diff --git a/CVE-2018/CVE-2018-106xx/CVE-2018-10631.json b/CVE-2018/CVE-2018-106xx/CVE-2018-10631.json index b08e28ed964..ae3c4ad0ebe 100644 --- a/CVE-2018/CVE-2018-106xx/CVE-2018-10631.json +++ b/CVE-2018/CVE-2018-106xx/CVE-2018-10631.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10631", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2018-07-13T19:29:00.213", - "lastModified": "2019-10-09T23:32:57.680", + "lastModified": "2024-08-19T19:35:00.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -84,6 +106,16 @@ "value": "CWE-693" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-206xx/CVE-2019-20634.json b/CVE-2019/CVE-2019-206xx/CVE-2019-20634.json index ad7a308dcfe..f12e1da33e8 100644 --- a/CVE-2019/CVE-2019-206xx/CVE-2019-20634.json +++ b/CVE-2019/CVE-2019-206xx/CVE-2019-20634.json @@ -2,8 +2,8 @@ "id": "CVE-2019-20634", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-30T21:15:12.373", - "lastModified": "2022-04-27T16:40:35.440", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T18:15:09.837", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47584.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47584.json index fff669d6921..ffe96ab2cc9 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47584.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47584.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47584", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:52.947", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:35:20.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iocost: corrige la divisi\u00f3n por cero en la donaci\u00f3n de un grupo c de bajo peso. La l\u00f3gica de c\u00e1lculo de la donaci\u00f3n supone que el donante tiene un peso posterior a la donaci\u00f3n distinto de cero, por lo que el peso activo m\u00e1s bajo es una donaci\u00f3n. cgroup puede tener 2 para poder donar 1 y conservar el otro para s\u00ed mismo. Anteriormente, solo don\u00e1bamos de grupos comunitarios con excedentes considerables, por lo que esta condici\u00f3n siempre fue cierta. Sin embargo, con el algoritmo de donaci\u00f3n preciso implementado, f1de2439ec43 (\"blk-iocost: renovar la determinaci\u00f3n del monto de la donaci\u00f3n\") hizo que el c\u00e1lculo del monto de la donaci\u00f3n fuera exacto, permitiendo que incluso los grupos de bajo peso donaran. Esto significa que, en raras ocasiones, un grupo con un peso activo de 1 puede ingresar al c\u00e1lculo de la donaci\u00f3n, lo que genera la siguiente advertencia y luego una divisi\u00f3n por cero. ADVERTENCIA: CPU: 4 PID: 0 en block/blk-iocost.c:1928 transfer_surpluses.cold+0x0/0x53 [884/94867] ... RIP: 0010:transfer_surpluses.cold+0x0/0x53 C\u00f3digo: 92 y siguientes 48 c7 c7 28 d1 ab b5 65 48 8b 34 25 00 ae 01 00 48 81 c6 90 06 00 00 e8 8b 3f fe ff 48 c7 c0 ea ff ff ff e9 95 ff 92 ff <0f> 0b 48 c7 c7 30 da ab b5 e8 71 3f fe ff 4c 89 e8 4d 85 ed 74 0 4 ... Seguimiento de llamadas: ioc_timer_fn+0x1043/0x1390 call_timer_fn+0xa1/0x2c0 __run_timers.part.0+0x1ec/0x2e0 run_timer_softirq+0x35/0x70 ... iocg : pesos de donaci\u00f3n no v\u00e1lidos en /a/b: activo=1 donaci\u00f3n=1 despu\u00e9s=0 Corr\u00edjalo excluyendo cgroups con hweight activo < 2 de la donaci\u00f3n. Excluir estas donaciones de peso extremadamente bajo no deber\u00eda afectar la conservaci\u00f3n del trabajo de ninguna manera significativa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "EB4181F8-6C8B-4641-A13A-D558F76ABA69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3a1a4eb574178c21241a6200f4785572e661c472", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7c80674538f15f85d68138240aae440b8039519", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/edaa26334c117a584add6053f48d63a988d25a6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47585.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47585.json index dea4f2318b3..cb5e9ede7cc 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47585.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47585.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47585", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:53.057", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:29:03.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: corrige la p\u00e9rdida de memoria en __add_inode_ref() La l\u00ednea 1169 (#3) asigna un fragmento de memoria para victim_name mediante kmalloc(), pero cuando la funci\u00f3n regresa en la l\u00ednea 1184 (#4) victim_name asignado por la l\u00ednea 1169 (#3) no se libera, lo que provocar\u00e1 una p\u00e9rdida de memoria. Hay un fragmento de c\u00f3digo similar en esta funci\u00f3n para asignar un fragmento de memoria para victim_name en la l\u00ednea 1104 (n.\u00ba 1), as\u00ed como para liberar la memoria en la l\u00ednea 1116 (n.\u00ba 2). Deber\u00edamos kfree() victim_name cuando el valor de retorno de backref_in_log() sea menor que cero y antes de que la funci\u00f3n regrese en la l\u00ednea 1184 (#4). 1057 static inline int __add_inode_ref(struct btrfs_trans_handle *trans, 1058 struct btrfs_root *root, 1059 struct btrfs_path *path, 1060 struct btrfs_root *log_root, 1061 struct btrfs_inode *dir, 1062 struct btrfs_inode *inode, 63 u64 inode_objectid, u64 parent_objectid, 1064 u64 ref_index, char *nombre, int nombrelen, 1065 int *search_done) 1066 { 1104 nombre_v\u00edctima = kmalloc(nombre_v\u00edctima_len, GFP_NOFS); // #1: kmalloc (nombre_v\u00edctima-1) 1105 if (!nombre_v\u00edctima) 1106 return -ENOMEM; 1112 ret = backref_in_log(log_root, &search_key, 1113 parent_objectid, victim_name, 1114 victim_name_len); 1115 if (ret < 0) { 1116 kfree(nombre_v\u00edctima); // #2: kfree (nombre_v\u00edctima-1) 1117 return ret; 1118 } else if (!ret) { 1169 nombre_v\u00edctima = kmalloc(nombre_v\u00edctima_len, GFP_NOFS); // #3: kmalloc (nombre_v\u00edctima-2) 1170 if (!nombre_v\u00edctima) 1171 return -ENOMEM; 1180 ret = backref_in_log(log_root, &search_key, 1181 parent_objectid, victim_name, 1182 victim_name_len); 1183 si (ret < 0) { 1184 retorno ret; // #4: falta kfree (nombre_v\u00edctima-2) 1185 } else if (!ret) { 1241 return 0; 1242 }" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "A657B2D0-5B9D-42BE-A3BF-228DBC1B057C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/005d9292b5b2e71a009f911bd85d755009b37242", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/493ff661d434d6bdf02e3a21adae04d7a0b4265d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f35838a6930296fc1988764cfa54cb3f705c0665", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47596.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47596.json index 1bf7ca97426..026286eeeba 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47596.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47596.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47596", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:54.197", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:22:13.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: hns3: corrige el error de use-after-free en hclgevf_send_mbx_msg Actualmente, la funci\u00f3n hns3_remove desinstala primero la instancia del cliente y luego desinstala el dispositivo del motor de aceleraci\u00f3n. El dispositivo de red se libera en el proceso de desinstalaci\u00f3n de la instancia del cliente, pero el proceso de desinstalaci\u00f3n del dispositivo del motor de aceleraci\u00f3n a\u00fan lo utiliza para rastrear la informaci\u00f3n del tiempo de ejecuci\u00f3n. Esto provoca un problema de use-after-free. Entonces lo soluciona verificando el estado del registro de la instancia para evitar use after free." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "B4DD5FED-5CAF-4693-B5A1-1624BA9DBF0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/12512bc8f25b8ba9795dfbae0e9ca57ff13fd542", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27cbf64a766e86f068ce6214f04c00ceb4db1af4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f4a353f6fe033807cd026a5de81c67469ff19b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47597.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47597.json index 9c9c0175eb6..38224222af3 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47597.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47597.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47597", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:54.290", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:15:30.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: inet_diag: corrige la fuga de informaci\u00f3n del kernel para sockets UDP KMSAN inform\u00f3 una fuga de informaci\u00f3n del kernel [1], que puede ser explotada por usuarios sin privilegios. Despu\u00e9s del an\u00e1lisis result\u00f3 que UDP no estaba inicializando r->idiag_expires. Otros usuarios de inet_sk_diag_fill() podr\u00edan cometer el mismo error en el futuro, as\u00ed que solucione este problema en inet_sk_diag_fill(). [1] ERROR: KMSAN: kernel-infoleak en instrument_copy_to_user include/linux/instrumented.h:121 [en l\u00ednea] ERROR: KMSAN: kernel-infoleak en copia lib/iov_iter.c:156 [en l\u00ednea] ERROR: KMSAN: kernel-infoleak en _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670 instrument_copy_to_user include/linux/instrumented.h:121 [en l\u00ednea] copia lib/iov_iter.c:156 [en l\u00ednea] _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670 copy_to_iter include/linux/uio.h:155 [en l\u00ednea] simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519 __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram .c:533 skb_copy_datagram_msg include/linux/skbuff.h:3657 [en l\u00ednea] netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974 sock_recvmsg_nosec net/socket.c:944 [en l\u00ednea] sock_recvmsg net/socket.c:962 [en l\u00ednea] sock_read_iter+0x5a9/0x630 net/socket.c:1035 call_read_iter include/linux/fs.h:2156 [en l\u00ednea] new_sync_read fs/read_write.c:400 [en l\u00ednea] vfs_read+0x1631/0x1980 fs/read_write.c: 481 ksys_read+0x28c/0x520 fs/read_write.c:619 __do_sys_read fs/read_write.c:629 [en l\u00ednea] __se_sys_read fs/read_write.c:627 [en l\u00ednea] __x64_sys_read+0xdb/0x120 fs/read_write.c:627 _arco x64/ x86/entry/common.c:51 [en l\u00ednea] do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 Entry_SYSCALL_64_after_hwframe+0x44/0xae Uninit se cre\u00f3 en: slab_post_alloc_hook mm/slab.h:524 [en l\u00ednea] slab_alloc_node mm/slub.c:3251 [en l\u00ednea] __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974 kmalloc_reserve net/core/skbuff.c:354 [en l\u00ednea] __alloc_skb+0x545/0xf90 net/core/skbuff.c:426 alloc_skb include/linux/skbuff.h:1126 [en l\u00ednea] netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245 __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370 netlink_dump_start include/linux/netlink.h:254 [en l\u00ednea] inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343 sock_diag_rcv_msg+0x24a/0x620 netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276 netlink_unicast_kernel net/netlink/af_netlink.c: 1319 [en l\u00ednea] netlink_unicast+0x1095/0x1360 netLink/af_netlink.c: 1345 netlink_sendmsg+0x16f3/0x1870 net/netlink/af_etlink.c: 1916 sockm. C: 704 [ en l\u00ednea] sock_sendmsg net/socket.c:724 [en l\u00ednea] sock_write_iter+0x594/0x690 net/socket.c:1057 do_iter_readv_writev+0xa7f/0xc70 do_iter_write+0x52c/0x1500 fs/read_write.c:851 vfs_writev fs/read_write.c:9 24 [en l\u00ednea] do_writev+0x63f/0xe30 fs/read_write.c:967 __do_sys_writev fs/read_write.c:1040 [en l\u00ednea] __se_sys_writev fs/read_write.c:1037 [en l\u00ednea] __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037 _syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 Entry_SYSCALL_64_after_hwframe+0x44/0xae Los bytes 68-71 de 312 no est\u00e1n inicializados El acceso a la memoria de tama\u00f1o 312 comienza en ffff88812ab54000 Datos copiados a la direcci\u00f3n de usuario 0000000020001440 CPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "5.4.168", + "matchCriteriaId": "1339B5DB-EBC4-468A-9D4A-0B34B4FA69D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "A657B2D0-5B9D-42BE-A3BF-228DBC1B057C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3a4f6dba1eb98101abc012ef968a8b10dac1ce50", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71ddeac8cd1d217744a0e060ff520e147c9328d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7b5596e531253ce84213d9daa7120b71c9d83198", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5d28205bf1de7082d904ed277ceb2db2879e302", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-250xx/CVE-2022-25037.json b/CVE-2022/CVE-2022-250xx/CVE-2022-25037.json index 6dd485de9ba..b1623cfdfa2 100644 --- a/CVE-2022/CVE-2022-250xx/CVE-2022-25037.json +++ b/CVE-2022/CVE-2022-250xx/CVE-2022-25037.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25037", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T16:15:09.133", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-08-19T19:35:02.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que un problema en wanEditor v4.7.11 y solucionado en v.4.7.12 y v.5 conten\u00eda una vulnerabilidad de cross-site scripting (XSS) a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mdxjj/5cf0a31e8abf24ed688ceb5b3543516d", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json index 3184da39c21..a9a36ea0001 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48578", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.600", - "lastModified": "2024-06-12T18:07:41.117", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T19:35:03.153", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json index 209ac7ca89d..e9d93f9023a 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24062", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.317", - "lastModified": "2024-08-08T18:55:19.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:05:06.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,96 @@ "value": "Diebold Nixdorf Vynamic Security Suite (VSS) anterior a 3.3.0 SR12, 4.0.0 SR04, 4.1.0 SR02 y 4.2.0 SR01 no puede validar la estructura de directorios del sistema de archivos ra\u00edz durante el proceso de autorizaci\u00f3n previa al inicio (PBA) . Esto puede ser aprovechado por un atacante f\u00edsico que pueda manipular el contenido del disco duro del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.0sr12", + "matchCriteriaId": "4B70F9BC-14EC-4E38-A079-63506F242F63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.0sr04", + "matchCriteriaId": "A45FE84B-35D3-4E42-942B-89EB84466C8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.0sr02", + "matchCriteriaId": "08A010AB-89B3-462F-B526-FDB06D2E8BC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.0sr01", + "matchCriteriaId": "37787D11-00BE-4351-8587-D2D02F52E769" + } + ] + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24063.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24063.json index c890d79ff6a..af5af1aebcb 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24063.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24063.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24063", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.410", - "lastModified": "2024-08-08T18:55:19.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:04:47.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Diebold Nixdorf Vynamic Security Suite (VSS) anterior a 3.3.0 SR10 no puede validar /etc/mtab durante el proceso Pre-Boot Authorization (PBA). Esto puede ser aprovechado por un atacante f\u00edsico que pueda manipular el contenido del disco duro del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.0sr10", + "matchCriteriaId": "18EE18C7-3DB8-4564-8BD2-5B58C956A2B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24064.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24064.json index 60baf0587d3..f9b062a409f 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24064.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24064.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24064", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.467", - "lastModified": "2024-08-09T16:35:00.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:04:26.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.0sr4", + "matchCriteriaId": "51E20FBA-6F78-4AB1-8B2F-5234A32D5B0E" + } + ] + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28865.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28865.json index 896743eca7d..f1a96cb683e 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28865.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28865.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28865", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.533", - "lastModified": "2024-08-08T20:35:00.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:04:14.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.0sr15", + "matchCriteriaId": "2A0DCAA7-1178-4647-B2D0-4CCC6C12C843" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.0sr05", + "matchCriteriaId": "06F82886-CFE8-45C2-8438-2ECEF1EBB323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.0sr03", + "matchCriteriaId": "CE37B991-7D9E-4E50-9162-FF0A9843B7F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.0sr02", + "matchCriteriaId": "78335240-1A2E-43F0-89ED-EA2ACB89B926" + } + ] + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29881.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29881.json index 1a332320278..e41c3f82541 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29881.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29881.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29881", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T12:55:53.443", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-19T19:35:04.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "phpok 6.4.003 es vulnerable a la inyecci\u00f3n SQL en la funci\u00f3n index_f() en phpok64/framework/api/call_control.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Northind/97522a49ae4bb0c8e6e2a49e75fd637a", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33206.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33206.json index 4f87ce66b9d..c12272985a9 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33206.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33206", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.597", - "lastModified": "2024-08-10T16:35:00.407", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:04:03.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.0sr16", + "matchCriteriaId": "374241F8-B3F7-4B25-8C43-42FA7307BE69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.0sr06", + "matchCriteriaId": "4B855A5E-4381-4313-A414-18085BAE4A90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.0sr04", + "matchCriteriaId": "A2F041A0-1166-4A02-BAD5-FF323E9A9C5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.0sr03", + "matchCriteriaId": "2E631831-139E-445D-AA4B-6BA7D9980BC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.0sr01", + "matchCriteriaId": "62407A0F-9945-41F4-B5E6-7734E82D4003" + } + ] + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json index 2e13dfc079b..546763e0424 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38944", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T00:15:52.143", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-08-19T18:35:01.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el firmware v12.03.01.09_pt de Multilaser RE160V y el firmware v12.03.01.10_pt de Multilaser RE163V permite a los atacantes eludir el control de acceso y obtener acceso completo a la aplicaci\u00f3n modificando un encabezado HTTP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2024/Mar/0", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40261.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40261.json index 02e424fd808..5ceec6117d3 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40261.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40261", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.670", - "lastModified": "2024-08-14T16:15:10.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:03:54.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,79 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.0sr17", + "matchCriteriaId": "4BB62AA5-698E-4A11-8D41-81A38702DE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.0sr07", + "matchCriteriaId": "198EF035-8590-40CD-8774-9D5BC56CE7A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.0sr04", + "matchCriteriaId": "A2F041A0-1166-4A02-BAD5-FF323E9A9C5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.0sr04", + "matchCriteriaId": "4A1A5451-12A6-43B6-AC93-CE7CAF6EA0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.0sr03", + "matchCriteriaId": "B3A8B1DB-3957-490B-A9D3-A3F22570629F" + } + ] + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46048.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46048.json index d72ecb34116..3433f08a842 100644 --- a/CVE-2023/CVE-2023-460xx/CVE-2023-46048.json +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46048", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T05:15:47.560", - "lastModified": "2024-08-02T21:15:49.117", + "lastModified": "2024-08-19T19:35:04.860", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Tex Live 944e257 tiene una desreferencia de puntero NULL en texk/web2c/pdftexdir/writet1.c. NOTA: esto est\u00e1 en disputa porque deber\u00eda categorizarse como un problema de usabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/65", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48644.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48644.json index 925864c4320..a74c9c1272d 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48644.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48644.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48644", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T23:15:07.260", - "lastModified": "2024-03-06T15:18:08.093", + "lastModified": "2024-08-19T18:35:03.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en la aplicaci\u00f3n Archibus 4.0.3 para iOS. Existe una vulnerabilidad XSS en la funci\u00f3n de creaci\u00f3n de solicitud de trabajo del m\u00f3dulo de mantenimiento, a trav\u00e9s del campo de descripci\u00f3n. Esto permite a un atacante realizar una acci\u00f3n en nombre del usuario, extraer datos, etc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-48644", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json index 9930c021f7a..0ad4f02b56a 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49970", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.350", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-19T18:35:05.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Customer Support System v1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de asunto en /customer_support/ajax.php?action=save_ticket." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49970", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20789.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20789.json index c3b07f7f98d..0c1b0555f82 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20789.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20789", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:17.263", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:59:05.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.11", + "matchCriteriaId": "F7075D52-19B9-473A-9D2F-E1C4618DE4DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20790.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20790.json index e23eec2990a..87b2b2627bf 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20790.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20790", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:17.580", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:58:42.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.11", + "matchCriteriaId": "F7075D52-19B9-473A-9D2F-E1C4618DE4DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22219.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22219.json index f53f82c92a1..20b8e8b65b1 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22219.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22219.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22219", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T18:15:19.290", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-19T18:35:06.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de entidad externa XML (XXE) en Terminalfour 8.0.0001 a 8.3.18 y versiones XML JDBC hasta 1.0.4 permite a usuarios autenticados enviar XML malicioso a trav\u00e9s de funciones no especificadas que podr\u00edan conducir a diversas acciones, como acceder al servidor subyacente, c\u00f3digo remoto ejecuci\u00f3n (RCE) o realizar ataques de Server-Side Request Forgery (SSRF)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://docs.terminalfour.com/articles/release-notes-highlights/", diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json index 3d1b048c3ca..c4980c6944f 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23443", "sourceIdentifier": "bressers@elastic.co", "published": "2024-06-19T14:15:13.360", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:33:31.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "bressers@elastic.co", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "bressers@elastic.co", "type": "Secondary", @@ -51,10 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.17.22", + "matchCriteriaId": "798CA4B3-9E66-406D-9C0D-57DF5F77FDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.14.0", + "matchCriteriaId": "3F1EDB3A-548A-4F37-BE27-47D23FF88908" + } + ] + } + ] + } + ], "references": [ { "url": "https://discuss.elastic.co/t/kibana-8-14-0-7-17-22-security-update-esa-2024-11/361460", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23729.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23729.json new file mode 100644 index 00000000000..eceef25067c --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23729.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-23729", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-19T19:15:07.867", + "lastModified": "2024-08-19T19:26:46.993", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ColorOS Internet Browser com.heytap.browser application 45.10.3.4.1 for Android allows a remote attacker to execute arbitrary JavaScript code via the com.android.browser.RealBrowserActivity component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/com.heytap.browser", + "source": "cve@mitre.org" + }, + { + "url": "https://play.google.com/store/apps/details?id=com.heytap.browser", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25157.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25157.json index b4a43747595..cd1b037e33d 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25157.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25157.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25157", "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-08-14T15:15:18.023", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:57:58.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + }, { "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6.0", + "matchCriteriaId": "473E0873-F26C-4E9A-B58A-CF853E6F07DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.fortra.com/security/advisories/product-security/fi-2024-009", - "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json index 8491acf8c42..70525d2bf33 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28672", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.247", - "lastModified": "2024-03-13T18:15:58.530", + "lastModified": "2024-08-19T19:35:05.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/media_edit.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/3.md", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29012.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29012.json index 96164677a5a..deb89e09c06 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29012.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29012", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-06-20T09:15:11.347", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:34:59.