67de36a61a42702559484c7a8e000321217599,2024-06-07T14:56:05.647000 @@ -253805,7 +253806,7 @@ CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67 CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000 -CVE-2024-37389,0,1,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 +CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 @@ -253850,7 +253851,7 @@ CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3d CVE-2024-37513,0,0,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-37520,0,0,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000 -CVE-2024-37528,0,1,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 +CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000 @@ -253942,7 +253943,7 @@ CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc34243b0,2024-07-08T16:41:23.650000 CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f325,2024-07-08T16:37:28.323000 CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000 -CVE-2024-37770,0,1,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 +CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000 CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000 CVE-2024-37791,0,0,aac0a75365a73d05a49838e7a7b1ba90a794339affdf6e30eec1aa9fd749c48e,2024-06-20T12:44:01.637000 @@ -253961,7 +253962,7 @@ CVE-2024-37820,0,0,0a0996a8947e2895e99ed868e2f9dddf9b73eaadf620faf0715e497fd47a9 CVE-2024-37821,0,0,dad227ff1e39e1e08a617033ca30de21cc87f5062f829537e300bad0e33ab0a8,2024-07-03T02:04:48.313000 CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000 CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000 -CVE-2024-37829,0,1,1e83f5827db2aebd4e043417419d588d621c3e555f2d66c999e782ce41670452,2024-07-11T15:05:54.680000 +CVE-2024-37829,0,0,1e83f5827db2aebd4e043417419d588d621c3e555f2d66c999e782ce41670452,2024-07-11T15:05:54.680000 CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000 CVE-2024-37830,0,0,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122afec,2024-07-11T13:06:13.187000 CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000 @@ -253976,7 +253977,7 @@ CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c CVE-2024-37865,0,0,afa406c73653f017546305f09b19c359bf5691bd7386c950c60dfcea42c3cf59,2024-07-11T13:05:54.930000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 CVE-2024-37870,0,0,0021ada25c2ba8466304ad46788adea08218f84efb7f6d0bba03ba76aad30b01,2024-07-11T13:06:13.187000 -CVE-2024-37871,0,1,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b317,2024-07-11T15:05:55.507000 +CVE-2024-37871,0,0,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b317,2024-07-11T15:05:55.507000 CVE-2024-37872,0,0,d08275c05be50432c03c5ad56489a099130fb68799f56932f00af7082219c5d4,2024-07-11T13:06:13.187000 CVE-2024-37873,0,0,aa8b3b2aad2e3927f58b95e8f826c6c2da0db8ab8e6880847c0cc4eecf275fb0,2024-07-11T13:06:13.187000 CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000 @@ -254035,33 +254036,33 @@ CVE-2024-37989,0,0,dcd9251350b8312f967ccfaf6bed908ce52042da267c0e5378c80314fb15c CVE-2024-3799,0,0,3a96a27c53ed7e1d7cf2579e3ed9f69ec7ff0985324452d5e5c94bdef3f87f3a,2024-07-11T13:05:54.930000 CVE-2024-37996,0,0,cba58d6ac90829d8d67ffd07f834ee70e887bc5c716a09a919d4b05a760695de,2024-07-09T18:19:14.047000 CVE-2024-37997,0,0,459dadeefbbac0d82b1c0c2a892387565fe96e62452959c2d684100f700aa64e,2024-07-09T18:19:14.047000 -CVE-2024-37999,0,1,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 +CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-38010,0,0,3461604452db863cea0374a4db8c11a9f6d691f87cb91dd9676efa380092ec2e,2024-07-09T18:18:38.713000 CVE-2024-38011,0,0,4f66ca002da61a786e83d959896416ce463bd4e0ee50eafec5d2c32e7dc218f1,2024-07-09T18:18:38.713000 -CVE-2024-38013,0,0,caad83a1489b74215afad4a4c8e82c0afba20eb05ecbae200d8de5cddfb63dbe,2024-07-09T18:18:38.713000 -CVE-2024-38015,0,0,e72c53e58f8294607d98ec9d5739915e2c08884717b909a6cc1b006142a8fc33,2024-07-09T18:18:38.713000 -CVE-2024-38017,0,0,73290933abbcecd5d36371e14a73a0c61df248f2b886d97acbc4fc5522ff2df9,2024-07-09T18:18:38.713000 -CVE-2024-38019,0,0,e82228040e66d2c2532ef58389cbb59007365a7bf6c6085235aca728e5a61148,2024-07-09T18:18:38.713000 +CVE-2024-38013,0,1,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000 +CVE-2024-38015,0,1,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000 +CVE-2024-38017,0,1,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000 +CVE-2024-38019,0,1,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000 -CVE-2024-38020,0,0,bd7252602fb74ca11537d67660e517112b86ed47ec6e539cb60f3b6f51021a94,2024-07-09T18:18:38.713000 -CVE-2024-38021,0,0,d2d70a48d6f9e5bd45005274a68113448acbc50ece7ebe1ffa9d448cca9f421b,2024-07-10T22:15:04.530000 -CVE-2024-38022,0,0,741e925f1c88410970e421ad8e0c1008c9a613060613b619d3e51dbb26055bda,2024-07-09T18:18:38.713000 -CVE-2024-38023,0,0,26aa830c0b687f2c026d2426ae46c898f634eeada2488acf5012ff575bf5f330,2024-07-09T18:18:38.713000 -CVE-2024-38024,0,0,18c866607aa343d89e10112e531316720d7d5da3994742c51add368374a58c90,2024-07-09T18:18:38.713000 -CVE-2024-38025,0,0,7048d88488be239bd60d4f45d665a9bf3894b60f6b8af6c981543898d1ef1eee,2024-07-09T18:18:38.713000 -CVE-2024-38027,0,0,19184693784df316c1c252205a61b1767784abb28e87076ef59c650293a83dc4,2024-07-09T18:18:38.713000 -CVE-2024-38028,0,0,6244bf2ac13e643ac559617b035f7f7de3a1c369ec0cc9af1c6cee2b56fd060e,2024-07-09T18:18:38.713000 +CVE-2024-38020,0,1,25b61b5f1a6adfe4617d71f8aaecdffc9abacbc0c88d9ab31bd18a3dd6ca187d,2024-07-11T16:49:29.490000 +CVE-2024-38021,0,1,fd3a6900db8a3e9a20ee7f538c7d203810148c4d4c86fcb54be0a0c075768be0,2024-07-11T16:49:16.537000 +CVE-2024-38022,0,1,b1bbc09d582317b335279ccfe47b7cd2ff580169f9771c8a0e7d13610cf9d079,2024-07-11T16:48:59.647000 +CVE-2024-38023,0,1,ecfdc5957daa3d4905ac9ac241d99f7f48aa13f52cefcd5bb933f5c3a290391d,2024-07-11T16:47:34.203000 +CVE-2024-38024,0,1,1797dacf114220c1e1049c00517f85420f4d0a240dbe89f86adea8256bc9867f,2024-07-11T16:46:07.437000 +CVE-2024-38025,0,1,9f028b66722379a4d88b7ebae27bb9427c5009d1dce1299424f156ca72de7c23,2024-07-11T16:43:28.747000 +CVE-2024-38027,0,1,4aa1cddeb9caa33aa67dad478e11bf6f705700b0330932b5452f221ae54ceffe,2024-07-11T16:42:49.083000 +CVE-2024-38028,0,1,a1f99f145474526e61ea4a0e3c69bdb1c6e1b6da7efe7b6b1a875e09474817bf,2024-07-11T16:42:20.313000 CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000 -CVE-2024-38030,0,0,1a97f52b107160b3a47008d670be7ca5bdf769c976acbc14485caac3fcf633bf,2024-07-09T18:18:38.713000 -CVE-2024-38031,0,0,71681eac70bf7c5ee2a8895750c94fbdfd9124e8ddb935a59cc1eecd96010030,2024-07-09T18:18:38.713000 -CVE-2024-38032,0,0,a26bcde123269ac26a12d7d2c1f8c381db0ac24f7cad93b03456a503b7e5834c,2024-07-09T18:18:38.713000 -CVE-2024-38033,0,0,7378cae7c51beff6a42105e21ad27453fa144c0cbb478f2500e4f99383c5ded6,2024-07-09T18:18:38.713000 -CVE-2024-38034,0,0,344447f0089b23d2741e7139bc99d0c1b8d2873289a68334dc31f69d9f5bae06,2024-07-09T18:18:38.713000 +CVE-2024-38030,0,1,2692bbe3cc189a0b531f2e3918e547283f3aaa5462dbf0310bed7de364bbd2a0,2024-07-11T16:35:21.450000 +CVE-2024-38031,0,1,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df51d0,2024-07-11T16:32:33.517000 +CVE-2024-38032,0,1,41be2218ab416d77ec81c0853b207c29f9c64191f96c18dcd3b6e6f7560f90e5,2024-07-11T16:31:16.480000 +CVE-2024-38033,0,1,1e81123daf9f99850b1ab7ee785cd263ed2b0b018942e514470897032a30503e,2024-07-11T16:27:21.303000 +CVE-2024-38034,0,1,e720c7cb8e085ac1619fbec51b8ca1a9266a96c4740c9831ab3943b092aa8264,2024-07-11T16:26:19.257000 CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000 -CVE-2024-38041,0,0,278c3450989c51cf2479f37ffc49c4f9d4f9281b72022afeb487126976abc0ea,2024-07-09T18:18:38.713000 -CVE-2024-38043,0,0,1f1f02448a6d149ff463e7075303e2939d2b2a8b3dfc808720639c531fe9055a,2024-07-09T18:18:38.713000 +CVE-2024-38041,0,1,f4a3a12f8b0083cabe34ce18f7650953aa9c869c7e1908b1e136d7159a58fbbc,2024-07-11T16:25:14.153000 +CVE-2024-38043,0,1,678d7239712daaa20be0694f0d9a87623bf13f4e650f026e0e7dc828486931e4,2024-07-11T16:25:00.517000 CVE-2024-38044,0,0,d1f9d81750c439d53b92eaa1949240def931dbb738438b36d52cd96b6db1617b,2024-07-09T18:18:38.713000 CVE-2024-38047,0,0,53807be6a9ac5cec3149561bb293b7248df99966ebd2aed18653ee47ec208b55,2024-07-09T18:18:38.713000 CVE-2024-38048,0,0,8b45cd20a8a91124c2c04207baee0548e387a387f98834d6df45d2d88ebb45fc,2024-07-09T18:18:38.713000 @@ -254077,18 +254078,18 @@ CVE-2024-38057,0,0,92a2b086499e3215cb3faaede3cc890c0b1a11336bdb7aaca69d217d07509 CVE-2024-38058,0,0,9afac0de1918b95c6dbe199ecf90207a0e3f8d3018e9cd0d5064ab0264c9fc59,2024-07-09T18:18:38.713000 CVE-2024-38059,0,0,d0129026d8a1354243ee38a0ce659812f732da20fbb52961254e97028108b096,2024-07-09T18:18:38.713000 CVE-2024-3806,0,0,de873f8585a077f47d9a3aa2ddc3d8a1a22e9124cbb6f60c98787e1f14a35570,2024-05-14T16:11:39.510000 -CVE-2024-38060,0,0,0621e2be768127cc17d52221bd216bd787d6365d6b7ef1cfdf63cf2a87f53892,2024-07-09T18:18:38.713000 -CVE-2024-38061,0,0,22495ae4b622a515bf77d60bb4c694e225cb917853e706564c82eabe17b0a8e4,2024-07-09T18:18:38.713000 -CVE-2024-38062,0,0,302cb9bf64e71fad72d4c2f66e8891bd43e03bc209d0c0806747c6aab8c451d6,2024-07-09T18:18:38.713000 -CVE-2024-38064,0,0,dd5ff4c892d7059a5b50c695a4cf3aefa9c8ae61d639ec77f0b4f64f633af90f,2024-07-09T18:18:38.713000 -CVE-2024-38065,0,0,11724388744a90ffd8c1098e77f009f4e2a60a2be3fc84d2902546cf534484b4,2024-07-09T18:18:38.713000 -CVE-2024-38066,0,0,d2e2bbe4bc29bc31726777b0c907a6d0f18b0f414145042105f9e752c9c03df6,2024-07-09T18:18:38.713000 -CVE-2024-38067,0,0,3367c143e7ad593750445bb430ad6cf0004e94887ecaeda1685a814fedb5a565,2024-07-09T18:18:38.713000 -CVE-2024-38068,0,0,7aec38c4a9c167694ce42df8f3a9ca87f5bcb58fd50a5928f5a75f85101d95fe,2024-07-09T18:18:38.713000 -CVE-2024-38069,0,0,a0b3d0207f6ca940ad376624326ecbd373bc1c1bf12037482ef1d1a974ac49e8,2024-07-09T18:18:38.713000 +CVE-2024-38060,0,1,63c1c3f7b3555f8e8f2537c6ac81850aa546b86acab9677614886ea02cdd80c7,2024-07-11T17:09:20.017000 +CVE-2024-38061,0,1,7b316201a092038cbe917d17f13bee010de1a73994041a34c798b3d7237ec87f,2024-07-11T17:08:40.157000 +CVE-2024-38062,0,1,40fa3d5b9eed5c32991d4e6161d754e71be83a27294e7931a189d018073d0ac0,2024-07-11T17:08:22.053000 +CVE-2024-38064,0,1,66a71bdea3896d59dd1c588b95f79879560414734406c558a726067d97909eeb,2024-07-11T17:07:36.783000 +CVE-2024-38065,0,1,a6658c3d060612b2e03972415d16699a099ac39758805a3ac6fdc31eaf3c8d1c,2024-07-11T17:06:56.247000 +CVE-2024-38066,0,1,0616ff48d36a94dc37983508e6217c9a8d1d633830884df503ea9631fdac1a9b,2024-07-11T16:59:19.463000 +CVE-2024-38067,0,1,9bbdda8abccd1cbb43bdd13637d9ea888cc2ae9e2549fbd75146e1639da2beb1,2024-07-11T16:53:35.477000 +CVE-2024-38068,0,1,b9f45b84d7d3abce672c811c4cce60de931bead7e338cf34e120b7d344a0f546,2024-07-11T16:53:21.910000 +CVE-2024-38069,0,1,7cf3c12ed1298afa48e79540c783db5777f9869a543a8d68868f81ae77cb8d9e,2024-07-11T16:52:57.883000 CVE-2024-3807,0,0,0018248fbe5cd3ad3d19de6c834f7e1f73352b7bbd9c92aa03f6a65e0b3f3d96,2024-05-14T16:11:39.510000 -CVE-2024-38070,0,0,6d783cba0ab00bf76f35e4bab6e84029bb887237907f5e64952558dee021d92b,2024-07-09T18:18:38.713000 -CVE-2024-38071,0,1,8da2364a3ae2228361f313a329533be39e734051820a4a426208a407d8a52407,2024-07-11T14:47:39.197000 +CVE-2024-38070,0,1,ffa8510597014f182e4eee723107a9d9dd84d3a2d8df98b15da081ff14813f7d,2024-07-11T16:50:59.957000 +CVE-2024-38071,0,0,8da2364a3ae2228361f313a329533be39e734051820a4a426208a407d8a52407,2024-07-11T14:47:39.197000 CVE-2024-38072,0,0,86b7e18b91a90af8df2d0c013b3bb2421c7d53b207bed58b7e7387a1c2b6d703,2024-07-09T18:18:38.713000 CVE-2024-38073,0,0,56e4d1951cb5bac2d562a0c70bccd3573098b798a15c5ce3a563445f960816ad,2024-07-09T18:18:38.713000 CVE-2024-38074,0,0,c0a843abfb5a8b8c595f204778ac7258ce13c13886138a3eb856055572c32965,2024-07-09T18:18:38.713000 @@ -254166,7 +254167,7 @@ CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 -CVE-2024-38330,0,1,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000 +CVE-2024-38330,0,0,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000 CVE-2024-3834,0,0,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000 CVE-2024-38344,0,0,9ab5a9367a4478293ac2379112f78ca200a2cb316c550e5b0a6b06a397872c02,2024-07-05T12:55:51.367000 CVE-2024-38345,0,0,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000 @@ -254273,9 +254274,9 @@ CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 -CVE-2024-38534,1,1,c0a0268eb6dc0ccabd16a59acf04374c40a300c5eca897f9450cd78d82214fc9,2024-07-11T15:15:12.350000 -CVE-2024-38535,1,1,6ea34674964ee49501737b630f33cbab30b45496e799b1ebf114cbef42452fc7,2024-07-11T15:15:12.557000 -CVE-2024-38536,1,1,af18ee3a446c1cff4b120893bccb919e889a9b5494030f0cf12a30dbf3274675,2024-07-11T15:15:12.760000 +CVE-2024-38534,0,0,c0a0268eb6dc0ccabd16a59acf04374c40a300c5eca897f9450cd78d82214fc9,2024-07-11T15:15:12.350000 +CVE-2024-38535,0,0,6ea34674964ee49501737b630f33cbab30b45496e799b1ebf114cbef42452fc7,2024-07-11T15:15:12.557000 +CVE-2024-38536,0,0,af18ee3a446c1cff4b120893bccb919e889a9b5494030f0cf12a30dbf3274675,2024-07-11T15:15:12.760000 CVE-2024-38537,0,0,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 @@ -254440,13 +254441,13 @@ CVE-2024-38950,0,0,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c999 CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000 CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000 -CVE-2024-38959,0,1,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 +CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 CVE-2024-38970,0,0,91e8208e5384541de7bb386d755fd4eb6bf4f61a3ae0e0940aabeee93bae88f6,2024-07-09T18:18:38.713000 CVE-2024-38971,0,0,dbcb37d6e160e35ce881158758f6ae2e24bc77c4d53fd897245319338a4ba293,2024-07-09T18:18:38.713000 -CVE-2024-38972,0,1,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000 -CVE-2024-38987,0,1,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000 +CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000 +CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000 CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 CVE-2024-38992,0,0,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000 @@ -254458,7 +254459,7 @@ CVE-2024-38998,0,0,9282cac0cc3c8cf49c21643b99000efeea36726d969c8a628d3f29607a285 CVE-2024-38999,0,0,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd240d,2024-07-09T16:22:46.603000 CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000 CVE-2024-39000,0,0,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000 -CVE-2024-39001,0,1,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84b9f,2024-07-11T15:06:05.870000 +CVE-2024-39001,0,0,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84b9f,2024-07-11T15:06:05.870000 CVE-2024-39002,0,0,f730aa8ef147d70b2879c78c6f1f0ff1f81c5a139e4c9775f359b7cb8ab78f63,2024-07-01T16:37:39.040000 CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000 CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000 @@ -254467,7 +254468,7 @@ CVE-2024-39014,0,0,85f2582cc6d7f5ddbf77aca86106a65d54d3111a3f65f930f3405599f2535 CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000 CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000 CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 -CVE-2024-39018,0,1,487d2d2021a1fc3e6565cf47ccad7b4f66c1ad362659f92eecb24e6b9790a4a5,2024-07-11T15:06:06.723000 +CVE-2024-39018,0,0,487d2d2021a1fc3e6565cf47ccad7b4f66c1ad362659f92eecb24e6b9790a4a5,2024-07-11T15:06:06.723000 CVE-2024-39019,0,0,49f6923e7308cc94a507864c15bf4235170455a2d5e0ce49f075b9ff7427c130,2024-07-09T16:22:48.323000 CVE-2024-39020,0,0,f3dad96d08cf85365c782d609ec6f6e7c042df2976c73457f6a2464976a50377,2024-07-09T16:22:49.137000 