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en el servidor HTTP de SonicOS permite que un atacante remoto autenticado provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n sscanf." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { - "source": "PSIRT@sonicwall.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "PSIRT@sonicwall.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,10 +61,157 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.0.1-5161", + "matchCriteriaId": "BE881F9C-CE9E-4D1B-92BA-D28B2B16178A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.1", + "versionEndExcluding": "7.1.1-7058", + "matchCriteriaId": "FFC449BE-1EA7-42B9-BB33-4FF14A78D2B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.2", + "versionEndExcluding": "7.1.2-7019", + "matchCriteriaId": "A859C784-32BA-43BC-97BC-120047A67EEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0008", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29013.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29013.json index f60fd6d293a..755db1ad8c5 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29013.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29013", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-06-20T09:15:11.543", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:21:08.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en mont\u00f3n en SonicOS SSL-VPN permite que un atacante remoto autenticado provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n memcpy." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { - "source": "PSIRT@sonicwall.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "PSIRT@sonicwall.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,10 +61,157 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.0.1-5161", + "matchCriteriaId": "BE881F9C-CE9E-4D1B-92BA-D28B2B16178A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.1", + "versionEndExcluding": "7.1.1-7058", + "matchCriteriaId": "FFC449BE-1EA7-42B9-BB33-4FF14A78D2B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.2", + "versionEndExcluding": "7.1.2-7019", + "matchCriteriaId": "A859C784-32BA-43BC-97BC-120047A67EEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0009", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29421.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29421.json index c492ece2c26..947af242153 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29421.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29421.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29421", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T18:15:09.937", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-08-19T18:35:07.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "xmedcon 0.23.0 y corregido en v.0.24.0 es vulnerable a Buffer Overflow a trav\u00e9s de libs/dicom/basic.c, lo que permite a un atacante ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30171.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30171.json index c6fc2fa5835..4370c0937fc 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30171.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30171.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30171", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:21:52.690", - "lastModified": "2024-06-14T13:15:51.603", + "lastModified": "2024-08-19T18:35:08.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en la API TLS Java de Bouncy Castle y en el proveedor JSSE anterior a la versi\u00f3n 1.78. Es posible que se produzcan fugas basadas en el tiempo en los protocolos de enlace basados en RSA debido al procesamiento de excepciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9030171", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32611.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32611.json index 2cabd00754c..85509dd5241 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32611.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32611.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32611", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.153", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-19T18:35:09.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 puede usar un valor no inicializado en H5A__attr_release_table en H5Aint.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32927.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32927.json index e80c392ac26..ab3fb69e411 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32927.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32927.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32927", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-08-19T17:15:07.493", - "lastModified": "2024-08-19T17:15:07.493", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In sendDeviceState_1_6 of RadioExt.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-08-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32928.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32928.json index 689a9026184..6add24ac252 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32928.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32928", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-08-19T17:15:07.557", - "lastModified": "2024-08-19T17:15:07.557", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34117.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34117.json index e0e88d9327b..f2224c7f149 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34117.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34117", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:18.420", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:57:27.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.2", + "versionEndExcluding": "24.7.4", + "matchCriteriaId": "2BB90BD5-CB50-4337-A388-BB94B72BE30F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "25.0", + "versionEndExcluding": "25.11", + "matchCriteriaId": "575ACC03-B515-4296-A980-35EA6324A71F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/photoshop/apsb24-49.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34124.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34124.json index 1de733b753d..12351ee11a2 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34124.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34124", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:18.910", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:56:27.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.11", + "matchCriteriaId": "F7075D52-19B9-473A-9D2F-E1C4618DE4DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34125.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34125.json index e77bfcaad14..5d16fd8381d 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34125.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34125.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34125", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.163", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:56:17.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.11", + "matchCriteriaId": "F7075D52-19B9-473A-9D2F-E1C4618DE4DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34126.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34126.json index b769c7ab2d4..ae0a150a32e 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34126.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34126.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34126", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:19.397", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:55:47.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,10 +36,40 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.11", + "matchCriteriaId": "F7075D52-19B9-473A-9D2F-E1C4618DE4DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34905.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34905.json index e9bb400a037..1a2d8af577a 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34905.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34905.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34905", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-16T15:15:47.887", - "lastModified": "2024-05-23T21:03:49.143", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T18:35:11.410", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json index a05e1744834..7186a76d6b0 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35373", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T21:15:59.720", - "lastModified": "2024-05-28T12:39:42.673", + "lastModified": "2024-08-19T18:35:12.200", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Mocodo Mocodo Online 4.2.6 y versiones anteriores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de /web/rewrite.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/mocodo-vulnerabilities/", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36054.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36054.json index 3c6cba0f12d..922592e16d6 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36054.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36054.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36054", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-26T23:15:21.370", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-08-19T19:35:07.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Hw64.sys en Marvin Test HW.exe anterior a 5.0.5.0 permite que procesos en modo de usuario sin privilegios lean arbitrariamente la memoria del kernel (y en consecuencia obtengan todos los privilegios) a trav\u00e9s de IOCTL 0x9c4064b8 (a trav\u00e9s de MmMapIoSpace) e IOCTL 0x9c406490 (a trav\u00e9s de ZwMapViewOfSection)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.marvintest.com/Downloads.aspx?prodId=12&search=package", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json index fca935555fb..fba02bbc081 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36684", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.680", - "lastModified": "2024-08-01T13:53:13.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:51:09.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:pk_customlinks:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "B3BF3E7C-5A5C-46EC-B6C9-C629BF9725C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/18/pk_customlinks.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36978.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36978.json index 04d205467b0..1f6e5293188 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36978.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36978", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T07:15:46.437", - "lastModified": "2024-07-05T08:15:03.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:31:13.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: sch_multiq: corrige posible escritura OOB en multiq_tune() q->bands se asignar\u00e1n a qopt->bands para ejecutar la l\u00f3gica de c\u00f3digo posterior despu\u00e9s de kmalloc. Por lo tanto, las antiguas q->bands no deber\u00edan usarse en kmalloc. De lo contrario, se producir\u00e1 una escritura fuera de los l\u00edmites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.279", + "matchCriteriaId": "1A920648-B954-4FF9-B516-2BAFC2674086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.221", + "matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.95", + "matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.35", + "matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.6", + "matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f208fad86631e005754606c3ec80c0d44a11882", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52b1aa07cda6a199cd6754d3798c7759023bc70f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54c2c171c11a798fe887b3ff72922aa9d1411c1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/598572c64287aee0b75bbba4e2881496878860f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/affc18fdc694190ca7575b9a86632a73b9fe043d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6fb5110e8722bc00748f22caeb650fe4672f129", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37099.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37099.json index bc7bf7770e4..f77dd14667b 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37099.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37099", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T17:15:07.700", - "lastModified": "2024-08-19T17:15:07.700", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39371.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39371.json index 3671eb58c30..a41e44e2211 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39371.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39371.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39371", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.410", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:40:41.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,113 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring: comprueba si hay un puntero de archivo que no sea NULL en io_file_can_poll(). En kernels anteriores, era posible activar una desreferencia del puntero NULL fuera de la ruta de preparaci\u00f3n asincr\u00f3nica forzada, si no se hab\u00eda creado ning\u00fan archivo. asignado. El rastro que conduce a esto tiene el siguiente aspecto: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000b0 PGD 0 P4D 0 Ups: 0000 [#1] CPU SMP PREEMPT: 67 PID: 1633 Comm: buf-ring-invali Not tainted 6.8.0 -rc3+ #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS desconocido 2/2/2022 RIP: 0010:io_buffer_select+0xc3/0x210 C\u00f3digo: 00 00 48 39 d1 0f 82 ae 00 00 00 48 81 4b 48 00 00 01 00 48 89 73 70 0f b7 50 0c 66 89 53 42 85 ed 0f 85 d2 00 00 00 48 8b 13 <48> 8b 92 b0 00 00 00 48 83 7a 40 00 84 21 01 00 00 4c 8b 20 5b RSP: 0018:ffffb7bec38c7d88 EFLAGS: 00010246 RAX: ffff97af2be61000 RBX: ffff97af234f1700 RCX: 00000000000000040 RDX: 0000000000000000 RSI: 97aecfb04820 RDI: ffff97af234f1700 RBP: 0000000000000000 R08: 0000000000200030 R09: 0000000000000020 R10: ffffb7bec38c7dc8 R11: 000000000000 c000 R12: ffffb7bec38c7db8 R13: ffff97aecfb05800 R14 : ffff97aecfb05800 R15: ffff97af2be5e000 FS: 00007f852f74b740(0000) GS:ffff97b1eeec0000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000b0 CR3: 000000016deab005 CR4: 0000000000370ef0 Seguimiento de llamadas: ? __die+0x1f/0x60 ? page_fault_oops+0x14d/0x420? do_user_addr_fault+0x61/0x6a0? exc_page_fault+0x6c/0x150? asm_exc_page_fault+0x22/0x30? io_buffer_select+0xc3/0x210 __io_import_iovec+0xb5/0x120 io_readv_prep_async+0x36/0x70 io_queue_sqe_fallback+0x20/0x260 io_submit_sqes+0x314/0x630 __do_sys_io_uring_enter+0x33 9/0xbc0 ? __do_sys_io_uring_register+0x11b/0xc50? vm_mmap_pgoff+0xce/0x160 do_syscall_64+0x5f/0x180 Entry_SYSCALL_64_after_hwframe+0x46/0x4e RIP: 0033:0x55e0a110a67e C\u00f3digo: ba cc 00 00 00 45 31 c0 44 0f b6 92 d0 0 00 00 31 d2 41 b9 08 00 00 00 41 83 e2 01 41 c1 e2 04 41 09 c2 b8 aa 01 00 00 0f 05 90 89 30 eb a9 0f 1f 40 00 48 8b 42 20 8b 00 a8 06 75 af 85 f6 porque la solicitud est\u00e1 marcada como ASYNC forzado y tiene un archivo incorrecto fd y, por lo tanto, toma la ruta de preparaci\u00f3n asincr\u00f3nica forzada. Los kernels actuales con la preparaci\u00f3n as\u00edncrona de solicitud limpia ya no pueden solucionar este problema, pero para facilitar la compatibilidad, agreguemos esta verificaci\u00f3n de seguridad aqu\u00ed tambi\u00e9n, ya que realmente no hace da\u00f1o. En ambos casos, esto inevitablemente terminar\u00e1 con un CQE publicado con -EBADF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.95", + "matchCriteriaId": "E0A7F60D-A7BB-486D-9C47-C6BD16DE5AC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.35", + "matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/43cfac7b88adedfb26c27834386992650f1642f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5fc16fa5f13b3c06fdb959ef262050bd810416a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65561b4c1c9e01443cb76387eb36a9109e7048ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2844d5e58576c55d8e8d4a9f74902d3f7be8044", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39386.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39386.json index 8cdf94cea30..717ee2cb2c5 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39386.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39386.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39386", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.000", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:53:49.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.9", + "matchCriteriaId": "4550B81F-3B0A-4862-BF98-572FE642C063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.0", + "versionEndExcluding": "14.1.2", + "matchCriteriaId": "D5F292EF-BC9A-4F7E-9F5B-5A404C32A63C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/bridge/apsb24-59.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39387.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39387.json index 638de7b1296..74f6a7f9678 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39387.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39387", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:22.233", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:53:28.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -51,10 +61,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.9", + "matchCriteriaId": "4550B81F-3B0A-4862-BF98-572FE642C063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.0", + "versionEndExcluding": "14.1.2", + "matchCriteriaId": "D5F292EF-BC9A-4F7E-9F5B-5A404C32A63C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/bridge/apsb24-59.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41164.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41164.json index 06f26a257ac..77e1f9a51e1 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41164.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41164.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41164", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:27.093", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:39:06.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "f5sirt@f5.com", "type": "Secondary", @@ -84,6 +104,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + }, { "source": "f5sirt@f5.com", "type": "Secondary", @@ -95,10 +125,438 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "37E3F8BF-CF06-45ED-B30C-EC5FEDEC1515" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "1A235DA1-7C50-49A5-A874-7FA00EA8B7D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "F8BAF117-D67E-4A1E-9CED-F49289C2B7C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "2B8910E0-3AC4-4FEE-8BA0-8E592F546B4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "AC7E0E85-B0A1-47F2-9BD0-C97D112C9DF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "F7C5BCA9-39A7-446F-8B61-F69C704DDBEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1769D69A-CB59-46B1-89B3-FB97DC6DEB9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "3EAFF56F-8070-4617-A5DD-BA55AC2EFE93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "AF371739-2974-49F4-95BE-109ED6007A9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "59203EBF-C52A-45A1-B8DF-00E17E3EFB51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "76FD103B-5FE3-46D7-A00D-CD092A0407D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "87E768C7-28EC-4999-8822-C8CE7EEE2270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5C698C1C-A3DD-46E2-B05A-12F2604E7F85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "BE9FBA0B-2B92-468D-A990-EF4F5183F506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "E9697B71-CD20-42EF-8E6C-8C11FC84BE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "87670A74-34FE-45DF-A725-25B804C845B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "B6F06042-9552-4395-A9DA-078ABE6B0247" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "3BB3D3AA-00B7-4F3A-9B02-7467A8559325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "67DB21AE-DF53-442D-B492-C4ED9A20B105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "785D1ED9-6073-4780-A48B-412A8F838219" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "95C55C3E-D185-4E65-9F32-AD11BC2018B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6003DFC-FB4C-4870-BB52-B0823767281D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "98D5B208-8EC0-4FFA-B9AA-B2FCC649AED5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "A6C8A4F0-FECB-42DE-88F7-D647CE10BF16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7BC1D037-74D2-4F92-89AD-C90F6CBF440B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "EB1B9FE6-2839-44D4-A092-7C3748C9D4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "DA8A9AAB-A316-4C4C-9BB5-DAF4951E5FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7A54BB61-6885-4F73-B7AA-4CDCFEA3FCAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "49F35EAE-6998-41A5-AA7B-EDCF958FA926" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "4739D2EA-CA4B-4E42-842F-733DA88AF183" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7B235A78-649B-46C5-B24B-AB485A884654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "E79AF4D5-2188-4059-B9A0-AFACD8D191A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "A72B6A1F-492B-48D7-8F90-717CFAE9E0A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "84D00768-E71B-4FF7-A7BF-F2C8CFBC900D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "018055B1-C2D8-4F63-883B-952E9E9DD434" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "841D943B-F60B-4755-941A-79F8D9B54E25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3F28D083-19BE-4584-A61A-85DD3CDC66BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "84561BE2-7368-44D5-9175-A458590D19A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "6AF9FDCB-A975-4A4E-8F58-C1E830E6836D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ABBD10E8-6054-408F-9687-B9BF6375CA09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "57815520-E17B-42FA-B213-0CE90E657AA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "14043026-1D70-46F9-BBA7-93460ACCB76A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "83794B04-87E2-4CA9-81F5-BB820D0F5395" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "CD587AF0-4D51-41C8-9F2B-1E66439A7249" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "8C260295-74F2-402C-B25E-3EDADF221A29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0A6E7035-3299-474F-8F67-945EA9A059D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "0409FB75-2AAD-4E06-8C47-E70EFA1F7DD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "AD9977B4-1808-4706-A98A-6BDF124773B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "D7147DD9-C334-4BD1-A229-C510F1DB0C06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.7.0", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "75C7966C-470A-4B54-8113-D3EACCF464C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "604710F9-7A47-4F93-AA14-985678733ED1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "A0286214-6B81-45FB-8113-B5A9A1B4BEC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "667EB77B-DA13-4BA4-9371-EE3F3A109F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "2E3EB2F4-3D19-4154-A381-99C18A5CD6D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "6BB5AAB5-64A1-4956-9255-09E0C999CC1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C446827A-1F71-4FAD-9422-580642D26AD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "C96B6834-CB0D-446C-BEF9-C3B42B2BC823" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "055A386F-ACAF-48A9-AB18-277270CF7A1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3D1B2000-C3FE-4B4C-885A-A5076EB164E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.1.0", + "versionEndIncluding": "15.1.1", + "matchCriteriaId": "30AAE065-0480-44EE-9A76-93D45AA0D4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.1.5", + "matchCriteriaId": "BEE85927-DBCF-418D-AFE7-2633917FD26B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8AB23AE6-245E-43D6-B832-933F8259F937" + } + ] + } + ] + } + ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000138477", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41719.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41719.json index f7913776083..2deff83b878 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41719.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41719", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:27.343", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:40:35.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "f5sirt@f5.com", "type": "Secondary", @@ -84,6 +104,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "f5sirt@f5.com", "type": "Secondary", @@ -95,10 +125,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:big-ip_next_central_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.1.0", + "versionEndExcluding": "20.2.1", + "matchCriteriaId": "275E22C9-F66B-45BA-960C-257D49FA0221" + } + ] + } + ] + } + ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000140006", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41840.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41840.json index 57db5b9a0ea..f46a4597ca6 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41840.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41840.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41840", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.453", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:54:02.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.9", + "matchCriteriaId": "4550B81F-3B0A-4862-BF98-572FE642C063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.0", + "versionEndExcluding": "14.1.2", + "matchCriteriaId": "D5F292EF-BC9A-4F7E-9F5B-5A404C32A63C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/bridge/apsb24-59.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41850.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41850.json index 99480ab50dc..a7b40fedec2 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41850.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41850.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41850", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.667", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:41:14.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.5", + "matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41851.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41851.json index 7ea3ecef9ab..6b77169587e 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41851.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41851", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:29.917", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:41:29.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.5", + "matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41852.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41852.json index a6359685c8b..bf139b63972 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41852.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41852", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.160", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:42:01.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.5", + "matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41853.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41853.json index f330798eb25..33a6b07374e 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41853.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41853", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.380", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:42:21.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.5", + "matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41854.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41854.json index be199fa6a8c..c5acaf210a2 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41854.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41854.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41854", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.613", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:43:34.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.5", + "matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41856.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41856.json index 004ce3fab46..76ff30a2fc3 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41856.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41856", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:30.833", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:54:40.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "27.0", + "versionEndExcluding": "27.9.5", + "matchCriteriaId": "693A2D61-DBC9-44D7-BA72-0DF97BDC9661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.6", + "matchCriteriaId": "0CAA6BF3-38F6-4E33-9D80-66CE521775AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-45.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41865.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41865.json index 89bc1058075..652daaa5abe 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41865.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41865", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:31.227", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:44:04.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.11", + "matchCriteriaId": "F7075D52-19B9-473A-9D2F-E1C4618DE4DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dimension/apsb24-47.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41866.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41866.json index f8c8e6ea69f..08bf3243403 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41866.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41866", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T15:15:31.460", - "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:44:22.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.5", + "matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-56.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42282.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42282.json index d24c1396658..eb42ef0bce5 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42282.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42282", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.090", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T19:53:45.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mediatek: corrige la posible desreferencia del puntero NULL en el manejo del net_device ficticio. Mueva la liberaci\u00f3n del net_device ficticio de mtk_free_dev() a mtk_remove(). Anteriormente, si alloc_netdev_dummy() fallaba en mtk_probe(), eth->dummy_dev ser\u00eda NULL. La ruta de error luego llamar\u00eda a mtk_free_dev(), que a su vez llamar\u00eda a free_netdev() suponiendo que dummy_dev estuviera asignado (pero no lo estaba), causando potencialmente una desreferencia del puntero NULL. Al mover free_netdev() a mtk_remove(), nos aseguramos de que solo se llame cuando mtk_probe() haya tenido \u00e9xito y dummy_dev est\u00e9 completamente asignado. Esto soluciona una posible desreferencia de puntero NULL detectada por Smatch[1]." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16f3a28cf5f876a7f3550d8f4c870a7b41bcfaef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af6bd5c9901b13a26eaf4d57d97a813297791596", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42283.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42283.json index 84d1bed72dc..c20b2af3cea 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42283.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42283", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.163", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T19:54:33.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: nexthop: inicializa todos los campos en la estructura nexthops volcada. nexthop_grp contiene dos campos reservados que no son inicializados por nla_put_nh_group() y transporta basura. Esto se puede observar, por ejemplo, con strace (editado para mayor claridad): # ip nexthop add id 1 dev lo # ip nexthop add id 101 group 1 # strace -e recvmsg ip nexthop get id 101 ... recvmsg(... [{nla_len =12, nla_type=NHA_GROUP}, [{id=1, peso=0, resvd1=0x69, resvd2=0x67}]] ...) = 52 Los campos est\u00e1n reservados y, por lo tanto, no se utilizan actualmente. Pero tal como est\u00e1n, pierden memoria del n\u00facleo, y el hecho de que no sean simplemente cero complica la reutilizaci\u00f3n de los campos para nuevos fines. Inicialice la estructura completa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "02035E8E-6E63-424F-B9C8-AA3CA88D499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1377de719652d868f5317ba8398b7e74c5f0430b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cc4d71dda2dd4f1520f40e634a527022e48ccd8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d745cd0e9720282cd291d36b9db528aea18add2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7704460acd7f5d35eb07c52500987dc9b95313fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e8f558a3afe99ce51a642ce0d3637ddc2b5d5d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a13d3864b76ac87085ec530b2ff8e37482a63a96", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd06cb4a5fc7bda3dea31712618a62af72a1c6cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42284.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42284.json index b950b023df6..4fa456020c4 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42284.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42284.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42284", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.233", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T19:47:55.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: Devuelve un valor distinto de cero desde tipc_udp_addr2str() en caso de error tipc_udp_addr2str() deber\u00eda devolver un valor distinto de cero si la direcci\u00f3n de medios UDP no es v\u00e1lida. De lo contrario, puede ocurrir un acceso de desbordamiento del b\u00fafer en tipc_media_addr_printf(). Solucione este problema devolviendo 1 en una direcci\u00f3n de medios UDP no v\u00e1lida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "85CB8233-C8F9-4CE9-B044-72B6989F6312" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/253405541be2f15ffebdeac2f4cf4b7e9144d12f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2abe350db1aa599eeebc6892237d0bce0f1de62a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5eea127675450583680c8170358bcba43227bd69", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/728734352743a78b4c5a7285b282127696a4a813", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76ddf84a52f0d8ec3f5db6ccce08faf202a17d28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ec3335dd89c8d169e9650e4bac64fde71fdf15b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa38bf74899de07cf70b50cd17f8ad45fb6654c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa96c6baef1b5385e2f0c0677b32b3839e716076", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42285.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42285.json index 98ca0b5ae31..6d74f4bd3b7 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42285.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42285.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42285", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.300", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T19:45:41.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/iwcm: corrige un use-after-free relacionado con la destrucci\u00f3n de ID de CM iw_conn_req_handler() asocia una nueva estructura rdma_id_private (conn_id) con una estructura iw_cm_id (cm_id) existente de la siguiente manera: conn_id->cm_id.iw = cm_id; cm_id->context = conn_id; cm_id->cm_handler = cma_iw_handler; rdma_destroy_id() libera tanto cm_id como struct rdma_id_private. Aseg\u00farese de que cm_work_handler() no active un use-after-free liberando solo la estructura rdma_id_private despu\u00e9s de que todo el trabajo pendiente haya finalizado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "931B85D9-2A7D-4BFF-97EF-D4E9CBD7E552" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/557d035fe88d78dd51664f4dc0e1896c04c97cf6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f25f296fc9bd0435be14e89bf657cd615a23574", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/94ee7ff99b87435ec63211f632918dc7f44dac79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aee2424246f9f1dadc33faa78990c1e2eb7826e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d91d253c87fd1efece521ff2612078a35af673c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc8074b8901caabb97c2d353abd6b4e7fa5a59a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee39384ee787e86e9db4efb843818ef0ea9cb8ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff5bbbdee08287d75d72e65b72a2b76d9637892a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42294.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42294.json index 9390a3b9a55..189e8fedc47 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42294.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42294.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42294", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.947", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T19:43:22.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloquear: soluciona el punto muerto entre sd_remove y sd_release Nuestra prueba informa la siguiente tarea colgada: [ 2538.459400] INFO: task \"kworker/0:0\":7 blocked for more than 188 seconds. [ 2538.459427] Call trace: [ 2538.459430] __switch_to+0x174/0x338 [ 2538.459436] __schedule+0x628/0x9c4 [ 2538.459442] schedule+0x7c/0xe8 [ 2538.459447] schedule_preempt_disabled+0x24/0x40 [ 2538.459453] __mutex_lock+0x3ec/0xf04 [ 2538.459456] __mutex_lock_slowpath+0x14/0x24 [ 2538.459459] mutex_lock+0x30/0xd8 [ 2538.459462] del_gendisk+0xdc/0x350 [ 2538.459466] sd_remove+0x30/0x60 [ 2538.459470] device_release_driver_internal+0x1c4/0x2c4 [ 2538.459474] device_release_driver+0x18/0x28 [ 2538.459478] bus_remove_device+0x15c/0x174 [ 2538.459483] device_del+0x1d0/0x358 [ 2538.459488] __scsi_remove_device+0xa8/0x198 [ 2538.459493] scsi_forget_host+0x50/0x70 [ 2538.459497] scsi_remove_host+0x80/0x180 [ 2538.459502] usb_stor_disconnect+0x68/0xf4 [ 2538.459506] usb_unbind_interface+0xd4/0x280 [ 2538.459510] device_release_driver_internal+0x1c4/0x2c4 [ 2538.459514] device_release_driver+0x18/0x28 [ 2538.459518] bus_remove_device+0x15c/0x174 [ 2538.459523] device_del+0x1d0/0x358 [ 2538.459528] usb_disable_device+0x84/0x194 [ 2538.459532] usb_disconnect+0xec/0x300 [ 2538.459537] hub_event+0xb80/0x1870 [ 2538.459541] process_scheduled_works+0x248/0x4dc [ 2538.459545] worker_thread+0x244/0x334 [ 2538.459549] kthread+0x114/0x1bc [ 2538.461001] INFO: task \"fsck.\":15415 blocked for more than 188 seconds. [ 2538.461014] Call trace: [ 2538.461016] __switch_to+0x174/0x338 [ 2538.461021] __schedule+0x628/0x9c4 [ 2538.461025] schedule+0x7c/0xe8 [ 2538.461030] blk_queue_enter+0xc4/0x160 [ 2538.461034] blk_mq_alloc_request+0x120/0x1d4 [ 2538.461037] scsi_execute_cmd+0x7c/0x23c [ 2538.461040] ioctl_internal_command+0x5c/0x164 [ 2538.461046] scsi_set_medium_removal+0x5c/0xb0 [ 2538.461051] sd_release+0x50/0x94 [ 2538.461054] blkdev_put+0x190/0x28c [ 2538.461058] blkdev_release+0x28/0x40 [ 2538.461063] __fput+0xf8/0x2a8 [ 2538.461066] __fput_sync+0x28/0x5c [ 2538.461070] __arm64_sys_close+0x84/0xe8 [ 2538.461073] invoke_syscall+0x58/0x114 [ 2538.461078] el0_svc_common+0xac/0xe0 [ 2538.461082] do_el0_svc+0x1c/0x28 [ 2538.461087] el0_svc+0x38/0x68 [ 2538.461090] el0t_64_sync_handler+0x68/0xbc [ 2538.461093] el0t_64_sync+0x1a8/0x1ac T1: T2: sd_remove del_gendisk __blk_mark_disk_dead blk_freeze_queue_start ++q->mq_freeze_depth bdev_release mutex_lock(&disk->open_mutex) sd_release scsi_execute_cmd blk_queue_enter wait_event(!q->mq_freeze_depth) mutex_lock(&disk->open_mutex) SCSI no configura GD_OWNS_QUEUE, por lo que QUEUE_FLAG_DYING no est\u00e1 configurado en este escenario. Este es un cl\u00e1sico punto muerto de ABBA. Para solucionar el punto muerto, aseg\u00farese de no intentar adquirir disco->open_mutex despu\u00e9s de congelar la cola." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "9C43C45E-798F-4F27-A7BF-764CEB4C1BC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a5625a83eac91fdff1d5f0202ecfc45a31983c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e04da2dc7013af50ed3a2beb698d5168d1e594b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5418f48a93b69ed9e6a2281eee06b412f14a544", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42353.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42353.json index f59dff0fcdc..ff2fad91110 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42353.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42353.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42353", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-14T21:15:17.073", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:44:59.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pylonsproject:webob:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.8", + "matchCriteriaId": "7C7C7DB3-3268-4761-83C0-8A0C03A4451D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Pylons/webob/commit/f689bcf4f0a1f64f1735b1d5069aef5be6974b5b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Pylons/webob/security/advisories/GHSA-mg3v-6m49-jhp3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json index 6100e167873..67a53c507fc 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42633.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42633", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T16:15:08.740", - "lastModified": "2024-08-19T16:15:08.740", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json index 501ca445b36..513aa6be39e 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42639.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42639", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T18:15:10.067", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-19T18:35:13.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que H3C GR1100-P v100R009 utiliza una contrase\u00f1a codificada en /etc/shadow, que permite a los atacantes iniciar sesi\u00f3n como superusuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://palm-vertebra-fe9.notion.site/H3C-GR1100-PV100R009-was-discovered-to-contain-a-hardcoded-824141daa44f4c52a914860c6e4a7684", diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json index 4df4e953441..3d070505ca6 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42657", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T17:15:07.967", - "lastModified": "2024-08-19T17:15:07.967", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42658.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42658.json index e06df0b7f6f..fcd983436c9 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42658.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42658", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T17:15:08.027", - "lastModified": "2024-08-19T17:15:08.027", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookie's parameter" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/sudo-subho/CVE-2024-42658", diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json index 587a5c5a63e..b1c04bf6a63 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42681", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:18.303", - "lastModified": "2024-08-19T15:59:00.500", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T19:35:08.437", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42758.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42758.json index 8967e5c56aa..d7954743d77 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42758.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42758.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42758", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T18:15:10.400", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-19T18:35:14.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) en la versi\u00f3n v2024-01-05 del complemento indexmenu cuando se usa y habilita en Dokuwiki (motor Wiki de c\u00f3digo abierto). Un atacante malicioso puede ingresar payload XSS, por ejemplo, al crear o editar una p\u00e1gina existente, para activar el XSS en Dokuwiki, que luego se almacena en un archivo .txt (debido a la naturaleza de c\u00f3mo est\u00e1 manipulado Dokuwiki), que presenta el XSS almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/1s1ldur/CVE-2024-42758/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json index e3c7d1797a7..24b9b6048cf 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42843", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:18.400", - "lastModified": "2024-08-19T15:58:03.563", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T19:35:09.180", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json index 5e6f97b974c..800705e8f30 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42966", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:20.130", - "lastModified": "2024-08-16T13:35:28.477", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-19T19:35:09.913", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43005.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43005.json index 11a7017c39a..c7b65694d01 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43005.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43005.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43005", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T20:15:13.253", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-19T18:35:14.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) reflejado en el componente dl_liuyan_save.php de ZZCMS v2023 permite a los atacantes ejecutar c\u00f3digo arbitrario en el contexto del navegador de un usuario mediante la inyecci\u00f3n de un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://zzcms.net", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43006.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43006.json index 90bfb183b40..943e67df418 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43006.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43006.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43006", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T20:15:13.333", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-08-19T18:35:15.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en ZZCMS2023 en el archivo Ask/show.php en la l\u00ednea 21. Un atacante puede explotar esta vulnerabilidad enviando una solicitud POST especialmente manipulada a /user/ask_edit.php?action=add. que incluye c\u00f3digo JavaScript malicioso en el par\u00e1metro 'contenido'. Cuando un usuario visita la p\u00e1gina Ask/show_{newsid}.html, el script inyectado se ejecuta en el contexto del navegador del usuario, lo que genera un posible robo de cookies, tokens de sesi\u00f3n u otra informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://www.zzcms.net/about/download.html", diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43221.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43221.json index 05e47fd3477..a60ad693736 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43221.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43221", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T17:15:08.260", - "lastModified": "2024-08-19T17:15:08.260", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43232.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43232.json index a482252dc37..2a42de2bab5 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43232.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43232", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T17:15:08.443", - "lastModified": "2024-08-19T17:15:08.443", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43236.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43236.json index 0a0b3fbce1e..859c1c25f6c 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43236.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43236", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T17:15:08.640", - "lastModified": "2024-08-19T17:15:08.640", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43240.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43240.json index f74ee740ebd..80f84323129 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43240.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43240.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43240", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T17:15:08.850", - "lastModified": "2024-08-19T17:15:08.850", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43242.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43242.json new file mode 100644 index 00000000000..4d40acce2c2 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43242.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43242", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:10.463", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in azzaroco Ultimate Membership Pro allows Object Injection.This issue affects Ultimate Membership Pro: from n/a through 12.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/indeed-membership-pro/wordpress-indeed-ultimate-membership-pro-plugin-12-6-unauthenticated-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43245.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43245.json new file mode 100644 index 00000000000..69a5d752b43 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43245.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43245", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:10.660", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management vulnerability in eyecix JobSearch allows Privilege Escalation.This issue affects JobSearch: from n/a through 2.3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-plugin-2-3-4-unauthenticated-account-takeover-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43247.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43247.json new file mode 100644 index 00000000000..46218c78b6b --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43247.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43247", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:10.843", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in creativeon WHMpress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WHMpress: from n/a through 6.2-revision-5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/whmpress/wordpress-whmpress-plugin-6-2-revision-5-subscriber-arbitrary-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43248.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43248.json new file mode 100644 index 00000000000..498ba3a8520 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43248.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43248", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:11.030", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Bit Apps Bit Form Pro allows File Manipulation.This issue affects Bit Form Pro: from n/a through 2.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43249.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43249.json new file mode 100644 index 00000000000..201548229d4 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43249.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43249", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:11.217", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Bit Apps Bit Form Pro allows Command Injection.This issue affects Bit Form Pro: from n/a through 2.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43250.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43250.json new file mode 100644 index 00000000000..a711340a967 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43250.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43250", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:11.420", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Bit Apps Bit Form Pro bitformpro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Bit Form Pro: from n/a through 2.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-authenticated-plugin-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43252.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43252.json new file mode 100644 index 00000000000..55d64d7688a --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43252.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43252", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:11.607", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Crew HRM allows Object Injection.This issue affects Crew HRM: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/hr-management/wordpress-crew-hrm-plugin-1-1-1-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43256.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43256.json new file mode 100644 index 00000000000..bf20f32765e --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43256.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43256", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:11.787", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in nouthemes Leopard - WordPress offload media allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Leopard - WordPress offload media: from n/a through 2.0.36." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/leopard-wordpress-offload-media/wordpress-leopard-wordpress-offload-media-plugin-2-0-36-subscriber-plugin-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43261.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43261.json new file mode 100644 index 00000000000..0b9fe33eb55 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43261.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43261", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:11.970", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hamed Naderfar Compute Links allows PHP Remote File Inclusion.This issue affects Compute Links: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/compute-links/wordpress-compute-links-plugin-1-2-1-remote-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43271.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43271.json new file mode 100644 index 00000000000..da9132f3d53 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43271.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43271", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:12.157", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themelocation Woo Products Widgets For Elementor allows PHP Local File Inclusion.This issue affects Woo Products Widgets For Elementor: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woo-products-widgets-for-elementor/wordpress-widgets-for-woocommerce-products-on-elementor-plugin-2-0-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43272.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43272.json new file mode 100644 index 00000000000..08099f10f47 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43272.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43272", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:12.333", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authentication for Critical Function vulnerability in icegram Icegram allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Icegram: from n/a through 3.1.24." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-engage-plugin-3-1-24-unauthenticated-unpublished-campaign-viewer-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43280.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43280.json new file mode 100644 index 00000000000..b6d4097a4d7 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43280.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43280", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:12.527", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Salon Booking System Salon booking system.This issue affects Salon booking system: from n/a through 10.