CVE-2024-39021,0,0,1738b6fec91bfd00d0237390d12ea763f1a28b36e28c39eec9a265e784512e4c,2024-07-09T17:15:48.083000 @@ -254483,14 +254484,14 @@ CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b7 CVE-2024-39063,0,0,c1e0ac7f9481d76fe7fdb16a6eaacaab5e66b9b0a0a18edcff2fd308e8920150,2024-07-11T13:06:13.187000 CVE-2024-39069,0,0,1b9a692823854c9e7b388ef3d138bfa20ebe2a96df75dd2813f998599aa58897,2024-07-11T13:05:54.930000 CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000 -CVE-2024-39071,0,1,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26f77,2024-07-11T15:06:07.560000 +CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26f77,2024-07-11T15:06:07.560000 CVE-2024-39072,0,0,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000 CVE-2024-3908,0,0,85d7a8c4b6c04a1bc64d61b9b16434d97a56cd08e916479d8cc7f65ce540b05b,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354ef,2024-06-04T19:20:26.763000 CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,6eeafc1e9950113810b3241de143f425fb712a6056a7d9427d70bea9bc4d702e,2024-07-09T18:18:38.713000 -CVE-2024-39119,0,1,335f0358240af17c362e55e8a97871d20387542a8ff60c6e91f13df6b4480ed8,2024-07-11T15:06:08.390000 +CVE-2024-39119,0,0,335f0358240af17c362e55e8a97871d20387542a8ff60c6e91f13df6b4480ed8,2024-07-11T15:06:08.390000 CVE-2024-3912,0,0,40b98d6972fd8b29682fb9d5c479312d61b03f7aa0ccbcb16e7844b5a5f893f3,2024-06-17T12:42:04.623000 CVE-2024-39129,0,0,9312806d832c51933c3038527273101f0daf3190355080fae05f2347855542dc,2024-06-28T10:27:00.920000 CVE-2024-39130,0,0,df5f818c69686396dd3eb68339897ebffa1b11bf7906d37001b874abe3136d64,2024-07-03T02:05:38.450000 @@ -254510,14 +254511,14 @@ CVE-2024-39158,0,0,cce9aef03924ed944acf28cea35a7f6e5bd4872826f71e46c93899a9929f6 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 -CVE-2024-39171,0,1,2bae745bd20a8a50108ac45e74e7c8f330bffee671eff97c857b1f66693cac29,2024-07-11T15:06:09.273000 +CVE-2024-39171,0,0,2bae745bd20a8a50108ac45e74e7c8f330bffee671eff97c857b1f66693cac29,2024-07-11T15:06:09.273000 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 -CVE-2024-39202,0,0,46931c5bd077676b75e1b50a276f5344591efd9210d3fc017968681e45dcdf25,2024-07-08T16:35:46.377000 +CVE-2024-39202,0,1,f670ff06733dd4c6d5c11488fabc4a1bb063378e53783f2f50ddc1a245b1d647,2024-07-11T16:13:13.487000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 CVE-2024-39206,0,0,ff238c7a799bd8156023ed396579b78ee6764c0b74ea4e700d568262004d102c,2024-07-08T14:18:50.487000 CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 @@ -254538,7 +254539,7 @@ CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2 CVE-2024-39248,0,0,7a563316fd3453bbdb2eea83c64c484bfa847d40ebdeede8de43d451f8cafde1,2024-07-05T12:55:51.367000 CVE-2024-39249,0,0,a8f23e36f9dec7b6dd0c3ed6214de893182dd9a10ec50f4f0f0e7c02e4cdf075,2024-07-09T06:15:01.913000 CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000 -CVE-2024-39251,0,1,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 +CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,b62a8fbb5cbf577eaf3c7a81b1c47c6d426f2a5dda5ebe7d2d0cc2ac17b12044,2024-05-22T12:46:53.887000 CVE-2024-39276,0,0,9d8b391f90466ab92d8bd0be64a929bc81937a2a7adc7e28ba18e29f385bdac0,2024-06-25T18:50:42.040000 @@ -254564,6 +254565,7 @@ CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99c CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000 CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000 +CVE-2024-39317,1,1,ad4688d527cfd6afabbaa73be73a3d50d9d4b8a3d5137cf1a177ce775a9a5d7f,2024-07-11T16:15:02.477000 CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 @@ -254571,7 +254573,7 @@ CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346 CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 -CVE-2024-39329,0,1,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a3903f,2024-07-11T15:06:11.477000 +CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a3903f,2024-07-11T15:06:11.477000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 @@ -254649,9 +254651,38 @@ CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401 CVE-2024-39514,0,0,6867df5f52f908f491ae646c1df8207b42c79f3d12187b6cec6f6552286fc92f,2024-07-11T13:05:54.930000 CVE-2024-39517,0,0,ed12fbdd5935917e9b7f1e56184a21b312ea157822adf531c0ee87bdb0d202c2,2024-07-11T13:05:54.930000 CVE-2024-39518,0,0,7f7ecf1dc91f43c4d2cd601e79a0cb63e34c06bbd9c6fdf0d6bfc073379626de,2024-07-11T13:05:54.930000 +CVE-2024-39519,1,1,26b2d9f0378fa12f8048ae2f148ac619fbaf42d4c8f13f207d2188a39f94babd,2024-07-11T16:15:02.717000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 +CVE-2024-39520,1,1,fc4fe4e7e13dd3ff8df3efe2be45c6941d0910eb14ea79a477ccbb545ced363a,2024-07-11T16:15:02.963000 +CVE-2024-39521,1,1,71232ff7e8d33933e71fd9a54908159f28910a122879b435c6b8a52747ff54cf,2024-07-11T16:15:03.210000 +CVE-2024-39522,1,1,a9687bdcceec34ac9aaa944dab08413ee77571f2aa04ef5e29f7cdf44b6d385f,2024-07-11T16:15:03.443000 +CVE-2024-39523,1,1,ef3a06c664f3c775ce6ce7394c095f37b5aca9a90333c4be74d45db57a3be049,2024-07-11T16:15:03.667000 +CVE-2024-39524,1,1,ea564ecb6dd1d9d8ab155ce5aa6b836de67128c9d0afafc5cecad2a60a259fa7,2024-07-11T16:15:03.890000 +CVE-2024-39528,1,1,0780d4c82f6fe85a1170c4f466c9424473def69abea95be31252a66d58dce144,2024-07-11T16:15:04.113000 +CVE-2024-39529,1,1,5cfd9ea3cb8f3bafd25d62a65e7d086bcecf39f3319a3d047c7b8be20539a2a7,2024-07-11T16:15:04.343000 +CVE-2024-39530,1,1,afa4811d1a8c6a481dec30c06f1ffc4a060604d179d75ad7c338f1b37c009278,2024-07-11T16:15:04.613000 +CVE-2024-39531,1,1,60b2413c68ef5747f00b4592356c2c4f886fd2e6a761cf53fd2c9abd7867a5e0,2024-07-11T17:15:10.150000 +CVE-2024-39532,1,1,3a896c30f57a401e8ffb021bce1ba853dfa854308ca63c422a384a58a1d37684,2024-07-11T17:15:10.403000 +CVE-2024-39533,1,1,6abdf90e0d57f2c1a3d41d35132b852645c45fcb2bc3245fe646929bcb440964,2024-07-11T17:15:10.650000 +CVE-2024-39535,1,1,7e9f8b61065d323cfb77435edf1815dd4516ed50d747800d2899cd00f4945dd5,2024-07-11T17:15:10.900000 +CVE-2024-39536,1,1,9cb0ecb6a9f53a77fe2e8476809240e051f203142b75739ff4072f3f45a25727,2024-07-11T17:15:11.190000 +CVE-2024-39537,1,1,1cf67cb1c3deea4c0fea2d2d1cd8a711507e5452b0462d30a9d6a654108728f8,2024-07-11T17:15:11.843000 +CVE-2024-39538,1,1,638447c955571920705f307e6877aefc76a73ee5407b722fbfb68d1cfda8c78e,2024-07-11T17:15:12.413000 +CVE-2024-39539,1,1,3a5fc9786195b3835949293ab29f585c9c8c3c1212271654ad02755571fb01c3,2024-07-11T17:15:12.633000 CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f43,2024-05-14T16:11:39.510000 +CVE-2024-39540,1,1,de0ae8fe2e8162a40094a65826955a86b4e52bbb042801c21e8aae8f69e73e72,2024-07-11T17:15:12.883000 +CVE-2024-39541,1,1,f615f389ce14bf8dac8d47f50f3b6307261ef978c1f498dde116570c2a76607e,2024-07-11T17:15:13.127000 +CVE-2024-39542,1,1,c98decd38ae3f6f72e7cc30543cfa53def1e25cff6d8a1e8c85c94608f2e50f6,2024-07-11T17:15:13.367000 +CVE-2024-39543,1,1,43f447faca116bb27197965375842e6b4e6869fda4028b3e3f6e61114353c35a,2024-07-11T17:15:13.583000 +CVE-2024-39545,1,1,310fba24df0caeaf9617cc77108148e44a9ce1a4cc48146d9bdc90e0afdd21b6,2024-07-11T17:15:13.823000 +CVE-2024-39546,1,1,3502683cf7343b8607918ea6ded1e01b2c7e7bc14fe46575e073ec0b3a0ec09a,2024-07-11T17:15:14.163000 +CVE-2024-39548,1,1,fdc8b36a74b4df7f93194e80beec5d6281ea26cb7548dfb549ca8643d23e3c57,2024-07-11T17:15:14.730000 +CVE-2024-39549,1,1,5340f8fdf91c19f63cd7b1f25396a2dd41063135a2d32a5e0cffbe66d3bfcdca,2024-07-11T17:15:15.433000 CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 +CVE-2024-39550,1,1,17129fc7305099fac5479553458077aaf070e6413d6d43463ce319de3587019a,2024-07-11T17:15:15.900000 +CVE-2024-39551,1,1,4f3a9511f3bfd32062805665bec9652d16c2a2f3df42f259e1f691c78783b065,2024-07-11T17:15:16.140000 +CVE-2024-39552,1,1,e9f46521f18989407d52bbc6cf0505d94192d59759e91ff03fe1055426942838,2024-07-11T17:15:16.370000 +CVE-2024-39553,1,1,0f75d9c64a26feaee059fe4d859a537ef169203b622b27cb789901f9bc946a12,2024-07-11T17:15:16.620000 CVE-2024-39554,0,0,607b6e2d09565242cea8dabcf216d7050a2b93324b4645878cad8b169c28c359,2024-07-11T13:05:54.930000 CVE-2024-39555,0,0,2f4320b551c6e22d863307bba36cd5d725d7060ed4b026ce642dd6f86bb7e040,2024-07-11T13:05:54.930000 CVE-2024-39556,0,0,647fdc524ccc7990194a12b5e61500593bd5f260b420aa3369c383e0ab67df27,2024-07-11T13:05:54.930000 @@ -254659,7 +254690,7 @@ CVE-2024-39557,0,0,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863 CVE-2024-39558,0,0,2c8234bb1e56f02b1dd69b6d7d1c452c66a728f5c6ba35ca2896bb6d30eada6e,2024-07-11T13:05:54.930000 CVE-2024-39559,0,0,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 -CVE-2024-39560,0,0,60f24b3402f82ce62c23f2b509a2c041517e26bdb7d49fcda0ce914e25587466,2024-07-11T13:05:54.930000 +CVE-2024-39560,0,1,b4ed92932e2d04f6c32524ca2b7ed5834cd6ea452116fcc1c65eefbeae3fbc2c,2024-07-11T17:15:16.867000 CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000 CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000 CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000 @@ -254709,7 +254740,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0bec,2024-06-17T12:42:04.623000 -CVE-2024-39723,0,1,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 +CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000 CVE-2024-39742,0,0,96ea1b8cccc8beabe35a1ae1bd29920440299002d9bdd07983b0f871a337ec60,2024-07-08T15:49:22.437000 CVE-2024-39743,0,0,20ff608aae9e81ed05e5df9fc95082741cc897036de0c408e1e444e17ba2e42f,2024-07-08T15:49:22.437000 @@ -254717,7 +254748,7 @@ CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 -CVE-2024-39828,0,1,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 +CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 @@ -254748,7 +254779,7 @@ CVE-2024-39881,0,0,adf0b4fcb696b07b94720317071702eedcd1fdaba37c9e2a964066676ba01 CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bceaf,2024-07-11T13:05:54.930000 CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000 CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000 -CVE-2024-39886,0,1,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000 +CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000 CVE-2024-39888,0,0,f7637ae0feee5d9d70653d284f2ffea6d3641a46c662eba72b67bcab442feb69,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 @@ -254760,6 +254791,8 @@ CVE-2024-39899,0,0,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-39900,0,0,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000 CVE-2024-39901,0,0,1d3e3b80615ba41835c485f10254821d67a955b0119b59f5c90d08afdfefd99d,2024-07-11T13:05:54.930000 +CVE-2024-39904,1,1,72722c4876473e4885e52c798d16ce984a78945b022ef2102788b81c163ba76e,2024-07-11T16:15:04.860000 +CVE-2024-39905,1,1,dc6c73ace9284c4fc0ed67f7981075d0a3946044ce4a1c8b269db7ff9672feed,2024-07-11T16:15:05.067000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 @@ -254783,10 +254816,10 @@ CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583f CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 CVE-2024-40034,0,0,4cf8988f789e771f9437deec1701e32aa0f490e66c431d68611599e17f7a3fda,2024-07-11T13:06:13.187000 -CVE-2024-40035,0,1,08afa9ac3de4546260e7d7e9807069bfe04d3f04c382ea1bbbe122e2cf535d36,2024-07-11T15:06:18.003000 -CVE-2024-40036,0,1,6571820d2e1a1dc301c44df53b57ff0785351c2dfcb2d72964621db254f59f05,2024-07-11T15:06:18.893000 +CVE-2024-40035,0,0,08afa9ac3de4546260e7d7e9807069bfe04d3f04c382ea1bbbe122e2cf535d36,2024-07-11T15:06:18.003000 +CVE-2024-40036,0,0,6571820d2e1a1dc301c44df53b57ff0785351c2dfcb2d72964621db254f59f05,2024-07-11T15:06:18.893000 CVE-2024-40037,0,0,5b8f3102a79caae73d78a17fd7828e0eef05bb7293789c0b49fe9eb0d327e242,2024-07-11T13:06:13.187000 -CVE-2024-40038,0,1,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000 +CVE-2024-40038,0,0,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000 CVE-2024-40039,0,0,5fe22166e82da251f322629ecfd29e5ec1ca0efd0c75b10b572505aa3450e595,2024-07-11T13:06:13.187000 CVE-2024-4005,0,0,db2b7e4cfe0f4bbe30f1cbadd95b4d8d4dea02eb8785d8f487b316678c44068d,2024-06-17T12:42:04.623000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 @@ -254809,14 +254842,14 @@ CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f10 CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4032,0,0,52c6b9eccf7e021076c0ce344d44b2f19b27dbd5716fada0f5ba921e591652d5,2024-06-20T12:44:22.977000 -CVE-2024-40328,0,1,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000 +CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000 CVE-2024-40329,0,0,41a26c01ffafb441378d739e427645a780e000487130d0d08f992cdf38346dd3,2024-07-11T13:05:54.930000 CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000 CVE-2024-40331,0,0,bfb06d8fdc6b8050e721142c9677bd6207d960362f2abfc1c2513136b9a0c674,2024-07-11T13:05:54.930000 CVE-2024-40332,0,0,2e3f95a9a025aa6ffb4896b255ee7c825d63bc3b4c97904f258ca3134e6768a8,2024-07-11T13:05:54.930000 -CVE-2024-40333,0,1,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e7fd,2024-07-11T15:06:21.320000 +CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e7fd,2024-07-11T15:06:21.320000 CVE-2024-40334,0,0,0f6416c66a2f7a24655624e914eca89a0566237a51d1e09767a4a1fc38d9e48f,2024-07-11T13:05:54.930000 -CVE-2024-40336,0,1,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 +CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000 CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000 CVE-2024-4036,0,0,a384819513ae72390ab82c2a7b5ea2fdbb1087d8a7f4dfd460e817b5f8f6a48f,2024-05-02T18:00:37.360000 @@ -254862,25 +254895,25 @@ CVE-2024-4069,0,0,f8d2f2628e60be749b9734b09218105a0396eae1a8a4c94b50114640615c82 CVE-2024-4070,0,0,611b2353a344eebf4d3d821b72a7661978c51598fabebbafad7cb3b8eb92ba73,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,1e5173381da62898dd2d89e779aa47e534c3be7a31fd5b5ef289e0ef19550704,2024-05-17T02:40:14.747000 CVE-2024-4072,0,0,784007d6b97ec8386adb736eb517146413a15dc1e1dcfd437022813999836276,2024-05-17T02:40:14.847000 -CVE-2024-40726,0,1,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000 -CVE-2024-40727,0,1,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000 +CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000 +CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000 CVE-2024-40728,0,0,d97174880a17752231869c0d95676d772e9b6b0c723f3642cbcef679b7e80f73,2024-07-11T02:59:17.007000 CVE-2024-40729,0,0,ab9a5f69d2218c381a3d8eb0951f2534776cc72de1841bef50510a4cdbfd408e,2024-07-11T02:59:25.527000 CVE-2024-4073,0,0,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000 -CVE-2024-40730,0,1,1cc14fb59c6f7d6e2445fb5fa075eb77949d56b0440370270ca4661f8666658c,2024-07-11T15:06:24.660000 -CVE-2024-40731,0,1,02c409bee09a11ef6564d0a63d02e90c06f87384bd64c832db96f277238b93c4,2024-07-11T15:06:25.460000 +CVE-2024-40730,0,0,1cc14fb59c6f7d6e2445fb5fa075eb77949d56b0440370270ca4661f8666658c,2024-07-11T15:06:24.660000 +CVE-2024-40731,0,0,02c409bee09a11ef6564d0a63d02e90c06f87384bd64c832db96f277238b93c4,2024-07-11T15:06:25.460000 CVE-2024-40732,0,0,aaac9956c124a2027f493d570ac5f5afb108a8f4e40df7a87b1b5a06d59072c2,2024-07-11T02:57:54.827000 CVE-2024-40733,0,0,1d1ef568d0570292be66c38cd2ec06c0c84643812e8670e45581c98f79f3b349,2024-07-11T02:58:05.973000 -CVE-2024-40734,0,1,ae67754d2aa8ab2bb99bd190fad26bf8602a907bf15e5ce8d99620aba36af08f,2024-07-11T15:06:26.257000 -CVE-2024-40735,0,1,c0e8abbd2165e486ea716f6888f141faa83a5857bfe2e1f37bee6a172e0666c7,2024-07-11T15:06:27.070000 -CVE-2024-40736,0,1,f1b462fba073bceb74e6eb24d562b30eda97cf61ccc374bf8b6f02058019995f,2024-07-11T15:06:27.890000 +CVE-2024-40734,0,0,ae67754d2aa8ab2bb99bd190fad26bf8602a907bf15e5ce8d99620aba36af08f,2024-07-11T15:06:26.257000 +CVE-2024-40735,0,0,c0e8abbd2165e486ea716f6888f141faa83a5857bfe2e1f37bee6a172e0666c7,2024-07-11T15:06:27.070000 +CVE-2024-40736,0,0,f1b462fba073bceb74e6eb24d562b30eda97cf61ccc374bf8b6f02058019995f,2024-07-11T15:06:27.890000 CVE-2024-40737,0,0,5c25c9eed7ed75db9fdc73701f207d2b594740be8aaddbb777a3a080641bcac9,2024-07-11T02:56:03.807000 CVE-2024-40738,0,0,258771ceb39ad9b08ba5b176b0c2d1e36f1197008ad4f753eaeb7b39c3a5688e,2024-07-11T02:57:13.407000 -CVE-2024-40739,0,1,4b2f3d973ba2f00f373d83ccd1e53a9697f5a21e12783d6291446f254a7898b9,2024-07-11T15:06:28.767000 +CVE-2024-40739,0,0,4b2f3d973ba2f00f373d83ccd1e53a9697f5a21e12783d6291446f254a7898b9,2024-07-11T15:06:28.767000 CVE-2024-4074,0,0,0eb3d84ea134f52e33abc34cb068e49511715452b56aeac28482d1d153123edb,2024-05-17T02:40:15.077000 CVE-2024-40740,0,0,ee2ab6b2d7e1edae21ac57ec7c719455baac814ba7f21c1ea74f0831ad78d95d,2024-07-11T02:54:42.557000 CVE-2024-40741,0,0,ddd0ff9476ed1ff47a6c6ea90383139e3fceeb76685fa77b077d9f9786ebe979,2024-07-11T02:54:30.653000 -CVE-2024-40742,0,1,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 +CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-4075,0,0,61cfb92eb2dc2fb6e0ff8370e47bd10bfd7f8ca1c4517b0742f92f6865b710f5,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000 @@ -256039,7 +256072,7 @@ CVE-2024-5482,0,0,deb4cff32cf3f87f89ff2e26ffd7a2390ad03b8acd8adef3ed5769f2b5cc7a CVE-2024-5483,0,0,50ef873fd9ba2b134eb7743380749d7bf41a18a6183eddc44371799e9b77b44b,2024-06-11T17:19:17.143000 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 -CVE-2024-5488,0,1,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 +CVE-2024-5488,0,0,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,9bb79263edce390c6997c8d9f9fe7d295077e49147dbdcc1c480d08892e3d2f5,2024-06-11T18:15:01.617000 CVE-2024-5491,0,0,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 CVE-2024-5492,0,0,ef9d60420cc278300dad8633c6d5a4d9cec47839ae67a5efd349eac4679c005a,2024-07-11T13:05:54.930000 @@ -256165,7 +256198,7 @@ CVE-2024-5676,0,0,7110ec4f1d7a030c3f52d0d64b45a1f2c788bd0c12290f7487a0ece147b332 CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 CVE-2024-5679,0,0,1b9c56cba527d158192215e0e30fd1c10c228f839f81c2546d99ba6401c926c5,2024-07-11T13:05:54.930000 CVE-2024-5680,0,0,3ebe734c1513dc7f890bbd2e7aa8b63fd3b360493fbd000759fe3ddff9cc4ed7,2024-07-11T13:05:54.930000 -CVE-2024-5681,0,1,e75aad538cc247dd1e5bde981cd563107711f3dbf3f4d2d7b927f1a9751e70a6,2024-07-11T15:06:31.987000 +CVE-2024-5681,0,0,e75aad538cc247dd1e5bde981cd563107711f3dbf3f4d2d7b927f1a9751e70a6,2024-07-11T15:06:31.987000 CVE-2024-5683,0,0,416fdce68077ec4a3eabb7881f93e8b3f956fda57e2d7ec858b12f0a2abb9f15,2024-06-24T12:57:36.513000 CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000 @@ -256188,7 +256221,7 @@ CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8 CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000 CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 -CVE-2024-5711,0,1,53a6821510c2996abe324dcc88905d46757c2bc5f945db408170acaa09c6e226,2024-07-11T14:54:55.473000 +CVE-2024-5711,0,0,53a6821510c2996abe324dcc88905d46757c2bc5f945db408170acaa09c6e226,2024-07-11T14:54:55.473000 CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 @@ -256374,7 +256407,7 @@ CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f146442 CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000 CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000 CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000 -CVE-2024-6026,0,1,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33 +CVE-2024-6026,0,0,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33 CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a53cebc0801a7944b049693d6e4ba090f6ff8943c9a085ad6c29614624cd6988,2024-06-25T12:24:17.873000 CVE-2024-6035,0,0,e543f789bc9a4f00266b9e998e7231d01391f3bf16f7fb9d950923c693c3bd18,2024-07-11T13:05:54.930000 @@ -256441,7 +256474,7 @@ CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000 -CVE-2024-6138,0,1,d6a8df748ee6f04e5f8cc58d52d8b857edad2d6fe2bef6f2b8d4fc2bc8976899,2024-07-11T15:06:33.753000 +CVE-2024-6138,0,0,d6a8df748ee6f04e5f8cc58d52d8b857edad2d6fe2bef6f2b8d4fc2bc8976899,2024-07-11T15:06:33.753000 CVE-2024-6139,0,0,5267393f199f3e6d04675c179e30c182dfe9af96089cf21d4ca0eef7a0895473,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,23f480e47c156f1dad9ad13e0d7590969d38d5491fbe00b3021017412ace7767,2024-06-20T12:44:01.637000 CVE-2024-6143,0,0,8ecb1606cf08b70c452136729986c382308670f8f5aa74c9caba844228d971e4,2024-06-20T12:44:01.637000 @@ -256500,8 +256533,8 @@ CVE-2024-6218,0,0,080145c08c5ffaf1b0f4fe61601c30772836ccbea26d111bc22bd57681c581 CVE-2024-6222,0,0,7d8ad82668d6d98e0f167e915dde6d9fa8875b44590f66f2e873d05e89e24789,2024-07-09T18:18:38.713000 CVE-2024-6225,0,0,05da1495d7d116987721ea4d8dad783669e833db8afd42c6e9b9d7b36358250e,2024-06-24T19:21:28.450000 CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000 -CVE-2024-6229,0,1,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000 -CVE-2024-6235,0,1,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 +CVE-2024-6229,0,0,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000 +CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 