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/salon-booking-system/wordpress-salon-booking-system-plugin-10-8-1-open-redirection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43281.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43281.json new file mode 100644 index 00000000000..ddd73a3e246 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43281.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43281", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-19T18:15:12.707", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in VOID CODERS Void Elementor Post Grid Addon for Elementor Page builder allows PHP Local File Inclusion.This issue affects Void Elementor Post Grid Addon for Elementor Page builder: from n/a through 2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/void-elementor-post-grid-addon-for-elementor-page-builder/wordpress-void-elementor-post-grid-addon-for-elementor-page-builder-plugin-2-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json index 4c605b36a26..a7afdfb09da 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43379.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43379", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T15:15:08.683", - "lastModified": "2024-08-19T15:15:08.683", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json index 5709c5d22e8..69999c74102 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43380.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43380", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T15:15:08.893", - "lastModified": "2024-08-19T15:15:08.893", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43399.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43399.json index 6d2b846b69c..04afb563ece 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43399.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43399.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43399", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T15:15:09.073", - "lastModified": "2024-08-19T15:15:09.073", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43400.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43400.json index 0e90daccbf1..a02c8599951 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43400.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43400", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T17:15:09.097", - "lastModified": "2024-08-19T17:15:09.097", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43401.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43401.json index 288bb78ce16..6be3743ed96 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43401.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43401", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-19T17:15:09.317", - "lastModified": "2024-08-19T17:15:09.317", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6039.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6039.json index c1bcfd5acbc..3348deb5d04 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6039.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6039.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6039", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-16T22:15:09.360", - "lastModified": "2024-06-17T14:15:12.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:26:48.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fengoffice:feng_office:3.11.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C3621E4D-7172-4D4F-9310-067DD804A1CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://msecureltd.blogspot.com/2024/05/friday-fun-pentest-series-6.html", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://seclists.org/fulldisclosure/2024/Jun/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268752", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268752", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json index 71b3f2f5f7a..10ba2e3e8b1 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6181", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T11:15:56.723", - "lastModified": "2024-06-20T14:15:11.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:45:06.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:labvantage:labvantage_lims:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "FC30AE98-8DE2-4D95-B70D-2E96D9859429" + } + ] + } + ] + } + ], "references": [ { "url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-9531d77dce984d4da2ddcab863962e9c?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.269152", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269152", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.353709", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json index b6b59f168a3..88561079221 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6182", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T11:15:57.117", - "lastModified": "2024-06-20T16:15:14.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:46:05.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:labvantage:labvantage_lims:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "FC30AE98-8DE2-4D95-B70D-2E96D9859429" + } + ] + } + ] + } + ], "references": [ { "url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-95e338b6f9ea45db9a6c635c3c1ff3b8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.269153", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.269153", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.354361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6348.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6348.json index 1380a12afdf..329f6f7d910 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6348.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6348.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6348", "sourceIdentifier": "cve@asrg.io", "published": "2024-08-19T16:15:08.973", - "lastModified": "2024-08-19T16:15:08.973", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6533.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6533.json index 73d5b163eaf..c3091a1d641 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6533.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6533", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-08-15T03:15:04.567", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:13:59.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "help@fluidattacks.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "help@fluidattacks.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "59902E26-19CC-4A1A-9BB4-54C1EE864B96" + } + ] + } + ] + } + ], "references": [ { "url": "https://directus.io/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Product" + ] }, { "url": "https://fluidattacks.com/advisories/bocelli", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json index 6596ffb4418..cf53284eb35 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6534.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6534", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-08-15T04:15:07.937", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:17:15.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "help@fluidattacks.com", "type": "Secondary", @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "59902E26-19CC-4A1A-9BB4-54C1EE864B96" + } + ] + } + ] + } + ], "references": [ { "url": "https://directus.io/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Product" + ] }, { "url": "https://fluidattacks.com/advisories/capaldi", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7543.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7543.json index eb965f09a7f..65c0bfe2e3f 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7543.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7543", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:35.857", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T19:59:55.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3C23EE-8748-4C6E-B445-A9A9A9B3AF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1083/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json new file mode 100644 index 00000000000..d631c1a676e --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-7592", + "sourceIdentifier": "cna@python.org", + "published": "2024-08-19T19:15:08.180", + "lastModified": "2024-08-19T19:26:46.993", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a LOW severity vulnerability affecting CPython, specifically the\n'http.cookies' standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cna@python.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/python/cpython/issues/123067", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/123075", + "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7808.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7808.json index 62f655c0c1f..cfd8664dd2f 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7808.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7808", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T01:15:12.150", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:07:44.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/XYgit-99/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.274704", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274704", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390329", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json index f08cea2ded7..822bb93618f 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7809", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T02:15:03.763", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:11:18.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Tracer_mu.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390781", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json index 39c8ce3aabc..2008d5b10a2 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7810", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T02:15:04.087", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:12:14.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/Tracer_sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274706", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274706", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390782", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7811.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7811.json index da185c27d41..cbb928b4e71 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7811.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7811", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T03:15:05.540", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:15:40.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:daily_expenses_monitoring_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "101FFC9C-A523-427F-AD70-80E94E3E6F5F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/daily%20expenses%20monitoring%20app%20-%20delete-expense.php%20sql%20injection%20vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274707", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274707", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390947", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7812.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7812.json index 7f9f70db532..e379869a9a1 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7812.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7812", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T03:15:05.847", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:16:21.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lscjl/lsi.webray.com.cn/blob/main/CVE-project/rental%20management%20system%20Stored%20Cross-Site%20Scripting(XSS).md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274708", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274708", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7813.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7813.json index e4dc60063be..323105c9312 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7813.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7813", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T03:15:06.140", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:16:48.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prison_management_system_project:prison_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7E27BCC-81C9-4224-872D-B9586E0C2E06" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Directory%20Listing.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274709", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274709", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json index 2aef2143503..7c9312f58ba 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7814", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T04:15:08.590", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:31:16.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,18 +140,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_railway_reservation_system_project:online_railway_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F76209DB-A9BF-4276-B5CE-87CF762BA28D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Stored%20XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274710", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274710", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json index 7e4e46c512c..67e9ce78dc0 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7815", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T04:15:09.510", - "lastModified": "2024-08-15T13:01:10.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:32:00.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_railway_reservation_system_project:online_railway_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F76209DB-A9BF-4276-B5CE-87CF762BA28D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Stored%20XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.274711", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274711", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391376", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json index 5ac4c905a40..a8390f15b3b 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7828.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7828", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:13.197", - "lastModified": "2024-08-15T16:15:23.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:33:17.583", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -68,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -127,26 +147,587 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C44BE2C6-BF3E-43C3-B32F-2DCE756F94BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E161E54-2FE9-4359-9B2D-8700D00DE8E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96195649-172A-4C21-AA15-7B05F86C5CEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A92F2C-16FD-4A53-8066-83FEC2818DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8CFCD7B-EFFB-4FAB-9537-46AC7B567126" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03C5CED7-55A7-4026-95CD-A2ADB5853823" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452F9A4-3A0A-4773-9818-04C94CF9F8E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4599D769-0210-4D49-9896-9AD1376A037E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C677E53-6885-4EC4-A7CC-E24E8F445F59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE78C5B-2A98-47EE-BF67-CF58AFE50A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC28053F-88A9-4CA1-A2A2-CC90FEEA68FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A278BC9-6197-43D9-93C2-3DF760856FB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3AD5EE-8E1E-4336-A1AB-AB028CC71286" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DAF62A4-2429-4B89-8FAD-8B23EF15E050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641CB5F1-3DE0-480B-95A4-FC42A8FF3C97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94ED678A-AB4C-4637-B0D8-C232A0BB5D5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16954393-3449-438A-978C-265EE3A35FF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E6F048-D865-4378-87C7-B0E528134276" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D26F4F77-A6E3-4D7D-A781-BEB5FF7BC44F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "172D5EFF-E0DF-4A99-8499-71450A46A86C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB305B29-7F89-4A52-9ECF-3DB0BDD2350D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "816E5F34-CE76-49E5-91F3-8CC84C561558" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33CB308B-CF82-4E40-B2DC-23EBD48CD130" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39FF9666-8493-4A36-A199-1190AD8FAF3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD656642-EDD4-4EB2-81AB-04207BC14196" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F968791D-D3BD-442C-818E-4E878B12776D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C5E2D7-018E-4ED1-92C7-B5B1D8CC6990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E56821-7EA0-4CA1-BA17-7FD4ED9F794C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A74D270-9076-474D-A06F-C915FCEA2164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75E5010F-21BA-4B6B-B00C-2688268FD67B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAFE1E3-B705-4CF1-AEB9-A474432B6D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D08ED7-3E7F-4D30-890E-6535F6C34682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42DA6DEB-3578-44A5-916F-1628141F0DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D042C75D-6731-46B2-B11E-A009B9029B3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C1EF70-AD9B-48D7-8DF6-A6416C517F12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E691E775-382C-4BA9-AA44-FBC3148D3E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_set_cover.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274726", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274726", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390114", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json index 5c10a08c179..f4d2c061302 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7829", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:14.107", - "lastModified": "2024-08-15T16:15:24.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:34:00.040", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -68,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -127,26 +147,587 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C44BE2C6-BF3E-43C3-B32F-2DCE756F94BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E161E54-2FE9-4359-9B2D-8700D00DE8E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96195649-172A-4C21-AA15-7B05F86C5CEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A92F2C-16FD-4A53-8066-83FEC2818DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8CFCD7B-EFFB-4FAB-9537-46AC7B567126" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03C5CED7-55A7-4026-95CD-A2ADB5853823" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452F9A4-3A0A-4773-9818-04C94CF9F8E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4599D769-0210-4D49-9896-9AD1376A037E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C677E53-6885-4EC4-A7CC-E24E8F445F59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE78C5B-2A98-47EE-BF67-CF58AFE50A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC28053F-88A9-4CA1-A2A2-CC90FEEA68FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A278BC9-6197-43D9-93C2-3DF760856FB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3AD5EE-8E1E-4336-A1AB-AB028CC71286" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DAF62A4-2429-4B89-8FAD-8B23EF15E050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641CB5F1-3DE0-480B-95A4-FC42A8FF3C97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94ED678A-AB4C-4637-B0D8-C232A0BB5D5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16954393-3449-438A-978C-265EE3A35FF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E6F048-D865-4378-87C7-B0E528134276" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D26F4F77-A6E3-4D7D-A781-BEB5FF7BC44F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "172D5EFF-E0DF-4A99-8499-71450A46A86C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB305B29-7F89-4A52-9ECF-3DB0BDD2350D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "816E5F34-CE76-49E5-91F3-8CC84C561558" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33CB308B-CF82-4E40-B2DC-23EBD48CD130" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39FF9666-8493-4A36-A199-1190AD8FAF3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD656642-EDD4-4EB2-81AB-04207BC14196" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F968791D-D3BD-442C-818E-4E878B12776D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C5E2D7-018E-4ED1-92C7-B5B1D8CC6990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E56821-7EA0-4CA1-BA17-7FD4ED9F794C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A74D270-9076-474D-A06F-C915FCEA2164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75E5010F-21BA-4B6B-B00C-2688268FD67B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAFE1E3-B705-4CF1-AEB9-A474432B6D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D08ED7-3E7F-4D30-890E-6535F6C34682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42DA6DEB-3578-44A5-916F-1628141F0DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D042C75D-6731-46B2-B11E-A009B9029B3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C1EF70-AD9B-48D7-8DF6-A6416C517F12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E691E775-382C-4BA9-AA44-FBC3148D3E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_del_photo.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274727", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274727", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390117", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json index c5b7ce13257..8744dc5f6c8 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7830.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7830", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:14.617", - "lastModified": "2024-08-15T16:15:25.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:34:36.987", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -68,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -127,26 +147,587 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C44BE2C6-BF3E-43C3-B32F-2DCE756F94BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E161E54-2FE9-4359-9B2D-8700D00DE8E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96195649-172A-4C21-AA15-7B05F86C5CEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A92F2C-16FD-4A53-8066-83FEC2818DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8CFCD7B-EFFB-4FAB-9537-46AC7B567126" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03C5CED7-55A7-4026-95CD-A2ADB5853823" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452F9A4-3A0A-4773-9818-04C94CF9F8E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4599D769-0210-4D49-9896-9AD1376A037E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C677E53-6885-4EC4-A7CC-E24E8F445F59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE78C5B-2A98-47EE-BF67-CF58AFE50A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC28053F-88A9-4CA1-A2A2-CC90FEEA68FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A278BC9-6197-43D9-93C2-3DF760856FB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3AD5EE-8E1E-4336-A1AB-AB028CC71286" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DAF62A4-2429-4B89-8FAD-8B23EF15E050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641CB5F1-3DE0-480B-95A4-FC42A8FF3C97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94ED678A-AB4C-4637-B0D8-C232A0BB5D5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16954393-3449-438A-978C-265EE3A35FF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E6F048-D865-4378-87C7-B0E528134276" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D26F4F77-A6E3-4D7D-A781-BEB5FF7BC44F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "172D5EFF-E0DF-4A99-8499-71450A46A86C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB305B29-7F89-4A52-9ECF-3DB0BDD2350D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "816E5F34-CE76-49E5-91F3-8CC84C561558" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33CB308B-CF82-4E40-B2DC-23EBD48CD130" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39FF9666-8493-4A36-A199-1190AD8FAF3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD656642-EDD4-4EB2-81AB-04207BC14196" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F968791D-D3BD-442C-818E-4E878B12776D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C5E2D7-018E-4ED1-92C7-B5B1D8CC6990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E56821-7EA0-4CA1-BA17-7FD4ED9F794C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A74D270-9076-474D-A06F-C915FCEA2164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75E5010F-21BA-4B6B-B00C-2688268FD67B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAFE1E3-B705-4CF1-AEB9-A474432B6D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D08ED7-3E7F-4D30-890E-6535F6C34682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42DA6DEB-3578-44A5-916F-1628141F0DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D042C75D-6731-46B2-B11E-A009B9029B3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C1EF70-AD9B-48D7-8DF6-A6416C517F12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E691E775-382C-4BA9-AA44-FBC3148D3E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_move_photo.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390118", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json index 9a3dcfdcbba..9bb6ceb830c 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7831", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T13:15:15.107", - "lastModified": "2024-08-15T16:15:25.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:35:25.813", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -68,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -127,26 +147,587 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C44BE2C6-BF3E-43C3-B32F-2DCE756F94BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E161E54-2FE9-4359-9B2D-8700D00DE8E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96195649-172A-4C21-AA15-7B05F86C5CEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A92F2C-16FD-4A53-8066-83FEC2818DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8CFCD7B-EFFB-4FAB-9537-46AC7B567126" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03C5CED7-55A7-4026-95CD-A2ADB5853823" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452F9A4-3A0A-4773-9818-04C94CF9F8E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4599D769-0210-4D49-9896-9AD1376A037E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C677E53-6885-4EC4-A7CC-E24E8F445F59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE78C5B-2A98-47EE-BF67-CF58AFE50A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC28053F-88A9-4CA1-A2A2-CC90FEEA68FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A278BC9-6197-43D9-93C2-3DF760856FB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3AD5EE-8E1E-4336-A1AB-AB028CC71286" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DAF62A4-2429-4B89-8FAD-8B23EF15E050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641CB5F1-3DE0-480B-95A4-FC42A8FF3C97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94ED678A-AB4C-4637-B0D8-C232A0BB5D5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16954393-3449-438A-978C-265EE3A35FF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E6F048-D865-4378-87C7-B0E528134276" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D26F4F77-A6E3-4D7D-A781-BEB5FF7BC44F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "172D5EFF-E0DF-4A99-8499-71450A46A86C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB305B29-7F89-4A52-9ECF-3DB0BDD2350D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "816E5F34-CE76-49E5-91F3-8CC84C561558" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33CB308B-CF82-4E40-B2DC-23EBD48CD130" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39FF9666-8493-4A36-A199-1190AD8FAF3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD656642-EDD4-4EB2-81AB-04207BC14196" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F968791D-D3BD-442C-818E-4E878B12776D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C5E2D7-018E-4ED1-92C7-B5B1D8CC6990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E56821-7EA0-4CA1-BA17-7FD4ED9F794C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A74D270-9076-474D-A06F-C915FCEA2164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75E5010F-21BA-4B6B-B00C-2688268FD67B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAFE1E3-B705-4CF1-AEB9-A474432B6D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D08ED7-3E7F-4D30-890E-6535F6C34682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42DA6DEB-3578-44A5-916F-1628141F0DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D042C75D-6731-46B2-B11E-A009B9029B3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C1EF70-AD9B-48D7-8DF6-A6416C517F12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E691E775-382C-4BA9-AA44-FBC3148D3E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_cooliris.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.274729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.274729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.390119", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7907.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7907.json index 4ef0a019f5d..0c9a8c9ee47 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7907.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7907.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7907", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T16:15:04.193", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:53:05.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,68 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*", + "matchCriteriaId": "846390E3-B033-4B17-A141-49E30AF76264" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "178FD1FA-9A62-48B7-B219-938F48ADD8BB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/totolink/x6000R/setSyslogCfg_injection", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275033", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275033", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388424", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7908.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7908.json index edd7dc1618d..37b55041418 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7908.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7908", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T17:15:03.557", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:51:45.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,68 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A5A448-0444-4DA7-8C74-66AA5300D40D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4BC1501-2EAC-43B7-83E0-04FBA874D29D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/totolink/EX1200L/setDefResponse_bof", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275034", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275034", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388435", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json index b04b8004baf..f06215086e5 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7909.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7909", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T18:15:04.290", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-19T18:51:07.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,68 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A5A448-0444-4DA7-8C74-66AA5300D40D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4BC1501-2EAC-43B7-83E0-04FBA874D29D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/totolink/EX1200L/setLanguageCfg_bof", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275035", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275035", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.388436", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7910.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7910.json index 25335cbdacf..4bff21ce115 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7910.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7910", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T19:15:05.003", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:49:49.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_railway_reservation_system_project:online_railway_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F76209DB-A9BF-4276-B5CE-87CF762BA28D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/RCE%20via%20File%20Upload.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.275036", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.275036", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391650", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7911.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7911.json index d8709cdff11..500870a69df 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7911.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7911", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T20:15:04.260", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-19T18:48:06.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0BDDF483-CE42-4DCA-95DC-47AF1F9FB9CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wsstiger/cve/blob/main/simple_include.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.275037", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275037", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.391657", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7922.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7922.json index c628dd13252..d78a8333a04 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7922.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7922.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7922", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T15:15:09.403", - "lastModified": "2024-08-19T15:15:09.403", - "vulnStatus": "Received", + "lastModified": "2024-08-19T18:36:20.123", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7924.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7924.json new file mode 100644 index 00000000000..f342c3cb309 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7924.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7924", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-19T18:15:13.050", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ZZCMS 2023. It has been declared as critical. This vulnerability affects unknown code of the file /I/list.php. The manipulation of the argument skin leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/A0kooo/cve_article/blob/master/zzcms/zzcms%20list.php%20Directory%20traversal.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275110", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275110", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.391876", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7925.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7925.json new file mode 100644 index 00000000000..d5e6bf4c699 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7925.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7925", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-19T18:15:13.287", + "lastModified": "2024-08-19T18:36:07.297", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ZZCMS 2023. It has been rated as problematic. This issue affects some unknown processing of the file 3/E_bak5.1/upload/eginfo.php. The manipulation of the argument phome with the input ShowPHPInfo leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/A0kooo/cve_article/blob/master/zzcms/information_leak/Zenmus%20ekinfo.php%20had%20an%20information%20leak.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275111", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275111", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.392121", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 672708ae9d5..af016039042 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-19T18:00:18.260720+00:00 +2024-08-19T20:00:19.099372+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-19T17:58:27.230000+00:00 +2024-08-19T19:59:55.340000+00:00 ``` ### Last Data Feed Release @@ -33,60 +33,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260494 +260511 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `17` -- [CVE-2022-4404](CVE-2022/CVE-2022-44xx/CVE-2022-4404.json) (`2024-08-19T16:15:06.710`) -- [CVE-2022-4411](CVE-2022/CVE-2022-44xx/CVE-2022-4411.json) (`2024-08-19T16:15:06.773`) -- [CVE-2022-4425](CVE-2022/CVE-2022-44xx/CVE-2022-4425.json) (`2024-08-19T16:15:06.823`) -- [CVE-2024-32927](CVE-2024/CVE-2024-329xx/CVE-2024-32927.json) (`2024-08-19T17:15:07.493`) -- [CVE-2024-32928](CVE-2024/CVE-2024-329xx/CVE-2024-32928.json) (`2024-08-19T17:15:07.557`) -- [CVE-2024-37099](CVE-2024/CVE-2024-370xx/CVE-2024-37099.json) (`2024-08-19T17:15:07.700`) -- [CVE-2024-42633](CVE-2024/CVE-2024-426xx/CVE-2024-42633.json) (`2024-08-19T16:15:08.740`) -- [CVE-2024-42657](CVE-2024/CVE-2024-426xx/CVE-2024-42657.json) (`2024-08-19T17:15:07.967`) -- [CVE-2024-42658](CVE-2024/CVE-2024-426xx/CVE-2024-42658.json) (`2024-08-19T17:15:08.027`) -- [CVE-2024-43221](CVE-2024/CVE-2024-432xx/CVE-2024-43221.json) (`2024-08-19T17:15:08.260`) -- [CVE-2024-43232](CVE-2024/CVE-2024-432xx/CVE-2024-43232.json) (`2024-08-19T17:15:08.443`) -- [CVE-2024-43236](CVE-2024/CVE-2024-432xx/CVE-2024-43236.json) (`2024-08-19T17:15:08.640`) -- [CVE-2024-43240](CVE-2024/CVE-2024-432xx/CVE-2024-43240.json) (`2024-08-19T17:15:08.850`) -- [CVE-2024-43400](CVE-2024/CVE-2024-434xx/CVE-2024-43400.json) (`2024-08-19T17:15:09.097`) -- [CVE-2024-43401](CVE-2024/CVE-2024-434xx/CVE-2024-43401.json) (`2024-08-19T17:15:09.317`) -- [CVE-2024-6348](CVE-2024/CVE-2024-63xx/CVE-2024-6348.json) (`2024-08-19T16:15:08.973`) +- [CVE-2024-23729](CVE-2024/CVE-2024-237xx/CVE-2024-23729.json) (`2024-08-19T19:15:07.867`) +- [CVE-2024-43242](CVE-2024/CVE-2024-432xx/CVE-2024-43242.json) (`2024-08-19T18:15:10.463`) +- [CVE-2024-43245](CVE-2024/CVE-2024-432xx/CVE-2024-43245.json) (`2024-08-19T18:15:10.660`) +- [CVE-2024-43247](CVE-2024/CVE-2024-432xx/CVE-2024-43247.json) (`2024-08-19T18:15:10.843`) +- [CVE-2024-43248](CVE-2024/CVE-2024-432xx/CVE-2024-43248.json) (`2024-08-19T18:15:11.030`) +- [CVE-2024-43249](CVE-2024/CVE-2024-432xx/CVE-2024-43249.json) (`2024-08-19T18:15:11.217`) +- [CVE-2024-43250](CVE-2024/CVE-2024-432xx/CVE-2024-43250.json) (`2024-08-19T18:15:11.420`) +- [CVE-2024-43252](CVE-2024/CVE-2024-432xx/CVE-2024-43252.json) (`2024-08-19T18:15:11.607`) +- [CVE-2024-43256](CVE-2024/CVE-2024-432xx/CVE-2024-43256.json) (`2024-08-19T18:15:11.787`) +- [CVE-2024-43261](CVE-2024/CVE-2024-432xx/CVE-2024-43261.json) (`2024-08-19T18:15:11.970`) +- [CVE-2024-43271](CVE-2024/CVE-2024-432xx/CVE-2024-43271.json) (`2024-08-19T18:15:12.157`) +- [CVE-2024-43272](CVE-2024/CVE-2024-432xx/CVE-2024-43272.json) (`2024-08-19T18:15:12.333`) +- [CVE-2024-43280](CVE-2024/CVE-2024-432xx/CVE-2024-43280.json) (`2024-08-19T18:15:12.527`) +- [CVE-2024-43281](CVE-2024/CVE-2024-432xx/CVE-2024-43281.json) (`2024-08-19T18:15:12.707`) +- [CVE-2024-7592](CVE-2024/CVE-2024-75xx/CVE-2024-7592.json) (`2024-08-19T19:15:08.180`) +- [CVE-2024-7924](CVE-2024/CVE-2024-79xx/CVE-2024-7924.json) (`2024-08-19T18:15:13.050`) +- [CVE-2024-7925](CVE-2024/CVE-2024-79xx/CVE-2024-7925.json) (`2024-08-19T18:15:13.287`) ### CVEs modified in the last Commit -Recently modified CVEs: `104` +Recently modified CVEs: `106` -- [CVE-2024-7495](CVE-2024/CVE-2024-74xx/CVE-2024-7495.json) (`2024-08-19T17:10:27.693`) -- [CVE-2024-7496](CVE-2024/CVE-2024-74xx/CVE-2024-7496.json) (`2024-08-19T16:48:09.717`) -- [CVE-2024-7497](CVE-2024/CVE-2024-74xx/CVE-2024-7497.json) (`2024-08-19T16:49:16.057`) -- [CVE-2024-7498](CVE-2024/CVE-2024-74xx/CVE-2024-7498.json) (`2024-08-19T16:50:27.013`) -- [CVE-2024-7499](CVE-2024/CVE-2024-74xx/CVE-2024-7499.json) (`2024-08-19T16:51:07.057`) -- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-08-19T17:52:53.887`) -- [CVE-2024-7645](CVE-2024/CVE-2024-76xx/CVE-2024-7645.json) (`2024-08-19T17:48:06.303`) -- [CVE-2024-7750](CVE-2024/CVE-2024-77xx/CVE-2024-7750.json) (`2024-08-19T17:48:40.913`) -- [CVE-2024-7751](CVE-2024/CVE-2024-77xx/CVE-2024-7751.json) (`2024-08-19T17:47:51.890`) -- [CVE-2024-7752](CVE-2024/CVE-2024-77xx/CVE-2024-7752.json) (`2024-08-19T17:48:25.793`) -- [CVE-2024-7753](CVE-2024/CVE-2024-77xx/CVE-2024-7753.json) (`2024-08-19T17:47:49.083`) -- [CVE-2024-7754](CVE-2024/CVE-2024-77xx/CVE-2024-7754.json) (`2024-08-19T17:48:15.203`) -- [CVE-2024-7793](CVE-2024/CVE-2024-77xx/CVE-2024-7793.json) (`2024-08-19T16:25:22.220`) -- [CVE-2024-7794](CVE-2024/CVE-2024-77xx/CVE-2024-7794.json) (`2024-08-19T16:27:08.303`) -- [CVE-2024-7797](CVE-2024/CVE-2024-77xx/CVE-2024-7797.json) (`2024-08-19T16:28:23.557`) -- [CVE-2024-7798](CVE-2024/CVE-2024-77xx/CVE-2024-7798.json) (`2024-08-19T16:42:32.480`) -- [CVE-2024-7799](CVE-2024/CVE-2024-77xx/CVE-2024-7799.json) (`2024-08-19T16:47:37.860`) -- [CVE-2024-7800](CVE-2024/CVE-2024-78xx/CVE-2024-7800.json) (`2024-08-19T16:50:39.993`) -- [CVE-2024-7832](CVE-2024/CVE-2024-78xx/CVE-2024-7832.json) (`2024-08-19T16:02:17.383`) -- [CVE-2024-7833](CVE-2024/CVE-2024-78xx/CVE-2024-7833.json) (`2024-08-19T16:00:21.393`) -- [CVE-2024-7896](CVE-2024/CVE-2024-78xx/CVE-2024-7896.json) (`2024-08-19T17:15:11.543`) -- [CVE-2024-7897](CVE-2024/CVE-2024-78xx/CVE-2024-7897.json) (`2024-08-19T17:15:11.650`) -- [CVE-2024-7912](CVE-2024/CVE-2024-79xx/CVE-2024-7912.json) (`2024-08-19T16:16:10.667`) -- [CVE-2024-7913](CVE-2024/CVE-2024-79xx/CVE-2024-7913.json) (`2024-08-19T16:14:30.670`) -- [CVE-2024-7914](CVE-2024/CVE-2024-79xx/CVE-2024-7914.json) (`2024-08-19T16:12:51.837`) +- [CVE-2024-6039](CVE-2024/CVE-2024-60xx/CVE-2024-6039.json) (`2024-08-19T19:26:48.043`) +- [CVE-2024-6181](CVE-2024/CVE-2024-61xx/CVE-2024-6181.json) (`2024-08-19T18:45:06.147`) +- [CVE-2024-6182](CVE-2024/CVE-2024-61xx/CVE-2024-6182.json) (`2024-08-19T18:46:05.410`) +- [CVE-2024-6348](CVE-2024/CVE-2024-63xx/CVE-2024-6348.json) (`2024-08-19T18:36:20.123`) +- [CVE-2024-6533](CVE-2024/CVE-2024-65xx/CVE-2024-6533.json) (`2024-08-19T18:13:59.457`) +- [CVE-2024-6534](CVE-2024/CVE-2024-65xx/CVE-2024-6534.json) (`2024-08-19T18:17:15.110`) +- [CVE-2024-7543](CVE-2024/CVE-2024-75xx/CVE-2024-7543.json) (`2024-08-19T19:59:55.340`) +- [CVE-2024-7808](CVE-2024/CVE-2024-78xx/CVE-2024-7808.json) (`2024-08-19T18:07:44.270`) +- [CVE-2024-7809](CVE-2024/CVE-2024-78xx/CVE-2024-7809.json) (`2024-08-19T18:11:18.537`) +- [CVE-2024-7810](CVE-2024/CVE-2024-78xx/CVE-2024-7810.json) (`2024-08-19T18:12:14.090`) +- [CVE-2024-7811](CVE-2024/CVE-2024-78xx/CVE-2024-7811.json) (`2024-08-19T18:15:40.487`) +- [CVE-2024-7812](CVE-2024/CVE-2024-78xx/CVE-2024-7812.json) (`2024-08-19T18:16:21.283`) +- [CVE-2024-7813](CVE-2024/CVE-2024-78xx/CVE-2024-7813.json) (`2024-08-19T18:16:48.327`) +- [CVE-2024-7814](CVE-2024/CVE-2024-78xx/CVE-2024-7814.json) (`2024-08-19T18:31:16.473`) +- [CVE-2024-7815](CVE-2024/CVE-2024-78xx/CVE-2024-7815.json) (`2024-08-19T18:32:00.617`) +- [CVE-2024-7828](CVE-2024/CVE-2024-78xx/CVE-2024-7828.json) (`2024-08-19T18:33:17.583`) +- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-19T18:34:00.040`) +- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-19T18:34:36.987`) +- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-19T18:35:25.813`) +- [CVE-2024-7907](CVE-2024/CVE-2024-79xx/CVE-2024-7907.json) (`2024-08-19T18:53:05.753`) +- [CVE-2024-7908](CVE-2024/CVE-2024-79xx/CVE-2024-7908.json) (`2024-08-19T18:51:45.210`) +- [CVE-2024-7909](CVE-2024/CVE-2024-79xx/CVE-2024-7909.json) (`2024-08-19T18:51:07.600`) +- [CVE-2024-7910](CVE-2024/CVE-2024-79xx/CVE-2024-7910.json) (`2024-08-19T18:49:49.110`) +- [CVE-2024-7911](CVE-2024/CVE-2024-79xx/CVE-2024-7911.json) (`2024-08-19T18:48:06.527`) +- [CVE-2024-7922](CVE-2024/CVE-2024-79xx/CVE-2024-7922.json) (`2024-08-19T18:36:20.123`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3053902f32f..b4411902e1e 100644 --- a/_state.csv +++ b/_state.csv @@ -111708,7 +111708,7 @@ CVE-2018-10627,0,0,c76f046ad964b19e3cf494e01dd6123bb68172313490458ef8c2f9da54f3b CVE-2018-10628,0,0,e0e60fc7532e4e3550a5556278a0f580c094c5b0a97a26eeb07878d2d406940a,2023-11-07T02:51:31.013000 CVE-2018-1063,0,0,2c9dba3ea9eb5da14504cc5700c024ada44bcfc9dd4528bd8da468ad7e4178f9,2023-11-07T02:55:48.110000 CVE-2018-10630,0,0,cf5f5963a104355c275d01fd9d9f9dd8bcee07b9aa528cd8388c91a9fe501f94,2019-10-09T23:32:57.383000 -CVE-2018-10631,0,0,399f3a54affb6c76970f5c2a60bda0f3533867bd06169e9c520557db8e8a1ef1,2019-10-09T23:32:57.680000 +CVE-2018-10631,0,1,2a637e319ae7243aed0025bf66f80efd4cbba6295ee879df8d4ca4c34b9e256b,2024-08-19T19:35:00.700000 CVE-2018-10632,0,0,043c8cad3b96c5503994df137f92ee4e4a3a8b4825be251c1c4e6e10bae96de7,2019-10-09T23:32:57.853000 CVE-2018-10633,0,0,4391d9c2fd2bdb5cab61aea1dff18b5547ecca10b5241089faaf38b5bbdeae87,2019-10-09T23:32:58.023000 CVE-2018-10634,0,0,dbf91e3a43c4a21fe71aa8101832ac784079b0a7b3ef862eb4679a3c2b89877a,2019-10-09T23:32:58.150000 @@ -121366,7 +121366,7 @@ CVE-2018-25077,0,0,0fa7bc6dbbe3cf9c4d0cd1fc11d3be8d695ec09ce3620ab309ad343ed2ce2 CVE-2018-25078,0,0,e39970d4cbe33206e9042de75bd8cfd78020a6c988103d147361ce5c847e7baa,2023-10-08T09:15:10.143000 CVE-2018-25079,0,0,f165289de10aabdc5ffde5a238fc8d3e63421fd0fe6b22803846de6132f2fd04,2024-05-17T01:27:29.080000 CVE-2018-25080,0,0,fc3606b98a7060941db4773a258e1910cdcad0d7d5d818ed50bd41309deee7c9,2024-05-17T01:27:29.200000 -CVE-2018-25081,0,1,2080a7d73ed8ccbac950baffcbac4165cf447cbf7a98d5919af5a87d9ebb929d,2024-08-19T17:35:00.897000 +CVE-2018-25081,0,0,2080a7d73ed8ccbac950baffcbac4165cf447cbf7a98d5919af5a87d9ebb929d,2024-08-19T17:35:00.897000 CVE-2018-25082,0,0,c55d38b09d5cf47c2b3dced1102640ad20f7edcc951b5462708d7de10d6a5905,2024-05-17T01:27:29.420000 CVE-2018-25083,0,0,9982d67bbad554c45798dae06fe33a0d53dd577ef06f230b22e7fb335e94e9d5,2023-03-31T00:21:54.407000 CVE-2018-25084,0,0,68de91e4fa5f1fbbdd73d27f9394c64386fda865360835d3a300d6b7a76e5d8c,2024-05-17T01:27:29.593000 @@ -137531,7 +137531,7 @@ CVE-2019-20630,0,0,dab2ad4e6a925ae80e11dd7e6603c0dd4f11559350fc0c953ec95e0fe3b90 CVE-2019-20631,0,0,c71855aeac060c920b1352f0cfd1ec956ad53b765f21de8c8733c337891d7f43,2020-03-25T13:54:14.857000 CVE-2019-20632,0,0,3ffb0d2b1147273915caf0fc7b385fa9217dae9e36ba04928734a123f3c130d1,2020-03-25T13:54:19.450000 CVE-2019-20633,0,0,7c9f60dc28c23890a0f8158673243e87c717dd910883660f2c4404e396cb7555,2020-11-05T14:54:57.643000 -CVE-2019-20634,0,0,83f0249a01194d63cc7183c48fded179e0db6643dafd1063c3b62cb0ed9712e0,2022-04-27T16:40:35.440000 +CVE-2019-20634,0,1,fec84566e83fcb49fa77f88af177270e9be046f605f0a7a97542788bfa0053b5,2024-08-19T18:15:09.837000 CVE-2019-20635,0,0,39eb51ed0631da25fe80299da31306848ce735422315f020d08e4106f2240029,2020-08-24T17:37:01.140000 CVE-2019-20636,0,0,21c98cc4804a1a28669f4ab5fbdf616ad07942e8adbae364ccfaa032cdf02c2a,2023-11-09T13:57:20.637000 CVE-2019-20637,0,0,cbab22fdfd25776b6dc44d4b1073259cf92b027113b0b980d492d2987280eb45,2022-08-02T19:03:41.127000 @@ -187429,8 +187429,8 @@ CVE-2021-47580,0,0,e0ba4a70a306169a72b59c906d22256e1e9ec63a836b279525125573202bd CVE-2021-47581,0,0,8787010fa1b837c9433128d0d20bbbc5cc367d055ada39f1bbe864fed14da829,2024-06-20T09:15:11.057000 CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af77d,2024-06-20T12:43:25.663000 CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000 -CVE-2021-47584,0,0,bf7b10c6b24e8a5a6bedf1038113cedf4050092b80f056d636ace0e1f7529ee8,2024-06-20T12:43:25.663000 -CVE-2021-47585,0,0,a7399cb2803ae85edc34cc57e410ad8ef7026c527fc25550d2ce14487be2817c,2024-06-20T12:43:25.663000 +CVE-2021-47584,0,1,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000 +CVE-2021-47585,0,1,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000 CVE-2021-47586,0,0,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e203743018315a0,2024-07-03T01:38:11.913000 CVE-2021-47587,0,0,b30550a10bae30fdaddfdf1118241fdecdb0aac764064035e93107f946fad012,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000 @@ -187441,8 +187441,8 @@ CVE-2021-47592,0,0,3e6a900f856612ffa91a686567e21f4c94ed7d6a279efc65d48294ed49768 CVE-2021-47593,0,0,d7a43d01ab4a125b4e19b7cc66507d59f9c795640b357b5f69d8e118285d751e,2024-06-20T12:43:25.663000 CVE-2021-47594,0,0,39ee68b0bea20520811a251d6cea7a263960b1fe82747511fa8952fffe9e3729,2024-06-20T12:43:25.663000 CVE-2021-47595,0,0,a5c7de083f6b9294a72a621ab5d4d3b5d2e23f529c737eb80cb272e2bd0ff631,2024-06-20T12:43:25.663000 -CVE-2021-47596,0,0,554465ba63035c3db3d4e3d226568deb795de663c29c245a4f693357fd59791b,2024-06-20T12:43:25.663000 -CVE-2021-47597,0,0,ac8af0518899f97b216aa144317422f6226e0a0146dab40a5e7bce31e5dbf55a,2024-06-20T12:43:25.663000 +CVE-2021-47596,0,1,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000 +CVE-2021-47597,0,1,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000 CVE-2021-47598,0,0,a11d1fd0dd392d97c78d49ebb7cdc7720f2bc74b0ee3faf4bda5c5c7371150dc,2024-06-20T12:43:25.663000 CVE-2021-47599,0,0,08ed62254e7ecb9b8e7d1adde943234640f9a513c87ff0831ce11a99dd48bc77,2024-06-20T12:43:25.663000 CVE-2021-47600,0,0,cb53f69ff006a57c9bde8868814a2c7504095444dc2ff563775eea7bdd373c21,2024-06-20T12:43:25.663000 @@ -187466,7 +187466,7 @@ CVE-2021-47617,0,0,174885baf195ea856ab0f44445ac6a3f70dd31281a9cea4d13f0e12108a3d CVE-2021-47618,0,0,2a314532463f641de5a1abcd70cc0a94c3a5563bdb37f6cd3ebfada5f84160e6,2024-06-20T12:43:25.663000 CVE-2021-47619,0,0,3423ea9cbab93af03ecb9855e0285f5e2851c0e4b6812bafeb4e82921247592c,2024-06-20T12:43:25.663000 CVE-2021-47620,0,0,fb48237cc161b8d736f32b3c4687ae5c6d236eb8a2b8089bbf75bcca0c16df9e,2024-06-20T12:43:25.663000 -CVE-2021-47621,0,1,e2a12dc01cb26b616b467be0797cdc4becade42dc6473a1cfae1a845981be942,2024-08-19T17:35:03.327000 +CVE-2021-47621,0,0,e2a12dc01cb26b616b467be0797cdc4becade42dc6473a1cfae1a845981be942,2024-08-19T17:35:03.327000 CVE-2021-47622,0,0,5687fedeaf0fc97598385001780a91dee2aac32ca83156e078d729c2dde62413,2024-07-16T13:43:58.773000 CVE-2021-47623,0,0,51281b2f0091c3f4d7a64df3b524258b3de520fa994b2caf678cd311e53f80eb,2024-07-16T13:43:58.773000 CVE-2021-47624,0,0,c2a585352ebb3edc0ad7ac5a6a183524a0456da3ae869c5049c066da0fc05ae9,2024-07-16T13:43:58.773000 @@ -194036,7 +194036,7 @@ CVE-2022-25028,0,0,8d46d339c4c5524f8a2c9f2d56af645be4c25c19bbd1aab9baf79b3fdde9d CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025c35,2023-11-07T03:44:43.777000 CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000 CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000 -CVE-2022-25037,0,0,058974e324b84aa7fb9b0897fcd3f45ce13e298426c071b91c979cbf8c985aeb,2024-05-31T19:14:47.793000 +CVE-2022-25037,0,1,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000 CVE-2022-25038,0,0,d4ef5d26ced29c463b76ab9e49c88e159235454bb783bae2b05d2fe11de9ef7a,2024-05-31T19:14:47.793000 CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000 CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000 @@ -200092,7 +200092,7 @@ CVE-2022-3250,0,0,f5bd8db8cab9b54b1b72289fb537f8db5593484a25773a6d077ab99d66a1b3 CVE-2022-32502,0,0,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b88f,2024-07-03T01:38:30.257000 CVE-2022-32503,0,0,f57183dbef2543b9f63dcf473a4267a67a4ba901286e8bc05468ac8a81f43f5a,2024-07-03T01:38:31.060000 CVE-2022-32504,0,0,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 -CVE-2022-32505,0,1,d68338a48cb6379b7959ddbe908e7d1fc8f4608362b59573f8ed193723734aef,2024-08-19T17:35:04.330000 +CVE-2022-32505,0,0,d68338a48cb6379b7959ddbe908e7d1fc8f4608362b59573f8ed193723734aef,2024-08-19T17:35:04.330000 CVE-2022-32506,0,0,945d8d593d51aa0fa18a86d7f596f36c3b2f053cf1846c7fd73efcc537697064,2024-05-14T16:13:02.773000 CVE-2022-32507,0,0,1438fd6973ef98c64de8bb4f28b81155df795d93958b2f8ab2841cf67afabcb6,2024-08-14T19:35:01.077000 CVE-2022-32508,0,0,a82e6070d51429707c08716a8f4c6bc4c23bc87bd713671d9f9c95e952ee7b45,2024-07-03T01:38:32.660000 @@ -209113,7 +209113,7 @@ CVE-2022-44036,0,0,64bdbbfd021336289a5da0db5ed4ab1a9eafe9ba49eb1ebeb7ae4c273de4a CVE-2022-44037,0,0,b4b707cba363b5c00c5eeda9b45ec3ff432a2c7527cfae92cd7c83ec4d0a9903,2023-08-08T14:21:49.707000 CVE-2022-44038,0,0,0563508d9e2bc0b6d1b807952c08ab085501ba06dc6d9a1159a781d0205e65ee,2022-12-01T20:25:20.850000 CVE-2022-44039,0,0,9fb074caee2a5671df19f03763b0f0e3629a6bdbedd3095c0d9cc5c2e81d2aa8,2022-12-07T04:50:27.127000 -CVE-2022-4404,1,1,ba625c43db2864d65a0ff31257f21f8f69354cda3fd5674e2dec0e49c55a9cee,2024-08-19T16:15:06.710000 +CVE-2022-4404,0,0,ba625c43db2864d65a0ff31257f21f8f69354cda3fd5674e2dec0e49c55a9cee,2024-08-19T16:15:06.710000 CVE-2022-44048,0,0,2d4e75fb095688fadb0930596738b0f16d109b6fa12ae5b7ce63c368f902fabb,2022-11-08T17:38:14.420000 CVE-2022-44049,0,0,63cdd0541de4cbf1976c2650e99e96563ff6ec866fd36d504ddfb3e3a1ea9658,2022-11-08T17:35:40.947000 CVE-2022-4405,0,0,a97f9d8cb098103144f679f3d5528985d65dbf5dfab46ca9fc83404123a88ba5,2024-08-16T19:15:06.450000 @@ -209139,7 +209139,7 @@ CVE-2022-44097,0,0,008bf3fce0b3a7816e8074bdb1aba1f69fafe77cbcd10e81784ab1fc3796b CVE-2022-4410,0,0,ba09303937a01257247d9a0f7b42bcce43039834374707d81b952a6cbd473b1e,2023-11-07T03:57:46.890000 CVE-2022-44108,0,0,3d1a57d59196225338bb778e3238022a3fa81c45233e4ce30e7652107234b26b,2022-12-27T19:01:58.520000 CVE-2022-44109,0,0,e6c9cff004df19bd1eabe2f243201a658ffb8ac63ece5b1fd05f5c82acc764f7,2022-12-27T19:00:39.837000 -CVE-2022-4411,1,1,935e961667e5bbfc5229bd7e471de00a3d7a23d2adf64bbae75cc4258616bd67,2024-08-19T16:15:06.773000 +CVE-2022-4411,0,0,935e961667e5bbfc5229bd7e471de00a3d7a23d2adf64bbae75cc4258616bd67,2024-08-19T16:15:06.773000 CVE-2022-44117,0,0,26b062cdfc4c8a560c00edbaa4a049c744b6c79a0228e7f9b0e546a65c695e4f,2024-08-03T14:15:33.417000 CVE-2022-44118,0,0,57d93fe5fdbc600e61173298707c9a8b180e121d55700cd77625da7322cd1e33,2022-11-28T19:44:34.507000 CVE-2022-44120,0,0,cd768deffa39e4dcc9daef35e0ea84f0488a2527278e78d30dc78b3402693cda,2022-11-28T19:38:56.377000 @@ -209200,7 +209200,7 @@ CVE-2022-44235,0,0,66d2eeb162459d5499b6d6c24e570fe09613ed6bdb59997a63251499e3a51 CVE-2022-44236,0,0,2723410f7e329c0a29eb033fa0ccec6254c3c079efdd0d822bd3cf19f1627738,2022-12-20T03:07:37.203000 CVE-2022-44244,0,0,9a6e8336e64fdce9c5c707d972488d5b7f2718e864aba2c5c97355047a416bbf,2022-11-17T14:35:50.893000 CVE-2022-44249,0,0,1dc2d7a236c95a00998e81bbb07fe6f421812d394bbc5d0197404e9ca86ba623,2023-08-08T14:22:24.967000 -CVE-2022-4425,1,1,bf43d7a5b7e50b5efc474ea54f2b26ce0140204e8483422731306bef83e2f2af,2024-08-19T16:15:06.823000 +CVE-2022-4425,0,0,bf43d7a5b7e50b5efc474ea54f2b26ce0140204e8483422731306bef83e2f2af,2024-08-19T16:15:06.823000 CVE-2022-44250,0,0,fc34a073f2ca87a762c3e556a2e7d4b040be7353b5f3332a410774dd691bd152,2023-08-08T14:22:24.967000 CVE-2022-44251,0,0,d92aa91395765f2e1cc5bc1c0c4b9472b478efc8a19e81f43c07d4b70f47100b,2023-08-08T14:22:24.967000 CVE-2022-44252,0,0,9202089169759fdbc2e9e4631f82f57e672cfef70572a9debba00db8337fcba9,2023-08-08T14:22:24.967000 @@ -212058,7 +212058,7 @@ CVE-2022-4857,0,0,d3d7195d47e3222f9de69f0033f78ca09484aabcea340c176cc03125420a41 CVE-2022-48570,0,0,db87434b4c0fe6d6524e72393a7b479edec1ba6b542654db52e0352708bf9f94,2023-08-26T02:21:54.680000 CVE-2022-48571,0,0,8c7b1ac787ddf1d6a16f1e133112b367842b4fac62aa1cfd5a86680aa81cbb91,2023-09-08T01:15:07.393000 CVE-2022-48577,0,0,cfbe75862327245c072ce5c172b7ef02b77ac4154d075f57893f5eb8d2edae40,2024-01-17T17:59:46.343000 -CVE-2022-48578,0,0,1517f70efcba25a844047ef624dbfd931a90827ba46db26ef4f42492272a62fd,2024-06-12T18:07:41.117000 +CVE-2022-48578,0,1,a845c231353cdca07d74c49f3b6a11f7965a967f3271f1be7a7c23530bc6a615,2024-08-19T19:35:03.153000 CVE-2022-48579,0,0,c8c8cb08baf6eb8cbe4aba91c8a7c56372c2bbdfd971b2fbd59995e2aeebde3a,2023-08-17T19:15:09.937000 CVE-2022-4858,0,0,e0ab0e7bb8857624f6d61e10c12153fffbe4eebcb4b66788481e5d3ef5041ff3,2023-01-06T20:37:55.853000 CVE-2022-48580,0,0,664a1c84f2e154c232999533b71cbc2bb99e38f547b934ddab2d305e4cbcfb89,2023-08-11T17:39:26.760000 @@ -212103,7 +212103,7 @@ CVE-2022-4862,0,0,649eeabb2f2c2eacbfae4022064976d84bebf64c53c9859e77463f2464e93c CVE-2022-48620,0,0,5698c281f8e8068516c8dfe700ee9a98bc0bfd9312d73b253920c8e72d6c9959,2024-03-23T03:15:08.797000 