CVE-2024-6236,0,0,294d07111f47e2594afccb77d041edde3630ac9799928242bfa797180655c347,2024-07-11T13:05:54.930000 CVE-2024-6237,0,0,8eb889363f8a87d3bb3f430f1da56ccf68ff66b11eeffce13455da0850e4107b,2024-07-09T18:18:38.713000 CVE-2024-6238,0,0,01bce4fcd5bf21099e3fa29fb7e34bf0d2a461d152d0ae3d9b913c1fb46d1451,2024-06-25T18:50:42.040000 @@ -256533,7 +256566,7 @@ CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c577 CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 CVE-2024-6284,0,0,73ccbe59cd13df171bbc79ab6b910254c728a7cb44133bad73b07b9d4dc26d5e,2024-07-05T12:55:51.367000 CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000 -CVE-2024-6286,0,1,4253fb96346a1918be0a28cd65e6b1adc5e77be00b8a52085fa48d544178b784,2024-07-11T15:06:34.997000 +CVE-2024-6286,0,0,4253fb96346a1918be0a28cd65e6b1adc5e77be00b8a52085fa48d544178b784,2024-07-11T15:06:34.997000 CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000 CVE-2024-6288,0,0,759e3147da1b3805ee22c246688b7816f816dcaacd990c0e2025b974262129c2,2024-06-28T10:27:00.920000 CVE-2024-6290,0,0,f38106d9e1179e3770e59e6eaa72c9e7b486c800903b3806d0d60fbc8ab354e0,2024-07-03T02:09:49.960000 @@ -256588,7 +256621,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 CVE-2024-6385,0,0,5cd1b1d2bb2619e597fdfbc12061290bedb1abf1843381c16b40d3e31cd024b8,2024-07-11T13:05:54.930000 -CVE-2024-6387,0,1,21a708d4237bba73c76a0db3992083b64f6c9fe22ac2d7f0724e5d5e887a9393,2024-07-11T14:15:13.510000 +CVE-2024-6387,0,0,21a708d4237bba73c76a0db3992083b64f6c9fe22ac2d7f0724e5d5e887a9393,2024-07-11T14:15:13.510000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000 CVE-2024-6397,0,0,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000 @@ -256627,6 +256660,8 @@ CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356c CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000 +CVE-2024-6484,1,1,6666e26ea5eb8b79855d3d6c4f37c89d70d855c7a4f7e17689c4720e026704bf,2024-07-11T17:15:17.007000 +CVE-2024-6485,1,1,2d201e0f9c4f27ca842d20c26e2ef893a675a8d8571d4c08fc3636f65ee340ef,2024-07-11T17:15:17.240000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 @@ -256640,7 +256675,7 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,eadd6f4f4be8f81226626302b00f66ebfbebf71ded08e8d23278bcc971f84701,2024-07-11T13:05:54.930000 -CVE-2024-6539,0,1,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 +CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 @@ -256650,17 +256685,17 @@ CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000 CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000 CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000 -CVE-2024-6602,0,1,1ef3df5ba86c27dd15c49400b2f4a17f816f649f117c8ab236de74cf67b3b8f0,2024-07-11T15:06:37.333000 +CVE-2024-6602,0,0,1ef3df5ba86c27dd15c49400b2f4a17f816f649f117c8ab236de74cf67b3b8f0,2024-07-11T15:06:37.333000 CVE-2024-6603,0,0,4ecaf7f985dbded3472c683f2c65d1c14d2799a2b7dcf2b2a55860d4c957784c,2024-07-09T18:19:14.047000 CVE-2024-6604,0,0,ded876613061a5ca60e02a968a482333e8188e2340c41c58460e50b9c735c643,2024-07-09T18:18:38.713000 CVE-2024-6605,0,0,daaffd6e1eb7775c366bd3629df32e5ec237220285a28f594449800d239e72c3,2024-07-09T18:18:38.713000 -CVE-2024-6606,0,1,e062605e0b65fb108ca5179cfc9bc0d29f18b47cdd61167b51f9b33faf0c6789,2024-07-11T15:06:37.647000 +CVE-2024-6606,0,0,e062605e0b65fb108ca5179cfc9bc0d29f18b47cdd61167b51f9b33faf0c6789,2024-07-11T15:06:37.647000 CVE-2024-6607,0,0,4125d39d31df77d668fb24ccf5c1ced11947df2c4ba369deba85906910908188,2024-07-09T18:18:38.713000 CVE-2024-6608,0,0,e0b85615d2e08968fb3ea9bcf0763d4f346f2fd1f6fb5d15c9d79ca0c6f143f3,2024-07-09T18:18:38.713000 CVE-2024-6609,0,0,f532a8285aec61f63bc1d215d0415fae1421a37936276e9ad08f4683700f018b,2024-07-09T18:18:38.713000 CVE-2024-6610,0,0,1c24792ae39b605f1be07c5e2e3836fd3d6fa372741ef0758f0367b32c7ef3f4,2024-07-09T18:18:38.713000 -CVE-2024-6611,0,1,2cf8a2ea6e923d1d49b7dbacc811bd766042d08c643188eb0443531f06b279d0,2024-07-11T15:06:37.977000 -CVE-2024-6612,0,1,ec773de601f2439d4a30794cb33ecbe4d766cb102d1b031aeb7c612ae57eb7d9,2024-07-11T15:06:38.870000 +CVE-2024-6611,0,0,2cf8a2ea6e923d1d49b7dbacc811bd766042d08c643188eb0443531f06b279d0,2024-07-11T15:06:37.977000 +CVE-2024-6612,0,0,ec773de601f2439d4a30794cb33ecbe4d766cb102d1b031aeb7c612ae57eb7d9,2024-07-11T15:06:38.870000 CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c0a,2024-07-09T18:18:38.713000 CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000 CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000 @@ -256680,4 +256715,6 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 CVE-2024-6666,0,0,6ba5e83c4c8007c7f2945dcbaee49cd53299747e7c829220281020263e99c21e,2024-07-11T13:05:54.930000 CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 -CVE-2024-6679,1,1,1a0cc66d963eba4d715626120647d5b84d7eab4652a03e0f0d6e90fdaa8df382,2024-07-11T15:15:13.273000 +CVE-2024-6679,0,0,1a0cc66d963eba4d715626120647d5b84d7eab4652a03e0f0d6e90fdaa8df382,2024-07-11T15:15:13.273000 +CVE-2024-6680,1,1,fd22165b0b46fd084f55f7f52f86774ee145e8cd480e29f2cd55751a03ba72e9,2024-07-11T16:15:05.320000 +CVE-2024-6681,1,1,b9a4099b394900e56920de381b4fdf67c8c2b0db2b8b0b86131af6aed090bf20,2024-07-11T17:15:17.467000