CVE-2022-48621,0,0,1cd5ad66125265477c8dc07522592260d4eec4c99a5ef37987104225c1fc205f,2024-02-20T19:50:53.960000 CVE-2022-48622,0,0,eaf3b7ec22a1824c124f4e25d7910c1f6054000dbe6b48b77c63d24a44256ca0,2024-02-02T15:53:45.607000 -CVE-2022-48623,0,1,903da016b4a21385c85cb533e0b0fbe60d9e83c91876ab8bbe25078b9f10265b,2024-08-19T17:35:04.530000 +CVE-2022-48623,0,0,903da016b4a21385c85cb533e0b0fbe60d9e83c91876ab8bbe25078b9f10265b,2024-08-19T17:35:04.530000 CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,5d912021e84b827be17b6fcdcc1fceb7197614c850a6ba728db3d8a621c14c33,2024-02-20T19:50:53.960000 CVE-2022-48626,0,0,c32c60613e37af211db942e0a371f8ea3f4c06fe2f5b699006edd94c8eb1383b,2024-04-17T19:28:53.540000 @@ -212218,17 +212218,17 @@ CVE-2022-48729,0,0,ad165dff3bcf3425e94d56121d561de71f8056af16b12ad5ad3979c56f1e6 CVE-2022-4873,0,0,666c94076854a8a821e8edd91b9090dda2c8e9960022c374c3759cf89e6c2eeb,2023-11-07T03:59:09.310000 CVE-2022-48730,0,0,927e7fae9500f7d1d76c595495e5d68ddde80a2da0a22ed9d01a96f4a588ddf8,2024-06-20T12:43:25.663000 CVE-2022-48731,0,0,f2137fdaa4becb4ed0190377e8df6f4b116a98b0fb57b5a4ce7886128d2a2fb4,2024-06-20T12:43:25.663000 -CVE-2022-48732,0,1,d6cc74e82f107b126febfe008777c2c97d6e8cbe09c0878031c0fd17cd48e390,2024-08-19T17:58:27.230000 -CVE-2022-48733,0,1,b9654e7a5a6010b53a0c8f511fbd859018567fefc2bc6c92a4a95b1469e952f9,2024-08-19T17:39:17.383000 -CVE-2022-48734,0,1,a10c6df7a42e2cfe05caa8c89dfd6fc497700a9e09171ca89bd5070583fc92fa,2024-08-19T17:22:11.393000 -CVE-2022-48735,0,1,f6e636dab2ea285d480bff4ef4cf308fbc0f6a9ee0941d7e62ec484863a3959c,2024-08-19T16:41:21.037000 +CVE-2022-48732,0,0,d6cc74e82f107b126febfe008777c2c97d6e8cbe09c0878031c0fd17cd48e390,2024-08-19T17:58:27.230000 +CVE-2022-48733,0,0,b9654e7a5a6010b53a0c8f511fbd859018567fefc2bc6c92a4a95b1469e952f9,2024-08-19T17:39:17.383000 +CVE-2022-48734,0,0,a10c6df7a42e2cfe05caa8c89dfd6fc497700a9e09171ca89bd5070583fc92fa,2024-08-19T17:22:11.393000 +CVE-2022-48735,0,0,f6e636dab2ea285d480bff4ef4cf308fbc0f6a9ee0941d7e62ec484863a3959c,2024-08-19T16:41:21.037000 CVE-2022-48736,0,0,81ca9bdcd7e3a82c08985a14ce832c395c4228e286c7331dc57b0f38ea5fffd7,2024-07-05T07:15:09.673000 CVE-2022-48737,0,0,8b9225412227b870ab231e96f2617a46f9a2746c195f03ce0afc138fa1aaec62,2024-07-05T07:15:09.927000 CVE-2022-48738,0,0,e94b201d92423520205caa5baa12f095925dfa7f651f3436c8f969bcabf4eaf9,2024-06-20T12:43:25.663000 CVE-2022-48739,0,0,00da9e79eba58b72da4eb9f5fe5c2b84557c8f37a2ad7a0724f316e8ecfe489a,2024-06-20T12:43:25.663000 CVE-2022-4874,0,0,d259c1db6680ce288191bcc87dca743951302233b28b86107a9fa3c0b9ed4550,2023-11-07T03:59:09.523000 -CVE-2022-48740,0,1,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000 -CVE-2022-48741,0,1,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000 +CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000 +CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000 CVE-2022-48742,0,0,47877914826bbcca848a5a88eb82fc6bd0070089fc81e4e2400d0b8e069d2cb2,2024-06-20T12:43:25.663000 CVE-2022-48743,0,0,210b0ade111d6b4df1d1747f8af54560ce03bf97e3f6d5414964b3b2b459b801,2024-06-20T12:43:25.663000 CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000 @@ -213435,7 +213435,7 @@ CVE-2023-1031,0,0,feb804fc074529db44532eaa84c7b0fb095262aa81fcaf299c136bde6c1249 CVE-2023-1032,0,0,d62db901082d4ae2f2b335330de244545e2a39d158c91760d16f50d48e433fd2,2024-01-11T18:39:42.960000 CVE-2023-1033,0,0,c93ae27514b317666ddec46888996c780b05f042b2a4cc436b5ca51edc0d1d6f,2023-03-07T01:59:06.247000 CVE-2023-1034,0,0,a71af82f2c33601ac5cfb2166ad6d5798dfbceb573c318bb29911ae56ba44608,2023-03-06T16:39:38.413000 -CVE-2023-1035,0,1,295d43b3fc9ef00348dae797843c1f9a2fc608193680e64bca4a20c7494a8d36,2024-08-19T17:50:15.553000 +CVE-2023-1035,0,0,295d43b3fc9ef00348dae797843c1f9a2fc608193680e64bca4a20c7494a8d36,2024-08-19T17:50:15.553000 CVE-2023-1036,0,0,4f16c94da791cd3f537c346787d76fac35917516ca505785c7fee12cbfee5ab0,2024-05-17T02:17:45.537000 CVE-2023-1037,0,0,fa68cbf62b4b1c7fdc80506d130c55fcc45d2cf5e3fdd6acbcfcb36028d46c87,2024-05-17T02:17:45.650000 CVE-2023-1038,0,0,c486f55809430b5e09b3a9bdf28da5a6823126c652e6d7541606b75d3577f31c,2024-05-17T02:17:45.760000 @@ -217792,9 +217792,9 @@ CVE-2023-24058,0,0,16a1b8d2c8f6e9521afc5ad7d9e751bc2a2f51cc265db69a156ca23c3660b CVE-2023-24059,0,0,85c8b3c7e51d4493812abc1130db36e5e554ca89f20febe06dc7c3c22cd7b3bb,2023-02-07T14:19:00.787000 CVE-2023-2406,0,0,93360eeb7d23c99f5e3d8592b06b8d380a992d1764480465d68abc46a85ae39a,2023-11-07T04:12:36.890000 CVE-2023-24060,0,0,237020e686b9d1fc77a983ae9b232c7b16e133620015d99d897981c2e94f39f4,2023-02-07T19:13:09.287000 -CVE-2023-24062,0,0,39da6a2c0dee060e2c220cc306f485ad938c732d97a2852e7e8bc8e6d4307283,2024-08-08T18:55:19.180000 -CVE-2023-24063,0,0,d2d276fdc7e20d579200dd71bb4f397b60ae6b793deba0076a3dfd100c0097c9,2024-08-08T18:55:19.180000 -CVE-2023-24064,0,0,3c86b5ac0c2425add21eeb617ca14bb6ce52cadd8c775f1b96851bc02f201417,2024-08-09T16:35:00.767000 +CVE-2023-24062,0,1,7349391aa1b91dc2f7dd35a217ddf473498cadeb29f5897b6dc518a785304759,2024-08-19T19:05:06.027000 +CVE-2023-24063,0,1,c7aaa53e06b05b465c4c303b4d1d80d1b86df5b05165165b121a99c122768787,2024-08-19T19:04:47.293000 +CVE-2023-24064,0,1,ea608bd85f328e25ad346566e820e40989eae34a1962a7913afeb3fd2bab99c5,2024-08-19T19:04:26.627000 CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000 CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000 CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000 @@ -221702,7 +221702,7 @@ CVE-2023-2886,0,0,477489445a6f471cd3651b117fbf09416c16a3d7a4e7e46e8dd7486e10c87d CVE-2023-28862,0,0,1af0d4a2a1f54e0c65748ae11dcf6c8d306e7ce5050f714cb8bd21304ffd2ff4,2023-07-14T13:15:09.167000 CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000 CVE-2023-28864,0,0,324e76b8a1dbbfe673722acba31555a0a11e3e449df86950e1771c91d26b1827,2023-07-27T03:47:50.647000 -CVE-2023-28865,0,0,0b5939bc49d1627a61a4b56b13498126b70534afed562a060cb06f5ed580a858,2024-08-08T20:35:00.890000 +CVE-2023-28865,0,1,59f5aced1e9a27fe6de504aed10505799d2bbf17503d0ef304c45bed22fc30c9,2024-08-19T19:04:14.230000 CVE-2023-28866,0,0,943391c7b240adde0202bacb48afef5edfa2b7d2d32f1761a9ddbf651b944ce4,2023-11-07T04:10:55.740000 CVE-2023-28867,0,0,318a66eaa8452f89942f53703d11d40849d2cc65087bebb0348dcf4f3572c7cb,2023-04-03T14:01:07.433000 CVE-2023-28868,0,0,e275a03d8640a97b2d96fd845bc40f2c87b07888c0c512aa8d3aec81f7c1a577,2023-12-12T22:35:26.717000 @@ -222457,7 +222457,7 @@ CVE-2023-29863,0,0,b6bd6db6fe2aa7aa1a7d0ef7f07320fd9e38d1757d797078c9c9d4ac89842 CVE-2023-29867,0,0,30bdd4671fa6ae8d6d7fe7ab8c6abbc099ab141455a1d91de242099deb5b9a58,2023-05-10T17:26:40.840000 CVE-2023-29868,0,0,b913231836e85a95731d1a9f12ce4a8ef604e06b122d2d10140103e01bb2e99f,2023-05-10T18:45:38.753000 CVE-2023-2987,0,0,d15bf4014a51894f8c9ff162f2ff39355cece540b744a609503a1e837b355e50,2023-11-07T04:13:38.867000 -CVE-2023-29881,0,0,300f345582c2cb187024bd540e8dfc1a192ac70e889959b46eef45bce665ed38,2024-05-14T16:13:02.773000 +CVE-2023-29881,0,1,3fc30b0a8f12aa0ac550ace90faf269831400078ee885524aede4cd15e16b48a,2024-08-19T19:35:04.057000 CVE-2023-29887,0,0,5f6b06d8da9e96c6f44003a0f462b5937b093b6455d6dc3c8b859c8adea2a5c8,2023-04-27T17:15:31.560000 CVE-2023-2989,0,0,130389ac3f15e894f9cec47ed762614f99841e8cdfeaf9811d9eaa160be1ed98,2023-06-30T19:21:06.163000 CVE-2023-2990,0,0,9ae96a18830a05f9d0e3eab19f64ddd3c8cb68e494372564a399949075dfb111,2023-06-30T18:38:30.917000 @@ -224622,7 +224622,7 @@ CVE-2023-32759,0,0,5b480bee95be7598e6a567b953a0e456fb553838841eadca364c6ee585b7d CVE-2023-3276,0,0,f4491d158c12b53b474f753217bfd3d93c120c632f5fac06db929cf440048326,2024-05-17T02:27:24.320000 CVE-2023-32760,0,0,bff94b536dc0be158da155b67259826a54120a4a86aa9ff02dbb9b48a05ee3bb,2023-07-27T14:29:25.887000 CVE-2023-32761,0,0,de4cb5f54a4f9ef89da8b1f966d24e2559f07c2b35e468ba191520cc524ac2a2,2023-07-27T14:29:52.853000 -CVE-2023-32762,0,1,a78847cacc23ee02f9a3addaff470e665a3ebe2f91d006908a8f21884a87e4b0,2024-08-19T17:35:06.040000 +CVE-2023-32762,0,0,a78847cacc23ee02f9a3addaff470e665a3ebe2f91d006908a8f21884a87e4b0,2024-08-19T17:35:06.040000 CVE-2023-32763,0,0,ad7a3c3cbdb81e8c22e99d2f5089d2b183fb3ee1bbcbee9a1156b42a1c02c68e,2024-05-01T01:15:05.953000 CVE-2023-32764,0,0,b64fb1c871316cf87b4a49018b72aa882dd2a7d4df1c768a5a37dbf37f527f77,2023-08-08T18:20:53.467000 CVE-2023-32766,0,0,6be31123d236fded36c5810480b99f3b01f6c3e577ad883399d224a680925e5b,2023-06-09T22:42:16.930000 @@ -225010,7 +225010,7 @@ CVE-2023-33201,0,0,2597fe221e1f761d6b3e6cbfd030eadf4704e1547f552dc061c463420a08a CVE-2023-33202,0,0,e7e7f7c9ba650dcbf0171405662b00bcdfd5e41c4d322835f858a2d745b8a7ec,2024-01-25T14:15:25.783000 CVE-2023-33203,0,0,cf97be42175c0d354e6941d64dd260b17cae783a76d09f7b56e470976d97a999,2023-05-26T16:52:01.157000 CVE-2023-33204,0,0,6e4260f72baf73d6ea1ccb7950395df7ee85b3280176ec814ba5c18c1ed8d5f6,2023-11-07T04:14:46.243000 -CVE-2023-33206,0,0,069a20cf196b6cc388998f684b7fd1cec0d84254f62e6e743b05245176d02351,2024-08-10T16:35:00.407000 +CVE-2023-33206,0,1,670ad2f1fc71a5bf4d899271f0a39bdcd73d0caee633ab08fb67daade5aa74a4,2024-08-19T19:04:03.527000 CVE-2023-33207,0,0,db833585ca058f88a52ecdd20945cb37b2537bb7bd89e56de798e340453ba00b,2023-11-16T23:42:11.750000 CVE-2023-33208,0,0,452d00abc7c8385efc2c332f0818f4d3115f3a0e717b56374cce97c1d1eaf069,2023-08-31T18:40:52.317000 CVE-2023-33209,0,0,d8369996175c8373d5bfa6cb0ed4b69f08c78793d48f6b2cda42411d5f915879,2023-12-26T21:36:15.107000 @@ -229242,7 +229242,7 @@ CVE-2023-38940,0,0,9efb76eb7ae856d8f0701f4b9801fa50e5a28e05a1b18d89f2c215ccdfe76 CVE-2023-38941,0,0,1e1bcd179f872e35a8928ee921ca22ff72d442a73f2b7af7bd6b466055edd860,2023-08-14T18:17:39.230000 CVE-2023-38942,0,0,6f005f6e840b09796632754d285cd402b68e77792b4af4d3af0fa7e97c65080e,2023-08-14T18:40:24.287000 CVE-2023-38943,0,0,1d6e8b0ca705baa11d68ef0a995ae67cd6dd1d27d4ad115cf35db0b2d10a2f29,2023-08-09T17:16:40.333000 -CVE-2023-38944,0,0,c051db4326b418193fc5c261961befe70f746c5374ed8fe4bca54114943329a2,2024-03-06T15:18:08.093000 +CVE-2023-38944,0,1,83cd17756fabb3bd2974a12241e6d8ad285f34ab1c1e3d0bfb562b70cd2a7d04,2024-08-19T18:35:01.477000 CVE-2023-38945,0,0,b3443492f84cec4ac4dffb7d4608c3ecaa5fe5f2b22d0a972664663aaed158e3,2024-08-01T13:44:18.370000 CVE-2023-38946,0,0,151228275f9811254ab62028e457be29c69ef82c0b6dea78d5f804e8214b4750,2024-03-06T15:18:08.093000 CVE-2023-38947,0,0,005c7add3837054ed831ef7b615204f6da8a70df53969f423ee6e7fa00969cdc,2024-08-01T13:44:19.173000 @@ -230235,7 +230235,7 @@ CVE-2023-40254,0,0,27efb0368168d79caa00b4133031d8fb68b34ecfd132b042a5961f412575e CVE-2023-40256,0,0,b582804fa33a295156ceb4267c834e483bb86e84c99d0ec7c8c39444912512fe,2023-08-18T18:40:02.253000 CVE-2023-4026,0,0,3212945c551dc5c1719d7d6137de0348751110a933425a5bf5f780d8b6cb15ce,2023-11-07T04:22:03.850000 CVE-2023-40260,0,0,05bb0576fb08380ea903522d60f06a904bc360b72ae4772cbb05cfc33464fa32,2023-09-20T21:15:11.697000 -CVE-2023-40261,0,0,2bb2707eaf38ae47a3ebbf24bbb85ef61ac305425272eb21ee1b8aa5c7ca6e71,2024-08-14T16:15:10.437000 +CVE-2023-40261,0,1,e2782dc62275309ee61018d210c639435789bcc850830eece2e723e46b82410a,2024-08-19T19:03:54.307000 CVE-2023-40262,0,0,d58d63bce35087dda362e1111aeac9b1b75c4bd8ea1442d999e9a4301c6860b7,2024-02-15T04:33:52.467000 CVE-2023-40263,0,0,5624dd31a999eb07813388b5a3ed101dece0ae7506f50c2ff15d5500eaaece55,2024-02-15T04:33:23.013000 CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6af0,2024-02-16T20:56:44.780000 @@ -234263,7 +234263,7 @@ CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000 CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000 CVE-2023-46047,0,0,f5c37c94ca5fa594b714e2ffca7c2bdc6f46a8bdd28b18487a40447ff0803b85,2024-08-02T21:15:49.040000 -CVE-2023-46048,0,0,62ebed010bb43d558d001a4250988562ec7cbc5252e32bd24618ed68f54d9364,2024-08-02T21:15:49.117000 +CVE-2023-46048,0,1,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000 CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000 CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000 CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000 @@ -235095,7 +235095,7 @@ CVE-2023-47128,0,0,b85db1a22021ce2634bedf6937fce9e908e4bc4945d9a058c073acd35b619 CVE-2023-47129,0,0,2feb59592ce5ce619f0dbe39356022044137b62ac7fdf7341576491df67d3312,2023-11-17T17:15:02.653000 CVE-2023-4713,0,0,7ce8e1a4cd21a7ccb4dfe59ad2f944b72261e3a9e1df4d06a392d3df31c0e74f,2024-06-04T19:17:54.937000 CVE-2023-47130,0,0,99626e1381150c1e09884dff49fd6c2f723ae167bcc9874cd57b5ba796b23a94,2023-11-20T20:30:13.503000 -CVE-2023-47131,0,1,1f17bcf165c617ab98fe27cd04d2840b3530e5c7f34a2f6195d222315c628fe3,2024-08-19T17:35:06.470000 +CVE-2023-47131,0,0,1f17bcf165c617ab98fe27cd04d2840b3530e5c7f34a2f6195d222315c628fe3,2024-08-19T17:35:06.470000 CVE-2023-47132,0,0,0c99cc4e240db5f5dba4ea355163f57409599dd4f4974c0e64e1705697ecfca3,2024-02-15T17:07:31.827000 CVE-2023-4714,0,0,88791e8df305497262c231049cee74da124b9dd8910a01ba3e741344ccddea8e,2024-05-17T02:31:44.550000 CVE-2023-47140,0,0,27ac9d4e4f9c1df9620d5c2f8730221eb8cdfd60197a593e16c9afa644305be0,2024-01-11T16:58:30.733000 @@ -236188,7 +236188,7 @@ CVE-2023-4864,0,0,5e4e713f4a2743c129ea5063a4b32fd9ee7eae9e195855039cc002046cb1f0 CVE-2023-48641,0,0,1280df4608a256049a7464d7537771600ec8e87866846aa2fb4a0136aea0d500,2023-12-15T14:28:15.560000 CVE-2023-48642,0,0,6f82232b5872cfe8a5f483ecc51e89fbf83ed70bb3fce6aac912fbf0e65fa058,2023-12-14T18:38:31.893000 CVE-2023-48643,0,0,436dc591bbfe7d4fe8956e77d2a22242bc9894e1b5e9d57becef353a8713de84,2024-05-17T18:36:31.297000 -CVE-2023-48644,0,0,82d68134e841493c14f3fed334c54b5cdcd2826e42ad6358577ad6ad04012788,2024-03-06T15:18:08.093000 +CVE-2023-48644,0,1,5e5be15f1fbc02e79c5730bd0794299024e6fb4586d04faf70253bc9e2410791,2024-08-19T18:35:03.937000 CVE-2023-48645,0,0,445aa31383b8447535cd8a3988f7064641e17b0494ae077756994bb7ce4d7c45,2024-02-13T19:49:02.557000 CVE-2023-48646,0,0,3a5f0cf1d315027926be603dd291473218201c9c601aacec84430dcecba9a7e9,2023-12-01T19:02:22.553000 CVE-2023-48648,0,0,4a328c299a7d953fe36026512a40a258a38a0ae65a9f563b40d819752bec1baf,2023-11-22T00:06:56.547000 @@ -237113,7 +237113,7 @@ CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000 CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000 CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6a9,2023-10-05T17:04:09.880000 -CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000 +CVE-2023-49970,0,1,9df65b805c69b16aaa9364a0bc6f24d112184b4ed3304e8005e33d72286d9f69,2024-08-19T18:35:05.600000 CVE-2023-49971,0,0,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000 CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000 CVE-2023-49974,0,0,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000 @@ -237327,7 +237327,7 @@ CVE-2023-50292,0,0,7a8875fd461d83535a21377c0a69ae4616eec1966086eda7a3c5b72cfce25 CVE-2023-50293,0,0,0f2a070c8d56e21e18bc15ed69ec78f468ce803adefb02911e1f6dd464676048,2024-02-14T18:15:46.707000 CVE-2023-50294,0,0,76be02ecc7f67b29b647d39d288738980c3243419576dbe8b993f3e5ef481d90,2024-01-02T19:45:14.820000 CVE-2023-50297,0,0,377af72f6c89fc0e46b9660e8b2c6192bd69c1a81ea30ef4f3f601e394b25dd7,2024-01-04T15:57:56.167000 -CVE-2023-50298,0,1,05efb548cacc9e38e3a05c2471b4b2deb91f3f0b83709947d655733a242f557c,2024-08-19T17:35:07.590000 +CVE-2023-50298,0,0,05efb548cacc9e38e3a05c2471b4b2deb91f3f0b83709947d655733a242f557c,2024-08-19T17:35:07.590000 CVE-2023-5030,0,0,baa8609a990f56814a5ba8dd9495577324349a25a51fe3f4f221ce48042d5551,2024-05-17T02:32:47.803000 CVE-2023-50303,0,0,04eac9d14bf1dc3aa65071a8bc06d9048a964b36a98faaa3bac3085f23a59b31,2024-02-28T14:06:45.783000 CVE-2023-50304,0,0,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000 @@ -243154,9 +243154,9 @@ CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697e CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000 CVE-2024-20784,0,0,c6884bc627ed39cae939efd566f5b968239c6eaef242b82fbe3791e77cdfc6fc,2024-06-14T19:30:15.503000 CVE-2024-20785,0,0,2013df6eaaf2d2be10850161c767601a113a3dcbc6d19bf74fca25fa02ef32fb,2024-08-02T20:17:44.283000 -CVE-2024-20789,0,0,5ef52286d1bcf232e5f2b2b2c40cd4a55a24020e747e38cc936bf4db492eddaf,2024-08-14T17:49:14.177000 +CVE-2024-20789,0,1,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000 CVE-2024-2079,0,0,f10772ba31d142dba517b938901fc1b75b6b0e63ac1ac474e47c5b00d72243ad,2024-03-14T12:52:16.723000 -CVE-2024-20790,0,0,737bc304983ddd66a36a9d165d5a715126733150ee9cec01f7f58d5f7cd11e1a,2024-08-14T17:49:14.177000 +CVE-2024-20790,0,1,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000 CVE-2024-20791,0,0,92abf004621866415738accb490ffa897670b25d1da0d09c1386df503b25c235,2024-05-16T13:03:05.353000 CVE-2024-20792,0,0,bbcbe3e347c35cdbd78689d4241ba7bbcaebaa332d073a09d58f18df55de2fb4,2024-05-16T13:03:05.353000 CVE-2024-20793,0,0,af9be83b5ef185d84e14e7f39339429b5b48170bf7e6c7a259e576409d3e12ab,2024-05-16T13:03:05.353000 @@ -244311,7 +244311,7 @@ CVE-2024-22213,0,0,d89d1bcc1024fa43e4eb255fe1da4898df98a0204835a8aab97986ad487a9 CVE-2024-22216,0,0,4d4df2ecd199aa7618581804013bbe1e953dec7e554571ec3898fac4c64e9d2a,2024-02-15T20:09:29.663000 CVE-2024-22217,0,0,efeff8a61ce5eec295d77307c66eb2e8058ec26847d7270526961b6e3c0af923,2024-08-19T13:00:23.117000 CVE-2024-22218,0,0,803acdddb5a13426e90ae4cd1826dd9ea4a7cb915a128bae351c036e85dd5ae5,2024-08-19T13:00:23.117000 -CVE-2024-22219,0,0,0e5962449a9619bf26f4a1346c452bee56f2668b5c0b1d2d16653f318914a508,2024-08-19T13:00:23.117000 +CVE-2024-22219,0,1,826686450319c86e80f677bb7cee6144e6dc3d5c8e9c3dfd411b78482003182c,2024-08-19T18:35:06.827000 CVE-2024-2222,0,0,11625875cef37d942ee187e2a94de316442ea87eebee9bbcb3de8eb5e07a3e6e,2024-04-10T13:23:38.787000 CVE-2024-22220,0,0,e0b3c07a0f10db72074be82e1806c7e64ff7ce617eafb3be6d3de0ce93866b95,2024-02-22T19:07:27.197000 CVE-2024-22221,0,0,e19edd26a1c4c3dbc422242510974e3878733456edd7e30a89f97b0340db2a37,2024-02-16T13:40:34.093000 @@ -245058,7 +245058,7 @@ CVE-2024-2344,0,0,11b204885a38ce76288439d7d97d1d84c5464a602f99eb484aa99b808d016d CVE-2024-23440,0,0,888cd3d174129643abdafcbeddc64e6f21d5ae8e2b2e370f6f7b930a90b3e30a,2024-02-13T15:16:05.223000 CVE-2024-23441,0,0,390d5d2bcc3b1398b0150c0f0c98b785cb9627d9865bfc83ae73159a1a10f10c,2024-02-05T18:41:43.547000 CVE-2024-23442,0,0,5f8a68032ea653fbe64c514e7b6426371d76626b34b59cc1abb65dea78329a83,2024-08-07T16:32:00.580000 -CVE-2024-23443,0,0,7d95a67e0c3c1e1a5340f946ebeeb4d125f6be507c70062fa5f629aaaad965b4,2024-06-20T12:44:01.637000 +CVE-2024-23443,0,1,ec52c90b1bdd9302a1feb9cf7a1a344bef4f50d5729b639a22d6f8e35b652893,2024-08-19T19:33:31.207000 CVE-2024-23444,0,0,9d04c210297b8378296ccd9e937d21ef43ab4badaaad1c5feb386881ba03d55c,2024-08-01T12:42:36.933000 CVE-2024-23445,0,0,6c527df37925bfee88abbff37b4b4e377f6526ae267b170f8c243c193159d3f0,2024-06-13T18:36:09.010000 CVE-2024-23446,0,0,4d7124defa0cb48f303fd49a5701937ff8d343d7ed35efe26f93d719e40bd716,2024-02-14T20:10:24.323000 @@ -245301,6 +245301,7 @@ CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c0 CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000 CVE-2024-23726,0,0,49bfb3e940abfa1d8c182442ad4bd7c2d671bcc24ce62cd25d7197deab52125c,2024-01-29T15:25:36.090000 CVE-2024-23727,0,0,f69939e0ef14dd6612a53b973d502454f89e1f35e963c0b541f012fdf69dd089,2024-03-29T12:45:02.937000 +CVE-2024-23729,1,1,f8f87db100d899a0846e36f48d3117d1ff3456019c14cf716da7eccddfd2fdeb,2024-08-19T19:26:46.993000 CVE-2024-23730,0,0,4088c5b420c8561e609e86e9e6639362f96648106817a43f2c436ecb5e3da5bc,2024-01-29T15:22:56.753000 CVE-2024-23731,0,0,9e444542e77d768ae255d5361c86689c30d0d3ff31dd7c8827b69cb99e58f1a3,2024-01-26T21:11:25.430000 CVE-2024-23732,0,0,02703c2ad5218c00fbf227a383e9ac2f87b400985304eaa4f21127fe5bfed2aa,2024-01-26T21:11:51.840000 @@ -245329,7 +245330,7 @@ CVE-2024-23758,0,0,3ffe01e5849c29350b16e72f283a186df16bf63db40bd56bdf04a6fdd9681 CVE-2024-23759,0,0,7b8f90d14164aaef0f5274ab8cd0cd35c941b0f2a4c75bb44f448c7d8d1f721f,2024-02-15T04:49:02.133000 CVE-2024-2376,0,0,9e2099f4b58a69061afc220ef5842f9c8951cb095f07ed94c7b9c40dacf75e0b,2024-07-08T14:18:14.030000 CVE-2024-23760,0,0,f7144fbe6a9c74fd889c91067d8f4928194181e3dd45af686646cd9099fcf68b,2024-02-15T04:49:31.847000 -CVE-2024-23761,0,1,eda1ae06d63c9fc9e8f75b66566b9108bbb2c3391a729a6fbb5107c0ae6b7db4,2024-08-19T16:35:02.013000 +CVE-2024-23761,0,0,eda1ae06d63c9fc9e8f75b66566b9108bbb2c3391a729a6fbb5107c0ae6b7db4,2024-08-19T16:35:02.013000 CVE-2024-23762,0,0,dccea0d0f4f72e935db3cd4738ae0afc7e81200fb78885cb904f8f8d8505bb99,2024-02-15T04:49:42.123000 CVE-2024-23763,0,0,fd6bb7068b643be895795866753868b545c9ff02dc3b3575d3900d3b7ddc29be,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,e6776799806671e89b40fb29cea011f49ce6380839da8b1fc02e631b1db62327,2024-02-15T17:57:25.633000 @@ -245463,7 +245464,7 @@ CVE-2024-23893,0,0,164d34330c45802f3294effcca33fdb409e7a0b03670023eb0749752670b7 CVE-2024-23894,0,0,889e17a969f38341fe271e7476c4c00ec7834f36aa4750d6b24eda8dbc65e9f9,2024-02-15T10:15:20.110000 CVE-2024-23895,0,0,63b9df77b0dfe3156d702037b8256c94f0310299e58028bb29ff7e75ab1ccefd,2024-02-15T10:15:20.403000 CVE-2024-23896,0,0,2d68c15af19ed8b045c5f16b74c7daadbb5e999aff70f245f4f1ca2defc4aa73,2024-02-15T10:15:20.657000 -CVE-2024-23897,0,1,6ef7364117ae146b6e54c4c215aaadf4c0dfdcb974c1c8fe2a4eccae2f1c85b1,2024-08-19T16:35:06.997000 +CVE-2024-23897,0,0,6ef7364117ae146b6e54c4c215aaadf4c0dfdcb974c1c8fe2a4eccae2f1c85b1,2024-08-19T16:35:06.997000 CVE-2024-23898,0,0,9962562a99e711a1d1b8fcb160c14631afd493f3a9f73290bf49c075765f73c8,2024-05-14T15:01:24.790000 CVE-2024-23899,0,0,ba79d7c391f656b46c5ad4456d441adc8729de1168ad27fcd60687a8d33b9157,2024-01-31T18:43:39.183000 CVE-2024-2390,0,0,593c8d31509ee966f2939016d9952aa22804413956e5e4bcfec8a17bd5fc173d,2024-03-18T19:40:00.173000 @@ -245648,7 +245649,7 @@ CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856 CVE-2024-24303,0,0,1b8ff87407101e3ade8b623ffad8ec7905f9dec8c0366ab6b55ba0460b0fea60,2024-02-14T19:38:18.727000 CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000 CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000 -CVE-2024-24308,0,1,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000 +CVE-2024-24308,0,0,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000 CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000 CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000 CVE-2024-24310,0,0,af04adebe05e8114c2a9b004dbebb8cc6f695f58ee0a67c77d2adc708c42b448,2024-02-26T13:42:22.567000 @@ -245720,7 +245721,7 @@ CVE-2024-24488,0,0,8a1b774f9a98ad947e4d6a39beb8bb8d2efb3d9f71ed41c9871eba8bd31bb CVE-2024-2449,0,0,46b9f015783fbc3bb0212edf8e8eeec1124980baa369640fcf7ef0a9e4831bdd,2024-03-22T15:34:43.663000 CVE-2024-24494,0,0,a7dd406e19f10a49a8d0b51c18c583e66eb4d176999105897bbf24187168bce2,2024-02-09T01:37:59.330000 CVE-2024-24495,0,0,d8dc8002eed0ea108d34dc970ca4d2c41a2ed070b8ef5a1ea084dd472515eb65,2024-02-22T03:38:09.717000 -CVE-2024-24496,0,1,f687308707ba4596ac5d7eed5a3145bead05c7fe656edd13dca5cafff22f5de6,2024-08-19T17:35:09.977000 +CVE-2024-24496,0,0,f687308707ba4596ac5d7eed5a3145bead05c7fe656edd13dca5cafff22f5de6,2024-08-19T17:35:09.977000 CVE-2024-24497,0,0,4486a5209afad695cf15372283d911b20ffd5a0694006d7e7ad69dd4f26f29cb,2024-04-24T21:15:46.997000 CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab1310b0,2024-04-25T06:15:56.283000 CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000 @@ -246200,7 +246201,7 @@ CVE-2024-25153,0,0,23232740410354636be80fcc84fcc087a3c660934a01cb6cf2fe8d0b8ba9d CVE-2024-25154,0,0,287dee961cc5f3e7c6256ae0ba08349619160b48970a1430faecb89127db32f9,2024-03-13T18:16:18.563000 CVE-2024-25155,0,0,1d7983859d61945142ef2e8872f422d7a225c4f14d7bf78ef2435c14d9e9f5ea,2024-03-13T18:16:18.563000 CVE-2024-25156,0,0,5644f61e62691ed9b2ea36cf2dd30ea49f643127034e87e186f5419ac1deb692,2024-03-14T14:21:20.217000 -CVE-2024-25157,0,0,b232ea2fbe759e4ea19993eb79264b7980aa137be6321a81fc6c7c7ed0df7bdb,2024-08-14T17:49:14.177000 +CVE-2024-25157,0,1,0edd55f5fb0216b44e5282ca0b586c6a1b67f292bdf6bf407dcb1f3eacde1472,2024-08-19T18:57:58.657000 CVE-2024-2516,0,0,14566cb1daab665f74119ef85235fd35fa3b84dccd777ba113a66fd32edf19a9,2024-05-17T02:38:16.350000 CVE-2024-25164,0,0,759bf404d5770b9163c704f082cc395dd906a306da057b7d64ff4a44c31ee872,2024-08-16T16:35:03.903000 CVE-2024-25165,0,0,b60ae9c4b2953dad1606ed76f79140fa695e9553000ce7a315e2caf4198c7634,2024-02-15T06:23:39.303000 @@ -246281,7 +246282,7 @@ CVE-2024-25301,0,0,5043f0e7ca50172884f21dc687c9a1c4eb1786bc800fe875536ea2d4b4135 CVE-2024-25302,0,0,f2afe1c9ecd1526d483a9621fd5791f40cbdca36a51fd0c0f7c3df79efaf1112,2024-02-22T03:37:51.937000 CVE-2024-25304,0,0,80136a24bfe23aa700400c8dadd36d6b568d0c8d6520f9e45b768bf75c54fe51,2024-02-12T14:29:11.507000 CVE-2024-25305,0,0,8665772e555ea92ce25379a4815efe2cb413c78523823867d39e85baf79fda6c,2024-02-12T14:28:56.647000 -CVE-2024-25306,0,1,3f66cee7c8893d75460577bd010366bd477f455abca538b9119b35fcc9840ccd,2024-08-19T17:35:10.730000 +CVE-2024-25306,0,0,3f66cee7c8893d75460577bd010366bd477f455abca538b9119b35fcc9840ccd,2024-08-19T17:35:10.730000 CVE-2024-25307,0,0,557ebee825f649e9153b7394db397b34df9a29766f7b8819379458962ce8e3cb,2024-02-12T14:25:11.867000 CVE-2024-25308,0,0,08fe527fb25b1fc0fb56be9c668a7c9b2e7ea5e5e9b0982ab768c4ffdda1de91,2024-02-12T14:28:27.823000 CVE-2024-25309,0,0,acdb4b8e8c66453203abbca3b9115d9b15cd1cac2e4d16faf067b8ffe18b803d,2024-02-12T14:28:15.157000 @@ -246291,7 +246292,7 @@ CVE-2024-25312,0,0,72c281b05d6e1a426899b89ceba4ca12c4b8a71f8149cb54afed3a6f07f49 CVE-2024-25313,0,0,07b78ecd403fa1deec79411e34b2d3311b3a9ec0b63da9ad42796c87df16491a,2024-02-12T14:27:16.007000 CVE-2024-25314,0,0,fc20d050836e7cf5ef9a976aade2356d9fce1ce98012f65b8e810ef90dd972cf,2024-02-12T14:24:04.510000 CVE-2024-25315,0,0,27dfa2db8669c220fba00f5133bf79a7c8e96032de80bda11275553a0f076565,2024-02-12T14:23:41.613000 -CVE-2024-25316,0,1,dc0ffcbd049ed752bddaf4851795a99ca233f2e28b2566ba55c9e2779a3d0e37,2024-08-19T17:35:11.720000 +CVE-2024-25316,0,0,dc0ffcbd049ed752bddaf4851795a99ca233f2e28b2566ba55c9e2779a3d0e37,2024-08-19T17:35:11.720000 CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204bf71,2024-02-12T21:37:44.753000 CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000 CVE-2024-25320,0,0,af842a9080e1a2474b48f9d94aba0e31c99f072b88471f69ccaea451c1f5904e,2024-02-16T19:26:55.393000 @@ -246356,7 +246357,7 @@ CVE-2024-25443,0,0,f9f46e03349c3c7bab20646f2d76799e4fab073653be96db01bac732191b3 CVE-2024-25445,0,0,9513b3e5a2e30e7d6439b2cce4865346623e49c934516a91bc102f1687ad8e58,2024-02-20T02:15:51.397000 CVE-2024-25446,0,0,3c11965ca4e81e9d1569f1dd6522b78e4b65e063af110ebf0cf01ad3143f9f98,2024-02-20T02:15:51.470000 CVE-2024-25447,0,0,7d909a2c342e31aed240e1cfe87f76dce760e3351aada9bee6dacd1b1b419285,2024-02-15T04:39:16.863000 -CVE-2024-25448,0,1,20ec809c3bfb70237d51206b61029a5cea322d6a765f8b7b022225423e3a0a22,2024-08-19T17:35:12.597000 +CVE-2024-25448,0,0,20ec809c3bfb70237d51206b61029a5cea322d6a765f8b7b022225423e3a0a22,2024-08-19T17:35:12.597000 CVE-2024-2545,0,0,11a8125759bd46caeade9ff4dd7fdc9a4e0d596efdcafe12efc937659934560b,2024-03-19T17:15:12.983000 CVE-2024-25450,0,0,5ecdd1c04a9de90822437f6e1d56a7ed4d94bab9b549af9cb291fc11fc93c44c,2024-02-15T04:38:50.543000 CVE-2024-25451,0,0,b67f7e05891197894720d9d3975f43ca92b7ad9650aeabeea17b80016b66208b,2024-02-12T21:37:54.227000 @@ -248750,7 +248751,7 @@ CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139 CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000 CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000 CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000 -CVE-2024-28672,0,0,cd39d1fdf90137bb06b7bf130d6e97d1809e7cb18d315c08621547499fb882df,2024-03-13T18:15:58.530000 +CVE-2024-28672,0,1,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b4f2,2024-08-19T19:35:05.690000 CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000 CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000 CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000 @@ -248950,7 +248951,7 @@ CVE-2024-28957,0,0,0b6f09541cc545197668690ffbf9310f75a4b5c2876755b3d8d95cbf05284 CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000 CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000 CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000 -CVE-2024-28962,0,1,c41860d4e4ef271042dd44e8a7b90b33d6787be3e830d3a363ca8e815a2e299b,2024-08-19T17:12:57.750000 +CVE-2024-28962,0,0,c41860d4e4ef271042dd44e8a7b90b33d6787be3e830d3a363ca8e815a2e299b,2024-08-19T17:12:57.750000 CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000 CVE-2024-28964,0,0,668c3eb1130fe0883336d2377db58f6ba4d918c33aa5ccfcfc554147c62cb6c8,2024-08-16T16:44:09.413000 CVE-2024-28965,0,0,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000 @@ -248991,8 +248992,8 @@ CVE-2024-29009,0,0,6dcd01bf0d59bf460d4cd9884b30a56bb3cb07161c6547e79b2b88789b615 CVE-2024-2901,0,0,e2df063e5347fadf4cf214e5695112bea43ff5509c25d82b3b42077531327e19,2024-05-17T02:38:36.427000 CVE-2024-29010,0,0,a9ff9c65174c33f2e792fcb56ee4004994b28661d6208ebb1e88e717582f6f0d,2024-05-01T19:50:25.633000 CVE-2024-29011,0,0,eb92887d9a2ecd248daea80b2641ebf2c57344e5f41ce9050910fcddaf740a0c,2024-05-01T19:50:25.633000 -CVE-2024-29012,0,0,103f9b3a44d2959aebf7d265216e41c1e2620e9e61731cbb4f6a8a8377428556,2024-06-20T12:43:25.663000 -CVE-2024-29013,0,0,2dc9b1696c8642560df9830149c8475a352333f0c87b0c7a57248058bcd65c3c,2024-06-20T12:43:25.663000 +CVE-2024-29012,0,1,7c7c32533c82aaf22406acd8a658ea95d36fb7375f5076084cc597754864b6a9,2024-08-19T19:34:59.167000 +CVE-2024-29013,0,1,67b4d9c80d914ad0bed565ffb846138fde0fb1daab078996874ed199eeb14f9e,2024-08-19T19:21:08.777000 CVE-2024-29014,0,0,727bca255016a056117f183cd0537f37a7ac804396b0c606f5bbb22eb38674ae,2024-08-01T13:49:23.520000 CVE-2024-29015,0,0,f87c9b22620dd8e8504ff7baceae16d45f38e42f71f52e70d076cdf67c7ca83d,2024-08-14T17:49:14.177000 CVE-2024-29018,0,0,0688752b1434844c55e6cd721e2221622ec0094595898dc16074b9d8a9b658da,2024-03-21T12:58:51.093000 @@ -249267,7 +249268,7 @@ CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069ea CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000 -CVE-2024-29421,0,0,6826b9fe55a6ce269f54b68fd1bbe638df91af6ea8d17c781e85364a21d98669,2024-05-22T18:59:20.240000 +CVE-2024-29421,0,1,c6dafd45a8c53dbcd9097903b14403adcbaf4c0772c34ab01e88eb134a14b126,2024-08-19T18:35:07.660000 CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f48,2024-05-17T02:38:38.790000 CVE-2024-29432,0,0,f1924d827bda5c2f21240d1e0d34760e21d63eb9bed07776f47d0288afb9aa18,2024-04-03T12:38:04.840000 CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000 @@ -249764,7 +249765,7 @@ CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000 CVE-2024-3017,0,0,b401b23402ebc6f6ec3d2296f1d5b4f9799017607076ff54b8bb35750200243b,2024-06-27T19:25:12.067000 CVE-2024-30170,0,0,cfe0eb8b7b3f847ca52fcf65cc23d512fa1cb604da9a76e828706eb61b361e3a,2024-08-12T16:13:53.803000 -CVE-2024-30171,0,0,a303030da6dd4ea6781306128867049fd2796ab1046058a6c2cefdda88e2976e,2024-06-14T13:15:51.603000 +CVE-2024-30171,0,1,a054e0dd8c720b4bdd9579beb1d65acc89fe1ba4a7ad35fbd80151de95e57949,2024-08-19T18:35:08.793000 CVE-2024-30172,0,0,e23d65cae1ab6574d22c6026de16bab78b6c6028b759790600f9957da66d8b50,2024-06-14T13:15:51.730000 CVE-2024-30176,0,0,b9c656776bec57369b0fb415cb86239071847d4185cfc200250f61ff82ba37c3,2024-05-01T19:50:25.633000 CVE-2024-30177,0,0,df35a874768fb67f0f9af572132423fb724b172bc8802b6ae0e895e47f280bdb,2024-03-27T12:29:30.307000 @@ -250318,7 +250319,7 @@ CVE-2024-30851,0,0,50f4be60cfd340e55ad1701da02739f1151719e7af37a9957f274744dd91c CVE-2024-30858,0,0,93e0a53927efd0637571ec0f8079f664a09ad42dbc1f395dcf941f97a4b21575,2024-08-01T13:50:29.850000 CVE-2024-30859,0,0,cb3a05b13bb3d557f99196539489ef40266ca1d1884c327caec647dd84413ea6,2024-08-16T19:35:10.010000 CVE-2024-3086,0,0,bf4cb4e0e77596531b4d2ac34fc073ac688bdd0873b18b3978dd0f7954009022,2024-05-17T02:39:42.693000 -CVE-2024-30860,0,1,9bdfc2db70afd889277b07183a72c7f92c8e82e29cb1bf435dfec54f9b9bc0b3,2024-08-19T17:35:13.650000 +CVE-2024-30860,0,0,9bdfc2db70afd889277b07183a72c7f92c8e82e29cb1bf435dfec54f9b9bc0b3,2024-08-19T17:35:13.650000 CVE-2024-30861,0,0,6311d30f796f82bf3d64d6fdf692631cac6a43d1f01e8d19227025fedae3ac05,2024-04-02T12:50:42.233000 CVE-2024-30862,0,0,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000 CVE-2024-30863,0,0,752ea16078bb63c47f206209c0fa643692a30c4ca55b96c3971f17949cd6ccfc,2024-04-02T12:50:42.233000 @@ -250329,7 +250330,7 @@ CVE-2024-30867,0,0,fbf3f5ca73df140136450e529bc316e8848d5d3ecfcec233c1b829a9bf6a2 CVE-2024-30868,0,0,40572fc00d47dcab0a02e3b982268eb31daa0424a9f9ba994981729836c30bef,2024-08-01T13:50:30.630000 CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d4f,2024-05-17T02:39:42.787000 CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000 -CVE-2024-30871,0,1,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000 +CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000 CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000 @@ -250629,7 +250630,7 @@ CVE-2024-31322,0,0,d20c4b5ba34b42a0392eed2de4ecf00db6c97fef76cc64c816a4b4ded912e CVE-2024-31323,0,0,9037ab145a8eaf22356dc2d8d32c3f7b97b37d0518a06cda16b86aed0b6e3425,2024-07-12T16:11:33.047000 CVE-2024-31324,0,0,97d477007c60c4e7e015994eba22a07898b7757a6832226ecfcf605a078ce0fe,2024-07-11T15:05:41.280000 CVE-2024-31325,0,0,a9bcdbd792a6ed8c686901e49872aa0bea6152484f11f86c22b43dfd437d3917,2024-08-01T13:50:51.583000 -CVE-2024-31326,0,1,97d123c2aa1e1e9a7489aadcba3a4341ca3ee3d2d31afc6659975d4411771d64,2024-08-19T16:35:12.080000 +CVE-2024-31326,0,0,97d123c2aa1e1e9a7489aadcba3a4341ca3ee3d2d31afc6659975d4411771d64,2024-08-19T16:35:12.080000 CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000 CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000 @@ -250833,7 +250834,7 @@ CVE-2024-31609,0,0,fae7dc20cbed60c4a9ac4dc64e5b7d82da62be1a3c274018ad6ee2763de92 CVE-2024-3161,0,0,cb1d741ba2940c183ffb95823cf44b340276dacb5b80290f88304f9e200c7a69,2024-05-02T18:00:37.360000 CVE-2024-31610,0,0,8d12739de6da38dfcfa2458401e3c67444fca5d03ee501d4c6c239a7b86abdc9,2024-08-15T16:35:07.883000 CVE-2024-31611,0,0,922c068e1b8fa15f4d68c71058c16061c333a9f74f3b60f54aa9aaeaee657115,2024-08-01T13:51:02.050000 -CVE-2024-31612,0,1,894c381a5072057f7085f7b85db8728579b1de2887a908b942731421d4afb3b7,2024-08-19T17:35:15.147000 +CVE-2024-31612,0,0,894c381a5072057f7085f7b85db8728579b1de2887a908b942731421d4afb3b7,2024-08-19T17:35:15.147000 CVE-2024-31613,0,0,7df2ea1deb0cc640645d232335ba1c5fd48e61411261ad2c4b495390666a6f2c,2024-08-19T15:35:03.517000 CVE-2024-31615,0,0,d368b7afcddf8004edd5887f0583685e84be26fc0d3934bf749ef04013bb7fc3,2024-07-03T01:55:14.960000 CVE-2024-31616,0,0,1084c6c3d6d8aa5c511ab3dfa4028831dd239a202d2424f408608d0ae03fc34e,2024-07-03T01:55:15.753000 @@ -251278,7 +251279,7 @@ CVE-2024-32352,0,0,d332e53ad000ad8435c81c28241440757adaa084990611f8a2796504f9f9e CVE-2024-32353,0,0,95056727f707fc243928d89d790259f229ec041cac954a579b9099dbee969c0b,2024-07-03T01:56:22.500000 CVE-2024-32354,0,0,7a51f481a311ea6ef8a37cf0ab90a70652431f14a7a615163cc4248af79f2619,2024-07-03T01:56:23.250000 CVE-2024-32355,0,0,968872e2f9388a4f300a29bf059bb9d041ad5f1af64c12a13c06a0c4c507e69c,2024-07-03T01:56:24.003000 -CVE-2024-32358,0,1,3ebca8ae73e2c2be26b4ababfedc4ad15dcc001bbdfb6be09053bb997464bb6c,2024-08-19T17:15:07.407000 +CVE-2024-32358,0,0,3ebca8ae73e2c2be26b4ababfedc4ad15dcc001bbdfb6be09053bb997464bb6c,2024-08-19T17:15:07.407000 CVE-2024-32359,0,0,5f5adaa7c351afc161843c430c2d85ebb8e96c4f13e61a22d9be5940d569bde0,2024-07-03T01:56:24.743000 CVE-2024-3236,0,0,ec36abc2f11295d96bb4af829279736b1662391782f95917c947e11ba35b7504,2024-07-03T02:06:05.707000 CVE-2024-32368,0,0,a245b295adfa06788541a26df62f1afc9fccb21b7ad815d7b584befe0d95c5a6,2024-07-03T01:56:25.517000 @@ -251484,7 +251485,7 @@ CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000 -CVE-2024-32611,0,0,2310031ef5af96912f44f0f7e5319f735ea5afde954f456c8fb33e30d583bb91,2024-05-14T16:12:23.490000 +CVE-2024-32611,0,1,abc754efada8aafebf0fe0506c081c90cf76bdf375a890d26aade6a81a7fbaab,2024-08-19T18:35:09.720000 CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 CVE-2024-32614,0,0,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 @@ -251782,8 +251783,8 @@ CVE-2024-32923,0,0,d11adde4640e73dc73d759e597c25734ba397f72eb5611b0862ba5e0b613d CVE-2024-32924,0,0,6164bfab82ba6f7007383697d807afc74f25042caf88c7185f8f60f004aee140,2024-06-17T12:43:31.090000 CVE-2024-32925,0,0,952975d13abb7eac228747d03392395178a367274ac09eb4f5daa7e782f272a8,2024-07-03T01:57:18.617000 CVE-2024-32926,0,0,9ef7e8771a6566bb36cb9f88d81a05eda20461f6e380085d4cd6c336f418a7f8,2024-07-03T01:57:19.363000 -CVE-2024-32927,1,1,9e86999f1378ee5001eda336106f870667dfb4132c1490ef6b01d8dcfd13b700,2024-08-19T17:15:07.493000 -CVE-2024-32928,1,1,92dac969bc9e5f21f62e503c71d9faf7620f880ac9a4d1ca3e0988746fbc4aa4,2024-08-19T17:15:07.557000 +CVE-2024-32927,0,1,a78fc6b80483bd4d8c68ac2665b5759b35609385b8680a31aaa2aa1c568f67d9,2024-08-19T18:36:20.123000 +CVE-2024-32928,0,1,ec567f575f2b571bf7e008fd05bb832785e6dde6a10dde842d571fef6f474b36,2024-08-19T18:36:20.123000 CVE-2024-32929,0,0,17d10f21930634adcf648f3a1af5dffaf801c17e6eb1045912f45ef7311ec215,2024-07-03T01:57:19.547000 CVE-2024-3293,0,0,83ffac847878c264dc6ac6eac7b38e37082e6b861b5988770c12a0259c7b42c0,2024-04-23T12:52:26.253000 CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 @@ -252528,16 +252529,16 @@ CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a3 CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39c9b,2024-08-07T15:15:54.640000 CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000 CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000 -CVE-2024-34117,0,0,463638b846e9066dcaf7523036981f5a6481df0714b9fa650623eacd9ca2b038,2024-08-14T17:49:14.177000 +CVE-2024-34117,0,1,145b6534dbb32e064b1f8e11a16bb9e3f70fe3f597d50441e5e65656ea159267,2024-08-19T18:57:27.057000 CVE-2024-34118,0,0,def1ef4f0d237934e763e168f4db1b4c3563826c7ed8bb71e24ecd9d8e332a05,2024-08-15T16:48:41.250000 CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000 CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000 CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000 CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 -CVE-2024-34124,0,0,67713b1abf5858aa4785bfd235a2fe65fdac4af7a6b9afc3fa1f10d132cf8673,2024-08-14T17:49:14.177000 -CVE-2024-34125,0,0,3022b633c72760009759833f073f93b613e57ef081a87e85973d0309853036f9,2024-08-14T17:49:14.177000 -CVE-2024-34126,0,0,0df2f61bfa908a2e6f031fecebdd0a4e84f17974477d80e2d2baf9a403d9ccab,2024-08-14T17:49:14.177000 +CVE-2024-34124,0,1,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000 +CVE-2024-34125,0,1,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000 +CVE-2024-34126,0,1,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000 CVE-2024-34127,0,0,06c2fc49cbcf18b0add9499f10b3a0814654b0e291f183a8ee09c382b3d1ec3c,2024-08-16T18:22:57.230000 CVE-2024-34128,0,0,c97915102dfd0e38974bf97aab68fa646e656f1eb3dd71f8dec0f1259a6cd8d8,2024-07-24T12:55:13.223000 CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf739aa,2024-08-07T15:15:55.070000 @@ -253052,7 +253053,7 @@ CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193d CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000 -CVE-2024-34905,0,0,8f715775efa5f2cb6821773a0f3ecf41761534acf446c0bd655f5e851ad343e1,2024-05-23T21:03:49.143000 +CVE-2024-34905,0,1,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000 CVE-2024-34906,0,0,2d514f74a75383567e242812745d1978f5a5608d1bafa528fe1c42a0f093f8ed,2024-05-23T20:42:22.080000 CVE-2024-34909,0,0,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000 CVE-2024-3491,0,0,3f53627a80e697de4556db2343c1e928afb824dee19f0a6a29ac6e39296f869d,2024-04-23T12:52:09.397000 @@ -253088,7 +253089,7 @@ CVE-2024-34952,0,0,0b3ec7ed40085393e2071bc6d9d415733ee6d2bb94374bd8520452bf00077 CVE-2024-34953,0,0,9b4f59e590af18fd55ab03e8f9e2f9ac1fc4af0855347fdb3f9d86b63ec479e7,2024-07-03T02:01:02.633000 CVE-2024-34954,0,0,45e121e6345d7be55b9749f21543978dc6493002df1fa3a1d0cfcf004930bd3b,2024-07-03T02:01:03.443000 CVE-2024-34955,0,0,7a2a0569f5aa95b45d53d7582b004bd82e7e0d9ae6204893a1e3037127239dba,2024-07-03T02:01:04.230000 -CVE-2024-34957,0,1,ea571c3e9e8f618beeabc6f5cf5c9681aa11d835512d900c7067b9bea2783a24,2024-08-19T17:35:16.190000 +CVE-2024-34957,0,0,ea571c3e9e8f618beeabc6f5cf5c9681aa11d835512d900c7067b9bea2783a24,2024-08-19T17:35:16.190000 CVE-2024-34958,0,0,7772d236e28ce720831d1562351692ec3fb0f968280070f3d68847761852466d,2024-07-03T02:01:05.013000 CVE-2024-34959,0,0,5772ca0dd874715925cf4da6c25b5b6ba5531d062cdf4f1c5ebda80fd41560f3,2024-07-03T02:01:05.837000 CVE-2024-3496,0,0,bef13f538775198780ddc65a6f3a5a754b7e93a7523db13d7bd4c988bca6518d,2024-06-17T12:42:04.623000 @@ -253110,7 +253111,7 @@ CVE-2024-34997,0,0,f1e18585236e7f0a59fe769dd2659091355a2fe62bd1315f5027e11c678fa CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000 CVE-2024-35010,0,0,d24eb37231999ffbf1e461e69272836338e2106e037fb208bca0adcf07905054,2024-05-14T19:17:55.627000 -CVE-2024-35011,0,1,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 +CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000 CVE-2024-3504,0,0,a42f8ac1fac363333b405982ab027a9d178fec8dfeb59e9ca1c856bcb976b308,2024-06-07T14:56:05.647000 @@ -253132,7 +253133,7 @@ CVE-2024-35081,0,0,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d CVE-2024-35082,0,0,50893ba92bdaace4fd9b61f50c725a7911d5b698ac51e1ad37d8182767cd2ba8,2024-05-24T01:15:30.977000 CVE-2024-35083,0,0,7526f5c67c7c61f5e9524d88bffbd1f53b2e6e3fe0b16c03a5885c0421346696,2024-05-24T01:15:30.977000 CVE-2024-35084,0,0,ac2799cc1434dfc2c78149fd1b6245909a5d0ccbc943a72e9768ed8158560b71,2024-07-03T02:01:21.793000 -CVE-2024-35085,0,1,28b8104ff5f9fa8bc166e7b90ee75abfa07185cbfa227faaf969ddb5ab2e1407,2024-08-19T16:35:14.260000 +CVE-2024-35085,0,0,28b8104ff5f9fa8bc166e7b90ee75abfa07185cbfa227faaf969ddb5ab2e1407,2024-08-19T16:35:14.260000 CVE-2024-35086,0,0,bbb34dc58989be1196237a9d847c0e01aed13ed3f437f7e1bef961a874339d86,2024-07-03T02:01:22.567000 CVE-2024-35090,0,0,fcec4966283ec758c35452912d07c396d8308e9542552d721f67b474abaeaa56,2024-08-07T20:35:18.150000 CVE-2024-35091,0,0,8ce03c642dca3dfa767597ef60ba73b0771113dbd73075f25280434bbd2b27ad,2024-08-16T19:35:12.257000 @@ -253288,7 +253289,7 @@ CVE-2024-35326,0,0,ad7cc16d1aaa5f108e8887341cf441bba2b53899da4792ec6b77378bf1ba3 CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd50be,2024-07-19T15:25:50.030000 CVE-2024-35329,0,0,4d7aa78fa054a9381ac03b56ef696af98c93a3855ee38f8a31593aacb03aa73e,2024-08-02T03:15:51.520000 CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000 -CVE-2024-35333,0,1,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000 +CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000 CVE-2024-35338,0,0,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000 CVE-2024-35339,0,0,27659885c77262f10b2ac6a10c180eb91a4365160764e7ab72c9ce6ae36ec759,2024-08-16T19:35:13.020000 CVE-2024-3534,0,0,a24b539c4ddbcbbbcd76a0a70e496243d7203c000aa2dbf195c274be99bd3f1c,2024-05-17T02:39:59.703000 @@ -253297,7 +253298,7 @@ CVE-2024-35341,0,0,2394ba36fcc9e849f9840edb2ba384b36eee4d7eebd73846ccbdccf118ee1 CVE-2024-35342,0,0,a4f7369f8f0a6de9d16902cacb7a44f46ba0a7d7f218612f1259029d70c7f06e,2024-05-29T13:02:09.280000 CVE-2024-35343,0,0,afbb68674236a89009facceb114c5d242ad657f17e86d5d8fbbfd0cec8107edb,2024-08-01T13:52:37.563000 CVE-2024-35344,0,0,bc74dd675a5dce7f00a3f726cd43afdec09d5a821ebe8ae8c283145b225cfc80,2024-05-29T13:02:09.280000 -CVE-2024-35345,0,1,94f6cac212d9f349d4de9b7da46a3407365d342f37822b3360eee738ef0a1e40,2024-08-19T17:35:17.703000 +CVE-2024-35345,0,0,94f6cac212d9f349d4de9b7da46a3407365d342f37822b3360eee738ef0a1e40,2024-08-19T17:35:17.703000 CVE-2024-35349,0,0,11658c700be6076291828420e77d9bdb67d68c65b2a15cfc033913a7e5b5639c,2024-08-01T13:52:38.343000 CVE-2024-3535,0,0,73d791a5850d78576003eae31f8a489c9a6c4b90f35033ec73a578c9367a898c,2024-05-17T02:39:59.803000 CVE-2024-35350,0,0,e596350b63af6a3fd5a9ea71cc091d69ecc8ca9756da6b52fb081734d570d495,2024-07-03T02:01:34.357000 @@ -253314,7 +253315,7 @@ CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cef CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000 CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000 CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000 -CVE-2024-35373,0,0,91b3eb7485cd766ab8c363f1f6697a3fd29cf35f3241c95a139434108968f350,2024-05-28T12:39:42.673000 +CVE-2024-35373,0,1,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000 CVE-2024-35374,0,0,71bf5143a935358076633b16ef6d586d6b493af4d13be33b4867bf136b6a604a,2024-05-28T17:15:10.937000 CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000 CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000 @@ -253382,7 +253383,7 @@ CVE-2024-35558,0,0,e3fd2a49061dcf165a9f23ddbb89ab4aad5c6769021a7ee059a07965cb38a CVE-2024-35559,0,0,567b6880d14443b1ae9f48b92c8e2230d656fdae8fe7665c8cab362d07c935a8,2024-07-03T02:01:52.063000 CVE-2024-3556,0,0,9787ca18b88896ee1584412198f4dc04ba2a937adc3d7411830de60cf4601cb2,2024-04-09T22:15:07.470000 CVE-2024-35560,0,0,ff151a7a7d20f3bafb68c34544272bf8fe13bc313aeb97863454326a7a0d4ff0,2024-07-03T02:01:52.840000 -CVE-2024-35561,0,1,0f98d3d1d82169454df85fa83ca0314a03305baa144f8463e8917c2d376c1b99,2024-08-19T16:35:16.997000 +CVE-2024-35561,0,0,0f98d3d1d82169454df85fa83ca0314a03305baa144f8463e8917c2d376c1b99,2024-08-19T16:35:16.997000 CVE-2024-35563,0,0,1bfa223c0dfd285b34476b24e0896f1c65800d9fe09bf0f44cc0c8c65f260e6d,2024-05-29T13:02:09.280000 CVE-2024-3557,0,0,9b81ae4b28f3d03624006d648ce1a0a6ebabae2aa06c1a39550ab506cbe47513,2024-05-24T13:03:11.993000 CVE-2024-35570,0,0,117a724a498932850802f3f22448be111c00fb8192d78e6cc7cb1dda478483d7,2024-05-24T01:15:30.977000 @@ -253861,7 +253862,7 @@ CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950c CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000 CVE-2024-36052,0,0,022010471f20b33cdbb9c0f6e926c1a4caaff0d72570a4d1a2abd38ceffab587,2024-05-22T12:46:53.887000 CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000 -CVE-2024-36054,0,0,7db67ad1cf8579f9da500f4f983886f21a05c34eda4e798748f79d61c10aaa0d,2024-05-28T12:39:28.377000 +CVE-2024-36054,0,1,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000 CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635757,2024-05-28T12:39:28.377000 CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 @@ -254204,8 +254205,8 @@ CVE-2024-36540,0,0,3e3503c7f79b3195337d8b0f1e38320534b7157865481ac23c232b4e96a5c CVE-2024-36541,0,0,b5291ecad28b9af4ed1704c2ed0f9af422de7d38da1fbc69723e312c6c52ab9c,2024-08-01T13:53:05.347000 CVE-2024-36542,0,0,4df09cc2abdf3caca422217226bc2f709ae2db68bdb5b96a0a920b5965caf0bc,2024-08-01T13:53:06.130000 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 -CVE-2024-36547,0,1,1b4cc0318f47a7d1f45dacca15d9b24343df7af637add62667d3afc6feef36f0,2024-08-19T17:35:18.467000 -CVE-2024-36548,0,1,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd196828a6,2024-08-19T16:35:18.257000 +CVE-2024-36547,0,0,1b4cc0318f47a7d1f45dacca15d9b24343df7af637add62667d3afc6feef36f0,2024-08-19T17:35:18.467000 +CVE-2024-36548,0,0,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd196828a6,2024-08-19T16:35:18.257000 CVE-2024-36549,0,0,55197a9eb0c500888bab7cc4a629fb75ed440d45a5f54f4b25e5199e4a6cc60a,2024-08-14T20:35:11.993000 CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e605,2024-06-06T15:24:43.683000 CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000 @@ -254220,7 +254221,7 @@ CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363 CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000 CVE-2024-36580,0,0,4e1be53a2f39c0a80b55fee3f7dc36a6db304045cdf599ebdf8f8db467e32f50,2024-06-20T12:44:22.977000 CVE-2024-36581,0,0,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000 -CVE-2024-36582,0,1,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000 +CVE-2024-36582,0,0,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000 CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000 CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1aacc,2024-07-03T02:03:22.850000 CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000 @@ -254243,8 +254244,8 @@ CVE-2024-36650,0,0,a6dc4fabc18762dbfb018c0e11850a01ac287f515682c65a85c025009c270 CVE-2024-36656,0,0,da14d6f6b98aba8dd134bbca05ce0beee2307c23e23b68d72ed361bfc76eaea0,2024-07-03T02:03:27.067000 CVE-2024-3666,0,0,6ad9793fce3985f8c3a050857cc50fdd13adc9821f463b47a95b3582d82793f8,2024-05-22T12:46:53.887000 CVE-2024-36667,0,0,5d33fe3dbd06350728f68e53202da54b1d3af96f7e9839cbb620a2859de830e2,2024-06-27T14:53:18.847000 -CVE-2024-36668,0,1,e89c82c7c160394ecd7b95ff1019b3a4f5a00e165fb18cb7d323518ccaecb04b,2024-08-19T16:35:19.070000 -CVE-2024-36669,0,1,104d3a672bff1b5eaa10a113e663439a5f312f1541afff3e81ca8512250c4931,2024-08-19T17:35:19.970000 +CVE-2024-36668,0,0,e89c82c7c160394ecd7b95ff1019b3a4f5a00e165fb18cb7d323518ccaecb04b,2024-08-19T16:35:19.070000 +CVE-2024-36669,0,0,104d3a672bff1b5eaa10a113e663439a5f312f1541afff3e81ca8512250c4931,2024-08-19T17:35:19.970000 CVE-2024-3667,0,0,67c8386bf84232df2260001ef819e9d91b62f19cfb2a953cb76f444117b56973,2024-06-06T14:07:44.473000 CVE-2024-36670,0,0,98051372c03c4f8daf963a6b52983fb8a9582924dc9f1a3de21e1b0831613748,2024-07-03T02:03:27.853000 CVE-2024-36673,0,0,cb39668f9f58f2d8a6040611ae210c70420486b9fecf13d73a34b4086d9c3fd5,2024-08-16T18:35:11.847000 @@ -254259,7 +254260,7 @@ CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f2 CVE-2024-36681,0,0,91ab5a39355fb60d1e0e5e355644e5363b5d880ec14684cab5ae1016626028b9,2024-07-03T02:03:31.853000 CVE-2024-36682,0,0,607667f3d3fa1e7539487ebcdf60477393019c86221af3075a4b31a59983923e,2024-08-01T13:53:12.263000 CVE-2024-36683,0,0,18a76ea23a5695131ac0a1a1cae26aee3d1ea92ed38cb283b784e28da9cb3b8c,2024-06-25T12:24:17.873000 -CVE-2024-36684,0,0,46cde669020b4adee4a3c38dfab2f5ae8aba838dcea159d2669f3c5e52bc3a8a,2024-08-01T13:53:13.027000 +CVE-2024-36684,0,1,92f14ba44da3232d94fa9d8919d066f2f528d700fa94d6456ec4eb59fdec8f01,2024-08-19T18:51:09.050000 CVE-2024-3669,0,0,adf9cc4d7b16c7513726b84fd5b10bd94ac2985d9cd2d264bea2883110b227ce,2024-08-01T13:56:38.537000 CVE-2024-36691,0,0,eb4ea08bf79d1a6ac1d98f330c6ba45260957add9ca280d2ec95e1cc61898b85,2024-06-13T18:36:09.010000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 @@ -254315,7 +254316,7 @@ CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b6 CVE-2024-3684,0,0,ef6904f473bb993a6bf9ca34fba021c50efb8f96f04049399eccb5be29999ef7,2024-04-19T16:19:49.043000 CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000 CVE-2024-36843,0,0,9015deb54483bbcbcf02bd2036f67dfa0518d8cfe31e8126a4a07c18b90651be,2024-07-09T19:15:11.767000 -CVE-2024-36844,0,1,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000 +CVE-2024-36844,0,0,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000 CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000 CVE-2024-3685,0,0,dda0c71ef8f633473513e14b8b76ca4b9f78357b8af623185fa69818b961df70,2024-05-17T02:40:03.840000 CVE-2024-36856,0,0,428da7159e6af3ad222a9ec24a9e21a9c38c9d1e6381cf02af11d68bd1668b7e,2024-06-13T18:36:09.013000 @@ -254430,7 +254431,7 @@ CVE-2024-36974,0,0,aa342464f56df4c331d398bcc0f3e68d9c36f35501b54bcc80e29a36fedbd CVE-2024-36975,0,0,5fee8a8667371d6492e42fc16656270b45581df0fcea64415a84141dc6966f70,2024-06-20T12:44:01.637000 CVE-2024-36976,0,0,fdc6207792d51a430faf64adc2235b757ae064cff90a05a32bfebe9af7605312,2024-06-20T12:44:01.637000 CVE-2024-36977,0,0,2fe5f328cd77d8e3e2ff7d8822b2b0f7e95a6c6361c8a1a46715f250c7c3d5da,2024-06-20T12:44:01.637000 -CVE-2024-36978,0,0,03f85f1a7686634c88ab5c53caf6a2bfd14ca8c3ed8c73fcd82e880221ca89c1,2024-07-05T08:15:03.020000 +CVE-2024-36978,0,1,dcc0f04e3fc2821d8402c617b55b3d37be597fffff7df9cf9ec9b8398c9978a0,2024-08-19T18:31:13.670000 CVE-2024-36979,0,0,fae9575e67be5b18a1235e7f3f58f40e4f1d0fa2298698b8ae07de388a8facc1,2024-06-20T12:44:01.637000 CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c91,2024-05-17T02:40:04.800000 CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000 @@ -254519,7 +254520,7 @@ CVE-2024-37091,0,0,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3a6b,2024-06-24T19:26:54.367000 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 -CVE-2024-37099,1,1,ba5216fcc209ff8c5a6bf3652db8b2f83b225e702069b25fc00e85fb5ca97269,2024-08-19T17:15:07.700000 +CVE-2024-37099,0,1,a39e3257caa4b07cd04194d82985cca1229e701a3b0127c95c1bc7803636b428,2024-08-19T18:36:20.123000 CVE-2024-3710,0,0,b54f7b8999ad064535445b5fd4766a137ffc70ceb349f28f8c5f7d65dfa1d3ae,2024-08-01T13:56:40.053000 CVE-2024-37100,0,0,2b3fe9b89db247c6739af47c680e25c99c767f88c107eecdb29b2289fcbaa161,2024-07-26T13:27:50.583000 CVE-2024-37101,0,0,97e2e32c34ae252be2daf95c15efc1d10b3c02ed553eff869e9373b422ad3f71,2024-07-26T13:28:35.413000 @@ -254994,9 +254995,9 @@ CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe CVE-2024-37880,0,0,e6a073a13f4d5d80acb782a97b27605fba3820cc74e70d67b997f08c66f11a31,2024-08-01T13:54:27.953000 CVE-2024-37881,0,0,e093bcdbd16679bd51273f21b0d2d0887a3da8aeb5e0bdca0911ec7d57d9cff9,2024-08-01T13:54:28.750000 CVE-2024-37882,0,0,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000 -CVE-2024-37883,0,1,fead1db2e5bbe373046cf1c6b570d171c636b10059efb5e917547136265d0d37,2024-08-19T16:00:13.927000 +CVE-2024-37883,0,0,fead1db2e5bbe373046cf1c6b570d171c636b10059efb5e917547136265d0d37,2024-08-19T16:00:13.927000 CVE-2024-37884,0,0,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eecd25,2024-08-08T16:39:59.217000 -CVE-2024-37885,0,1,72d167b102be110721578bb71216343a36103160d9a0cd62d07c0c14c7e0207b,2024-08-19T16:10:21.107000 +CVE-2024-37885,0,0,72d167b102be110721578bb71216343a36103160d9a0cd62d07c0c14c7e0207b,2024-08-19T16:10:21.107000 CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000 CVE-2024-37887,0,0,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000 CVE-2024-37888,0,0,85802cd547dfbbe611f91638c3cc445da6232c116464d4f183fc32c96cfddf76,2024-08-08T18:01:19.233000 @@ -255765,7 +255766,7 @@ CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544 CVE-2024-39018,0,0,487d2d2021a1fc3e6565cf47ccad7b4f66c1ad362659f92eecb24e6b9790a4a5,2024-07-11T15:06:06.723000 CVE-2024-39019,0,0,49f6923e7308cc94a507864c15bf4235170455a2d5e0ce49f075b9ff7427c130,2024-07-09T16:22:48.323000 CVE-2024-39020,0,0,f3dad96d08cf85365c782d609ec6f6e7c042df2976c73457f6a2464976a50377,2024-07-09T16:22:49.137000 -CVE-2024-39021,0,1,108f49f3ab800c671a2890d0a7f510a0480a66afc7f6a6494a7d9fe6f904f975,2024-08-19T16:35:20.610000 +CVE-2024-39021,0,0,108f49f3ab800c671a2890d0a7f510a0480a66afc7f6a6494a7d9fe6f904f975,2024-08-19T16:35:20.610000 CVE-2024-39022,0,0,4892e8c438fa7f66ddd59914775cbc9dbde11acf99905f9a0489141c3183b297,2024-08-01T13:55:18.953000 CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662477,2024-07-09T16:22:49.943000 CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 @@ -255913,7 +255914,7 @@ CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882b CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000 -CVE-2024-39371,0,0,7981822be390c958958f4d55af98e1abccdb49b9583dac35d34a8951ee1b84a4,2024-06-25T18:50:42.040000 +CVE-2024-39371,0,1,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000 CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa8b9,2024-06-27T17:11:52.390000 CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 @@ -255921,17 +255922,17 @@ CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f CVE-2024-39379,0,0,eea4124c5ea93e0750c53c7242ccfa255eb0eb94ed4c7c3ac1070e74f2655db4,2024-08-01T12:42:36.933000 CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000 CVE-2024-39383,0,0,b4fda2d2621943b7d8ad5e6874dd06b25217ceb08a5761385783d2ff579563c6,2024-08-14T17:49:14.177000 -CVE-2024-39386,0,0,6192afeaa4133af913c1a118d0ba7444e1ac320a9982c457a237f349154e016a,2024-08-14T17:49:14.177000 -CVE-2024-39387,0,0,18b8885859028d57c979de12b4aae3125e8b2462f30e6ff2d028505c1132da7e,2024-08-14T17:49:14.177000 -CVE-2024-39388,0,1,8d23a39b2d5c7f24e6d2ce074d1291f49a0b80796f8d0f1605cbbd1187360b13,2024-08-19T16:23:28.353000 -CVE-2024-39389,0,1,39fdb9d0b9fb20cf297a06b83cf6ea63096507f0061506f0b3a0f5514e7717bb,2024-08-19T16:17:19.700000 +CVE-2024-39386,0,1,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000 +CVE-2024-39387,0,1,89b66bc618bdec29880956f86ab320532050f7e569b27da862dd99b48956ab03,2024-08-19T18:53:28.930000 +CVE-2024-39388,0,0,8d23a39b2d5c7f24e6d2ce074d1291f49a0b80796f8d0f1605cbbd1187360b13,2024-08-19T16:23:28.353000 +CVE-2024-39389,0,0,39fdb9d0b9fb20cf297a06b83cf6ea63096507f0061506f0b3a0f5514e7717bb,2024-08-19T16:17:19.700000 CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000 -CVE-2024-39390,0,1,c8965544c02fdae63e51faeacb24e01b58cd6d48b0d4bbb6d9d53e7a251f45c3,2024-08-19T16:22:28.793000 -CVE-2024-39391,0,1,bf23b3a4fcfac995de8f821967dd611a6d3dd8d85e93d5526f26f27ffcdff7d8,2024-08-19T16:22:17.017000 +CVE-2024-39390,0,0,c8965544c02fdae63e51faeacb24e01b58cd6d48b0d4bbb6d9d53e7a251f45c3,2024-08-19T16:22:28.793000 +CVE-2024-39391,0,0,bf23b3a4fcfac995de8f821967dd611a6d3dd8d85e93d5526f26f27ffcdff7d8,2024-08-19T16:22:17.017000 CVE-2024-39392,0,0,66cfce17bd8b1475fbe1823e0e269e958974fa5e662af0c38bd8aae43df2ebb5,2024-08-02T12:59:43.990000 -CVE-2024-39393,0,1,8d078099fcd2ba2e29d66fdd3890558f3d5c728361f03f1806fa233e35110fcb,2024-08-19T16:22:01.510000 -CVE-2024-39394,0,1,67d9184a58298d11927ad8a4d2557ca26d7931b94761a921a0e3ca0596e7f469,2024-08-19T16:21:44.130000 -CVE-2024-39395,0,1,6041b2c95b4d02613efc44b37a4c39f137ea78ef6f900110e80ea44a0fb6086c,2024-08-19T16:21:26.890000 +CVE-2024-39393,0,0,8d078099fcd2ba2e29d66fdd3890558f3d5c728361f03f1806fa233e35110fcb,2024-08-19T16:22:01.510000 +CVE-2024-39394,0,0,67d9184a58298d11927ad8a4d2557ca26d7931b94761a921a0e3ca0596e7f469,2024-08-19T16:21:44.130000 +CVE-2024-39395,0,0,6041b2c95b4d02613efc44b37a4c39f137ea78ef6f900110e80ea44a0fb6086c,2024-08-19T16:21:26.890000 CVE-2024-39396,0,0,35651f26387fec82c0dfb279ff129f06faad55e21497397f655b21318cdf6ddc,2024-08-02T12:59:43.990000 CVE-2024-39397,0,0,bc21f8a66648c1efcf4ca52e5ba26326af30e1f67653bf02c4d0fc076a018882,2024-08-14T14:46:52.150000 CVE-2024-39398,0,0,b13e5a889a1d5b727e630d5416e27454a60538370cba632d5345aedf9ef651f1,2024-08-14T14:47:10.077000 @@ -256201,13 +256202,13 @@ CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c16 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 CVE-2024-39777,0,0,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170daf18,2024-08-01T16:45:25.400000 -CVE-2024-39778,0,1,bb2539eb59e56cbeaf6e7ed7999fae0d5792d390eb9e1100733cc6f4b019e4fc,2024-08-19T16:20:52.980000 +CVE-2024-39778,0,0,bb2539eb59e56cbeaf6e7ed7999fae0d5792d390eb9e1100733cc6f4b019e4fc,2024-08-19T16:20:52.980000 CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,60acfa3708659c568817fd13832a2a0328987496e5a3c95ddd8efb860a3cefb5,2024-08-12T13:41:36.517000 -CVE-2024-39792,0,1,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 +CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 -CVE-2024-39809,0,1,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 +CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 CVE-2024-39815,0,0,43f1df90e5ba8bd723fc578cf8095d231309e3460070a5be5cec3ccd81cbd589,2024-08-12T13:41:36.517000 CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000 CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000 @@ -256305,14 +256306,14 @@ CVE-2024-39936,0,0,151737d9121a39faad5d145bce74b1ef3d7584b31944fb5416c69ce5b04a8 CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d95b,2024-07-09T16:23:00.340000 CVE-2024-3994,0,0,1a9bed43f4b2f43f8d685322cd3b5005094af7345fc065cd7144b7703ac2b568,2024-04-25T13:18:02.660000 CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000 -CVE-2024-39944,0,1,8b93e7afff46d78e585ecf1df0fdda6d5d87e8d0cc1151abfd50f0d850740ed8,2024-08-19T16:12:22.810000 -CVE-2024-39945,0,1,30f5bb9b3a9ecce5857ea6cba8d9963454e2b0386f8656fa3fb052d56dab436a,2024-08-19T16:17:06.653000 -CVE-2024-39946,0,1,8a60ad4de12b8c70efd8a2e1685f0dfc52144675df5f412d9b76e9a02ac43d8c,2024-08-19T16:16:30.997000 -CVE-2024-39947,0,1,9a963e5f3a739ce60018f3708d4a9bdd511a2bcd9bcf16d02f3822afa8817987,2024-08-19T16:17:23.090000 -CVE-2024-39948,0,1,1673130333d6038d8c6e56082b02ad54ae600dc63623342cc4bdab136392aa55,2024-08-19T16:17:36.450000 -CVE-2024-39949,0,1,3e5a12a5b0cfea52f54a0cb83bdf5c17246204d72ae4e02b4fff7bff9a4de6b7,2024-08-19T16:18:07.100000 +CVE-2024-39944,0,0,8b93e7afff46d78e585ecf1df0fdda6d5d87e8d0cc1151abfd50f0d850740ed8,2024-08-19T16:12:22.810000 +CVE-2024-39945,0,0,30f5bb9b3a9ecce5857ea6cba8d9963454e2b0386f8656fa3fb052d56dab436a,2024-08-19T16:17:06.653000 +CVE-2024-39946,0,0,8a60ad4de12b8c70efd8a2e1685f0dfc52144675df5f412d9b76e9a02ac43d8c,2024-08-19T16:16:30.997000 +CVE-2024-39947,0,0,9a963e5f3a739ce60018f3708d4a9bdd511a2bcd9bcf16d02f3822afa8817987,2024-08-19T16:17:23.090000 +CVE-2024-39948,0,0,1673130333d6038d8c6e56082b02ad54ae600dc63623342cc4bdab136392aa55,2024-08-19T16:17:36.450000 +CVE-2024-39949,0,0,3e5a12a5b0cfea52f54a0cb83bdf5c17246204d72ae4e02b4fff7bff9a4de6b7,2024-08-19T16:18:07.100000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 -CVE-2024-39950,0,1,e409eeb254f44b3d4b51e7d07bbd7f9da83c77ebb8ace38fad3cc5b35bcdfef4,2024-08-19T16:15:10.800000 +CVE-2024-39950,0,0,e409eeb254f44b3d4b51e7d07bbd7f9da83c77ebb8ace38fad3cc5b35bcdfef4,2024-08-19T16:15:10.800000 CVE-2024-39962,0,0,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000 CVE-2024-39963,0,0,1997a2314271fe57eb41207372bb6a5b6d64581c5e6f0763f5bbf0ba4916f0ef,2024-08-01T13:56:15.110000 CVE-2024-3997,0,0,1f2576b07f1c26f802b0f1e551eeeee57100d1eaa419296265017e09a1456b97,2024-05-24T01:15:30.977000 @@ -256872,7 +256873,7 @@ CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41161,0,0,c97152c62d9a10c62a6668742a3fe8e6e77c1bcfdd43214f485b8756f006cd55,2024-08-08T18:55:19.180000 CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000 -CVE-2024-41164,0,0,f5b25f501cd0c89ef0858f93caa1e458e559fd127c2dde5e468c2d7257a42c0c,2024-08-14T17:49:14.177000 +CVE-2024-41164,0,1,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000 CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 @@ -257068,7 +257069,7 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000 CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000 -CVE-2024-41719,0,0,e8cfaddacff01eac517b3ef8eca516e928fe978a14fe4f2d4d34bb7038aae836,2024-08-14T17:49:14.177000 +CVE-2024-41719,0,1,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000 CVE-2024-41723,0,0,d454a6e84b7279f0a9264114791e422d74feeebe84c47a58ae77b60a510e9c82,2024-08-14T17:49:14.177000 @@ -257127,14 +257128,14 @@ CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 -CVE-2024-41840,0,0,0ee39146eb4aa506100d9b8412a61402e124bb7afb8a3679c7dc6c184382f873,2024-08-14T17:49:14.177000 +CVE-2024-41840,0,1,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 -CVE-2024-41850,0,0,beff49ad8b13685cc05be544d37127a79b5a39798beb86f694e9e4ea5816c0f4,2024-08-14T17:49:14.177000 -CVE-2024-41851,0,0,c462db8d4390e5fea8fd8ef4afac0df635985ae8e2472263e6a2240ca16c3661,2024-08-14T17:49:14.177000 -CVE-2024-41852,0,0,7eab12af04b37419530fd7976a94ad62b9c2a4f41831daef8aab8225d9a4672b,2024-08-14T17:49:14.177000 -CVE-2024-41853,0,0,0b4c1020e909864bc82d45d83b15d3737473ef284f4ae2c9eafc4167a7dba1b5,2024-08-14T17:49:14.177000 -CVE-2024-41854,0,0,4c7fda0f5ad1d6df976ca264a1ae56709561eb4205b4a5594db65bfc65125695,2024-08-14T17:49:14.177000 -CVE-2024-41856,0,0,124cb55c700b592900f498f1c7883b2c14cb26645cf32daf03e4c10d7df6eb94,2024-08-14T17:49:14.177000 +CVE-2024-41850,0,1,105ee8d7e128a7bfef46a6f6d9b6049d5c28c9d7445c37259311e21c46bcceec,2024-08-19T18:41:14.083000 +CVE-2024-41851,0,1,f382ba2978b7b108b5ca794ab973cbc168b42571d6dd14e506c0111f63fbbf25,2024-08-19T18:41:29.073000 +CVE-2024-41852,0,1,b9853968fe67e2c5233e8ca2738b3048de51d482a522c2258b22dc0aff703976,2024-08-19T18:42:01.693000 +CVE-2024-41853,0,1,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a000e,2024-08-19T18:42:21.327000 +CVE-2024-41854,0,1,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000 +CVE-2024-41856,0,1,c2ee80a5f2b7dae1b3c4d8f5600fac764ad18c39c82d16f5ab00e57e14b80619,2024-08-19T18:54:40.513000 CVE-2024-41858,0,0,0b2aa1223d8b75ef4509a2c890063b1cbd2e1ef2deb50b762503d032e69fdb08,2024-08-14T13:00:37.107000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 CVE-2024-41860,0,0,a6ec640882508023af3d0255006bb74c8ca989e8b14eb4eb3a86ff4f7bf11942,2024-08-14T18:19:25.823000 @@ -257142,8 +257143,8 @@ CVE-2024-41861,0,0,5c1f38441bc51a1591a6b04d24472f00c7abfad7294e2ca768b021a3f2ea6 CVE-2024-41862,0,0,7c873addb32f880d3b4d25f01e9b4fa4b723138c587f24e47fbc2d06ada810a8,2024-08-14T18:20:07.867000 CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6046,2024-08-14T18:20:16.013000 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 -CVE-2024-41865,0,0,08132fc6a016857f6e204a1c6df9c858130f15991f65fecf3a2e74f52d8429f4,2024-08-14T17:49:14.177000 -CVE-2024-41866,0,0,8733b235a4d9b13173aed1d441f99cb8c5a30c2d5a2a3c902062af71add65d28,2024-08-14T17:49:14.177000 +CVE-2024-41865,0,1,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 +CVE-2024-41866,0,1,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 @@ -257427,10 +257428,10 @@ CVE-2024-42279,0,0,4072eea42cb14ef4445f722c9302e69097aa69e91098ddb0b91b0bf4f0001 CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000 CVE-2024-42280,0,0,6193de04bf7bd8f71c084599f52dc112addf7361b5e9e28ba30a70409cc12ba4,2024-08-19T12:59:59.177000 CVE-2024-42281,0,0,65c759fec937bf57f102ba761a6aed942da5c28968f8447a080bd52fb87900dd,2024-08-19T12:59:59.177000 -CVE-2024-42282,0,0,94bde3182133fa7bba94c7d20e8f49b9cff34865a692fee3b4e2333658a73457,2024-08-19T12:59:59.177000 -CVE-2024-42283,0,0,59daaf404d8269eda7418321a34de2b2638a01aa85bbdf7372dc5d1162d75cdb,2024-08-19T12:59:59.177000 -CVE-2024-42284,0,0,aeb2995908895a6b615320fcee675dd048840a7a8a7425ece974e166554e1178,2024-08-19T12:59:59.177000 -CVE-2024-42285,0,0,3c29632960c057492b24e517abcc326d632b5b40f596652e033aab7d7ad33c84,2024-08-19T12:59:59.177000 +CVE-2024-42282,0,1,6156a8928cafef61f7f5f769684bd833d2bd4b3c24a74574351a7881df6b4533,2024-08-19T19:53:45.483000 +CVE-2024-42283,0,1,f825b2a7ecbebadcca9eeba322e91b65a0eb4c6f424f709ac9763ac81a1cda37,2024-08-19T19:54:33.213000 +CVE-2024-42284,0,1,3de089e862fb9363cf440d4ddcd6c7f62488df29d936c169ac7a6ab7bc964307,2024-08-19T19:47:55.623000 +CVE-2024-42285,0,1,4ec0160442d1538b95cde72767ac70bc274486d2ce7c96c2406c062e83be4de0,2024-08-19T19:45:41.590000 CVE-2024-42286,0,0,24061156d805ced1339b1724f8564154074076c09f5e325f327fdc585683f93a,2024-08-19T12:59:59.177000 CVE-2024-42287,0,0,ab99cb2182c9d6159d40449c7d07218d1774759ae812acadb1ae409447b25c10,2024-08-19T12:59:59.177000 CVE-2024-42288,0,0,0473e6d533869d02183417e6ce6ab07ac8e6bd7cacb1e11495e5002891b0aae2,2024-08-19T12:59:59.177000 @@ -257439,7 +257440,7 @@ CVE-2024-42290,0,0,d27aca27562195d04490643fa18705d7b7ed22675306a86b123d07597c93e CVE-2024-42291,0,0,72aa73e566f0b3c5cb157f1659781e489a73109e53174d8bea3ddc4964e85fe8,2024-08-19T12:59:59.177000 CVE-2024-42292,0,0,8310aa9a5630623a5a144ae735b237b95b640aed6f25022423101f353e6f84b0,2024-08-19T12:59:59.177000 CVE-2024-42293,0,0,7cf92cea47cf0aeade81c478f71bad3f09bbe1b4ba14510e43dd89a0a6440ef3,2024-08-19T12:59:59.177000 -CVE-2024-42294,0,0,2798532a99d81325e7009874f45b9da6165ddd9c2b3e4a1fb8285929b41003e0,2024-08-19T12:59:59.177000 +CVE-2024-42294,0,1,1014993f483faff29cfdc56b3a6e1108bbfa3c0b5440094cc7d24f2d59b3641b,2024-08-19T19:43:22.460000 CVE-2024-42295,0,0,f0cd0e6a993b87e3204ed117d3bdfa9958e49bdcdf9632bb8d42fdd57196683b,2024-08-19T12:59:59.177000 CVE-2024-42296,0,0,6f0a4e19d0af7904c42d2fd48012f42857e020384d64582beaccc791074f5639,2024-08-19T12:59:59.177000 CVE-2024-42297,0,0,c6a17cd20eb476c36e74835def3dec9425eca068ceb110058bb8cda346565ec4,2024-08-19T12:59:59.177000 @@ -257478,7 +257479,7 @@ CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de9707413 CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000 CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000 CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000 -CVE-2024-42353,0,0,7599d72317ddfed054b1bcf6cdb3563afb451b867af467fa61965e4ed3ceea3f,2024-08-15T13:01:10.150000 +CVE-2024-42353,0,1,ff6a20bb34a678482c7e929d5bf56188c5e8b6470cc5da2a5c329ecb11992f4a,2024-08-19T18:44:59.903000 CVE-2024-42354,0,0,530679279c657883c4b35ba657ab96e7283f524459574665a6f69e940f2dd9b1,2024-08-12T15:49:58.230000 CVE-2024-42355,0,0,4d53406f017c64f607be0598b7dd1b3fb3451e70edad6092c759f1ac9d9afdaf,2024-08-12T15:40:32.777000 CVE-2024-42356,0,0,71e7dc9901543344eaef3df0bcbcdd32b411ba29d6c2531b0f605cb85111defa,2024-08-12T15:34:08.190000 @@ -257586,25 +257587,25 @@ CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb4 CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000 CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000 CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000 -CVE-2024-42633,1,1,5e092c18c3bb4b395787026d0b3769368bb63fa89edbc445e623776f5ce4eb02,2024-08-19T16:15:08.740000 +CVE-2024-42633,0,1,126c15d16c7bea8f5f0fd28b3aed8972f01d9a4964f8b2518721f48b17c481ca,2024-08-19T18:36:20.123000 CVE-2024-42634,0,0,6658d1cc4139c37b2ef0667c6ab1d67862bb441366a987a8fc3849f65e0dd18f,2024-08-19T13:00:23.117000 CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65c8f,2024-08-19T13:00:23.117000 CVE-2024-42638,0,0,f8a971101f7cdf9fa56d822dabf1a1d2d2e6eccbd0431f9555d3577ca133854c,2024-08-19T13:00:23.117000 -CVE-2024-42639,0,0,49d80c0291e506622496e3e7404299f1bb919735e3c40b74a1c228c47facef4d,2024-08-19T13:00:23.117000 +CVE-2024-42639,0,1,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 -CVE-2024-42657,1,1,4e5691262128e89606e154c5253e62c9c0223c62c83b5dd39d99c15a4f8b2435,2024-08-19T17:15:07.967000 -CVE-2024-42658,1,1,d41e4884818b630ee24bc805ba7555030cd19c20cf7062a93898e16ebcf31a5b,2024-08-19T17:15:08.027000 +CVE-2024-42657,0,1,9189d652a51cff209c28ecabe9400e739d91fda304e5796d6780bd977277adf7,2024-08-19T18:36:20.123000 +CVE-2024-42658,0,1,ebcb04a44ee6ff12cd57d411c4d84c51e828425675a45b111c40a36fe5a58823,2024-08-19T18:36:20.123000 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 CVE-2024-42675,0,0,92c6b6457955ed616d1577d62ebea7dcf172d2ecdd66922f34ded7a7ee2d3b6e,2024-08-19T09:15:04.283000 -CVE-2024-42676,0,1,ee04f7bab8ee13bdc864d5bc2a4a11bd3644007d71c7b1c26d6531bc1196494f,2024-08-19T16:11:33.843000 -CVE-2024-42677,0,1,85c08a22e8a37131c90308072afe209c51004b01a70c30ff33acbdf877c43e4a,2024-08-19T16:08:17.727000 -CVE-2024-42678,0,1,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000 +CVE-2024-42676,0,0,ee04f7bab8ee13bdc864d5bc2a4a11bd3644007d71c7b1c26d6531bc1196494f,2024-08-19T16:11:33.843000 +CVE-2024-42677,0,0,85c08a22e8a37131c90308072afe209c51004b01a70c30ff33acbdf877c43e4a,2024-08-19T16:08:17.727000 +CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000 CVE-2024-42679,0,0,5cfa4f8dc5b9d10c39efd22720f911faf8e4898f0cdbc84b07ec1be3a3d83c77,2024-08-15T17:34:07.033000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 CVE-2024-42680,0,0,7e2ee2b7453733c53c41781c0ef064c6b2c475848bb8f1311159e233bbe5cc94,2024-08-15T17:34:07.033000 -CVE-2024-42681,0,0,c986a0dc207cbc6aed6c3a4a08b82a938d1c6ad338a9c0a5e8996b19aa5aeb15,2024-08-19T15:59:00.500000 +CVE-2024-42681,0,1,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 @@ -257625,15 +257626,15 @@ CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 CVE-2024-42757,0,0,95625a6e50c27ce340e8acfc982700097d9fc83730e49a1ee849ddb378ae13da,2024-08-19T13:00:23.117000 -CVE-2024-42758,0,0,43df8a39b9dbcdf4f537585c16c590478cb9162ec0afd1108014fcf9544ca38a,2024-08-19T13:00:23.117000 +CVE-2024-42758,0,1,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 -CVE-2024-42843,0,0,cfcd3bd90bfa0bb05433b211d40cba11fe925e596131d0b9aa1309f26ecdd592,2024-08-19T15:58:03.563000 +CVE-2024-42843,0,1,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 -CVE-2024-42850,0,1,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 +CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 @@ -257661,7 +257662,7 @@ CVE-2024-42953,0,0,8851520fe29c4e2cdfe788f671b16257937bb484146dbc70d9979d7ec9114 CVE-2024-42954,0,0,d7dc5fdc7066bd66ef4157db7606f6118c02f98972de6c14f0326e5f39a08ace,2024-08-16T18:14:12.620000 CVE-2024-42955,0,0,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000 CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000 -CVE-2024-42966,0,0,2183a7825b02d826715434a606b8e0e88607ae49ea211d2b913cb8ef25e10f0a,2024-08-16T13:35:28.477000 +CVE-2024-42966,0,1,11fb4f8406b51aaf92dcd9c74f137affdd9a6a6d3d3dd012cff469b6ec43d58b,2024-08-19T19:35:09.913000 CVE-2024-42967,0,0,7e74ee4a2d6a17af6b0f12f00eb90c60c9c52c49e61e430789bbc0c38446386e,2024-08-16T13:34:29.780000 CVE-2024-42968,0,0,ea8af3ba9d524f0f7175c3ac05010317eb6e0c3232797df2ec4eeeed8bf7be47,2024-08-16T18:14:39.303000 CVE-2024-42969,0,0,8304dea3c274f1ae2ddaad05a344a9bb249c0e2abc4bd40a669c59c89b06623c,2024-08-16T18:35:15.027000 @@ -257685,8 +257686,8 @@ CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdd CVE-2024-42994,0,0,46088bee324f9fb8a88606d17f14c9f666ebd59ae6a0d59deea5611547b28ba5,2024-08-19T13:00:23.117000 CVE-2024-42995,0,0,5fe3b52ce312f2adad41265b1d44f25534179e7b5138e6f382ca4cb8e97a4739,2024-08-19T13:00:23.117000 CVE-2024-4300,0,0,9683d559686bc261042c0ad86aeb3d06ca0ebb649bc8d0eaba9f4d32c108bd00,2024-04-29T12:42:03.667000 -CVE-2024-43005,0,0,0bc697e46ea36091b4586c782816e9f833af1c66afe6c5abdba939a146d8ac86,2024-08-19T13:00:23.117000 -CVE-2024-43006,0,0,6fa449db44d1ea8c22889f4e6b623cfcac6d8f62a203c093e2dd4c404ff568c8,2024-08-19T13:00:23.117000 +CVE-2024-43005,0,1,0c2d82c5e7b325535bbe68db9615fb82e7c26b50e029f354a077d9f59401062d,2024-08-19T18:35:14.987000 +CVE-2024-43006,0,1,906359812ef9bffa04be5c17860ae0368eb269d312f52d95e12872ce37b04dd4,2024-08-19T18:35:15.920000 CVE-2024-43009,0,0,468db8caeabef579a226d8a65490e413d586c09d4e7e764fb4b818b81835a912,2024-08-19T14:35:10.150000 CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000 CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe1759157a,2024-08-19T14:35:10.893000 @@ -257759,35 +257760,48 @@ CVE-2024-43217,0,0,f82c4fc5d8211638ca35d56d40ca602f216f2cb77b05fbf9169296f7ea836 CVE-2024-43218,0,0,7211cf498c311837d292e9f824bafb9f3bdd8538b1ebf61d4a91523261453a7b,2024-08-13T12:58:25.437000 CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000 CVE-2024-43220,0,0,fa30aceb18b0a5400afb1d9d2f0e9c09b643520e811ea7731a8ad416203ea5f1,2024-08-13T12:58:25.437000 -CVE-2024-43221,1,1,934b1575604bc76cca759a23b0b7b3ab64e5ed9b5476a222ffc80819b046c75a,2024-08-19T17:15:08.260000 +CVE-2024-43221,0,1,2b76139229385b5dcceacf0dce23b96a549824f2ee979f84ad905a37cfd63278,2024-08-19T18:36:20.123000 CVE-2024-43224,0,0,14cde466a8ca3b1bf8974de78502b35cfa4d5ca1d10dafe2a4d04ac6c673d0a4,2024-08-13T12:58:25.437000 CVE-2024-43225,0,0,785bc4278a6946ee9d6c10021191a3cce1fc98e617438c82e5e4e3f2e0cd03b3,2024-08-13T12:58:25.437000 CVE-2024-43226,0,0,a338b4ee27e9fc08682f17c2b31584264a82f90f5a7fca9fd60ce6764ef33c2e,2024-08-13T12:58:25.437000 CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000 CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000 CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000 -CVE-2024-43232,1,1,3b4d80bf9b3eb5115145bc648ba084675fa113e5bccc96432a599317bb9658fa,2024-08-19T17:15:08.443000 +CVE-2024-43232,0,1,d67d0e0fe89aac0949e160b289df7ae61d4b5504a801f0239cfd72e4ed0056de,2024-08-19T18:36:07.297000 CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000 -CVE-2024-43236,1,1,387cac3c3d6b56730a3f8635d0827f211cae8da0f4150463da0ff30d4b6e9f4e,2024-08-19T17:15:08.640000 +CVE-2024-43236,0,1,e34883c4de9fffbcb1135e72b7f81f422c83a69e3b88600e5b59a5f63854573d,2024-08-19T18:36:07.297000 CVE-2024-43238,0,0,c8521e7625c83e605f0b6621da252175bd1f21854b9854934939807c71b6a24b,2024-08-19T12:59:59.177000 CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000 CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000 -CVE-2024-43240,1,1,db9a411c52bd99bc07f77cf1792ad05fcc52cb8104fc48631c74351a34275143,2024-08-19T17:15:08.850000 +CVE-2024-43240,0,1,e2590d31f9001c04f722f434932d0d561d30b41a2446647b837e0a4e39cecd2d,2024-08-19T18:36:07.297000 CVE-2024-43241,0,0,c39932a6e0a58bfac7ae4f1cf6af814f732177d07f4a962afc92645b7cabd135,2024-08-19T12:59:59.177000 +CVE-2024-43242,1,1,6e6c6d64008696b47f3b7a552cc606e837d7cf289b856662a18dc772824d7931,2024-08-19T18:36:07.297000 CVE-2024-43244,0,0,1886195ce7a92c6294c50cae518f93eff0f2be660d6ad12e641d6bae1e37edd4,2024-08-19T12:59:59.177000 +CVE-2024-43245,1,1,f98104422ce6b51f20685d084ff1096bdc7ee08ba5424dd8f3e6be12d5b0f80c,2024-08-19T18:36:07.297000 CVE-2024-43246,0,0,44a65a28ca2af5cc21ed79f6503fa68b6cded6fd3bf6e91f921a120c96c44499,2024-08-19T12:59:59.177000 +CVE-2024-43247,1,1,314702135e8dec43cdb9d48759c1f4a342c52ce50852f302ca032df3c95afd75,2024-08-19T18:36:07.297000 +CVE-2024-43248,1,1,8b3df22a4664dfd570d0e535bbeb21f2a6e86b245e37a9d073431f57df0a5a36,2024-08-19T18:36:07.297000 +CVE-2024-43249,1,1,d266a0d9c868ddd405992a7be9ce77e8bdb6b51228e95558c7bec0d134d750eb,2024-08-19T18:36:07.297000 CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000 +CVE-2024-43250,1,1,73defcb8a613840edc08706b7bfa965273ffaf322e2f3aa888089e7808660f62,2024-08-19T18:36:07.297000 +CVE-2024-43252,1,1,4be63f9c4a1fbca3f69e3a91cadc265cb38711901384cf8752fff4529c8c4ec4,2024-08-19T18:36:07.297000 +CVE-2024-43256,1,1,c36dc4d6eb578e10ca2d622c1902c6a06d960f9bafe6df9f369bc94f2b884207,2024-08-19T18:36:07.297000 CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000 +CVE-2024-43261,1,1,84d953d651a842e6d6703fc3249639804f80f7ab68752db181f51b7ae84af3b4,2024-08-19T18:36:07.297000 CVE-2024-43262,0,0,ee2d00bd7b26cdad642ada4c4b2d7bc02c0ccfbce8aef1634bfd7f75ad8dd06b,2024-08-19T12:59:59.177000 CVE-2024-43263,0,0,cf9b7583314454065255b112c0283ce49c3cc8a3b709e9840e4d308ff741cc3e,2024-08-19T12:59:59.177000 CVE-2024-43266,0,0,751fa9ab2a13f701be885e7a1662c496db49511ced127e99a8ff80c20e1ffede,2024-08-19T12:59:59.177000 CVE-2024-43267,0,0,5b844fafa4776837e860aa27df30c3483f35542b577634e0b86bc9628cc0c001,2024-08-19T12:59:59.177000 CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763bfb,2024-05-17T02:40:22.673000 +CVE-2024-43271,1,1,f99b46b92b3d5b2518c311032cb405eef72eb5a86f97d6856788a5b4ba850c01,2024-08-19T18:36:07.297000 +CVE-2024-43272,1,1,92cc1cd5d8aafacecbd5bbf3efb4d2aa20aee78234a6e4ea8a22146097421586,2024-08-19T18:36:07.297000 CVE-2024-43275,0,0,78ead3cb089aaf7c18ceb1d81053b0c408f631313f8368c9da5d02a09209ccb7,2024-08-15T13:01:10.150000 CVE-2024-43276,0,0,009413fe653f24508bf0520a9c733be017d63124458beaa10db3152efbfa2eeb,2024-08-19T12:59:59.177000 CVE-2024-43278,0,0,ce315fd6df2c7c03732ec4666e0eb8df6d4b7eb3d4a28c76f708a96fbe277c0a,2024-08-19T12:59:59.177000 CVE-2024-43279,0,0,e987096db9ded741b69a195b2928ea4cd7001885008ed57560d4daa954a47390,2024-08-19T12:59:59.177000 CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000 +CVE-2024-43280,1,1,70fdeb75e66f4b8d3e8b42148a052b1d4c52503cf27dfee56e90c2921a542fcb,2024-08-19T18:36:07.297000 +CVE-2024-43281,1,1,bf73c9efa9c24f7872f272cc4307d1cfd35c23668eef4d165edfca4d096501c7,2024-08-19T18:36:07.297000 CVE-2024-43282,0,0,51a1b7b60973a964536d725b46eb7f27a1885c2e782a5c2cec51a4dab10a1bb5,2024-08-19T12:59:59.177000 CVE-2024-43284,0,0,9ec27cbbaa1c9c776151f787875b1a5263af16803ae4108b77758144ff0ef781,2024-08-19T12:59:59.177000 CVE-2024-43286,0,0,8d445c08837bc0d69bb39f698d927b03a1da9d91e0d6c24aee947cb16e9db230,2024-08-19T12:59:59.177000 @@ -257845,15 +257859,15 @@ CVE-2024-43372,0,0,a043dcae2b6cd795ef3b53e2a2297979218d8f1c42273b50d63478eed641c CVE-2024-43373,0,0,db91654b81ea063be92db1e222d81162a2c449df0cbfa02fb41874b948a4c8f0,2024-08-16T21:46:08.440000 CVE-2024-43374,0,0,985df10ab42e21b923c86b553c9d031d32672b2cc13ac7d069fd0fa1d25bd2e8,2024-08-19T13:00:23.117000 CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202d67,2024-08-19T13:00:23.117000 -CVE-2024-43379,0,0,57bfc8750ab10e90be2f88738d27b7761e58207eb0a13c5875fdb69c3d82f169,2024-08-19T15:15:08.683000 -CVE-2024-43380,0,0,2681e4c1a97b9b528f8bd938c98304982ae2b3fef8b2033e477d3def44ca4e13,2024-08-19T15:15:08.893000 +CVE-2024-43379,0,1,2274510657d95ffcc48a92770730410821cfe34d62852c5631ab582d27d295cf,2024-08-19T18:36:20.123000 +CVE-2024-43380,0,1,8e4600010954207ddca63fc28edeb1cd291abe3badd6cde0e059ea5db707d614,2024-08-19T18:36:20.123000 CVE-2024-43381,0,0,a01674578db7c1648bbba4f532305ea57cf2109d65478c5f7b839cc278dc42fc,2024-08-19T13:00:23.117000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 -CVE-2024-43399,0,0,81a9f69051b412610509ef34f3b56606fe3845b4425ef30d03f4025d68cef8da,2024-08-19T15:15:09.073000 +CVE-2024-43399,0,1,99ea03d4cb51d89848626678b95b950069c5e7694cc6c47ad014346b9029f738,2024-08-19T18:36:20.123000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 -CVE-2024-43400,1,1,d8ef1c95b41f1842641e738428ecc22a350ff56479889049d85b96b5a626c30f,2024-08-19T17:15:09.097000 -CVE-2024-43401,1,1,c20d9886560bfbf215e956ac6180482e76ef53eb12cfa886e5cf08a16709a111,2024-08-19T17:15:09.317000 +CVE-2024-43400,0,1,948d99d3226e07bed979bae346a84e40ea844c2594a77d0a0cad612ad3cc8bc0,2024-08-19T18:36:07.297000 +CVE-2024-43401,0,1,9aa398b025131392ce8a6f0e796ef6d970be06489ef92f0ee874b8751775b22e,2024-08-19T18:36:07.297000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 @@ -257969,8 +257983,8 @@ CVE-2024-44067,0,0,678a49e827d8c81068d540949e6cf271b2d80721514584afb1689799a89b6 CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000 CVE-2024-44070,0,0,2bc8de687612ae3b9a8e8ae6b5aa923874665cdf749880ee2ac700153b29547c,2024-08-19T12:59:59.177000 CVE-2024-44073,0,0,a0168bab6b2fc8cdc2cdbd9e0c651e338c773869c4d49563b614716d8087553b,2024-08-19T12:59:59.177000 -CVE-2024-44076,0,1,f256db47e09f07fbefa7130d7f559d7caf56ad92a6a684543ad9f4757099347a,2024-08-19T16:35:28.723000 -CVE-2024-44083,0,1,1f929fd124b08bd86da7a04645c047d1110e3fe35c902c764dcf6bdd78af33f0,2024-08-19T16:35:29.767000 +CVE-2024-44076,0,0,f256db47e09f07fbefa7130d7f559d7caf56ad92a6a684543ad9f4757099347a,2024-08-19T16:35:28.723000 +CVE-2024-44083,0,0,1f929fd124b08bd86da7a04645c047d1110e3fe35c902c764dcf6bdd78af33f0,2024-08-19T16:35:29.767000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 @@ -258519,7 +258533,7 @@ CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 -CVE-2024-5037,0,1,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 +CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 @@ -259042,7 +259056,7 @@ CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda1 CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000 CVE-2024-5649,0,0,34e3eeab6e168b1c5f2adbcb96ea45c2ac0ef86ad5d890f401ea3f073a254f2e,2024-08-16T20:35:08.120000 CVE-2024-5650,0,0,c39b4a582c551c0a2a7178518ad417e8ac9a87e5b86c36cc6d93d2e99ad988c5,2024-06-17T12:42:04.623000 -CVE-2024-5651,0,1,abb73abfb565ad81900f991c25e56f02b075b931b9b9396bb041a089c7f5e14d,2024-08-19T17:15:10.320000 +CVE-2024-5651,0,0,abb73abfb565ad81900f991c25e56f02b075b931b9b9396bb041a089c7f5e14d,2024-08-19T17:15:10.320000 CVE-2024-5652,0,0,7e423119960d286a82f2194dff7590cb101783621bba898f5af7050faa75102a,2024-07-12T17:14:32.033000 CVE-2024-5653,0,0,b1d5d7ca6c03c0860bfa9c89a981cb1e40654b9c0dd686ee52416437c8a7183f,2024-07-25T12:45:19.830000 CVE-2024-5654,0,0,be6d98376b5bde79348830f6677e04bc437e5abfb9a06a2bd0a591f9c8d1c938,2024-06-10T02:52:08.267000 @@ -259330,11 +259344,11 @@ CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8 CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000 -CVE-2024-6039,0,0,7d5f53df76ec332df34fd241ec65113c7a4f85a9c8c64bd6c7419b93fc52c5c2,2024-06-17T14:15:12.620000 +CVE-2024-6039,0,1,4b5a4db383c02b57a196aeff64e9771fe65ea4f6cb31d1465158521f6c86f255,2024-08-19T19:26:48.043000 CVE-2024-6040,0,0,6a9c4144365634994ba43a8add9c13dbdf1bbd1570489b8639d9e032f2336e4e,2024-08-01T16:45:25.400000 CVE-2024-6041,0,0,92efd7a17c065b70be549e53ceedb9d064d764ccd26b9ca8d8b9c2364f8da7bf,2024-08-15T17:08:11.093000 CVE-2024-6042,0,0,283b4384a7db17fcb736e72a79d56eaff8b425e8cdc09133875467b277d4cbaa,2024-08-15T17:13:52.290000 -CVE-2024-6043,0,1,ce74e4b1aa8e1297a5b639b22669299b2dc913c5fd9d2c0dc4f35e8a9a7ec0e3,2024-08-19T17:33:55.297000 +CVE-2024-6043,0,0,ce74e4b1aa8e1297a5b639b22669299b2dc913c5fd9d2c0dc4f35e8a9a7ec0e3,2024-08-19T17:33:55.297000 CVE-2024-6044,0,0,4f21043ce144607b18656c689e724820f609703d237d24dbe17227d3f52b49e9,2024-06-17T12:42:04.623000 CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee94266,2024-06-17T12:42:04.623000 CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000 @@ -259446,8 +259460,8 @@ CVE-2024-6177,0,0,e51904c80961d41608903dd9ecba1a38d9527008f51a121ebd3747e18a611a CVE-2024-6178,0,0,59f19ecff82a76c70bb0044c2129cdaa12044314a15fb2e7dd459f8df0580df5,2024-06-20T15:16:58.507000 CVE-2024-6179,0,0,2b19138855924be9a22cebfb9d12e0ecf8edc110d160dd4a9b77eaf81994263d,2024-06-20T15:16:47.133000 CVE-2024-6180,0,0,ae7bf283ba8414ace0d3bfd9d7e72bd4b5eafadc11f0e00b9a21d42e8d6a993e,2024-07-09T18:19:14.047000 -CVE-2024-6181,0,0,25d34698435fd733d14f9e9b25e82de91cb8bdadea6e36356b43f106fe01799c,2024-06-20T14:15:11.837000 -CVE-2024-6182,0,0,99c1276e250f27ab1a7ed54d5b28afe5280c58bd34c5cf7568d77caadbeecbdd,2024-06-20T16:15:14.807000 +CVE-2024-6181,0,1,4a771d7fd4a1939a399fe23d890c6a784b853d9c1614b88a570bf3e3a1dcf878,2024-08-19T18:45:06.147000 +CVE-2024-6182,0,1,4a297c17be5ae4a5f3d26ce96174b39183e405f9b2f0229c44576db8b8114f5e,2024-08-19T18:46:05.410000 CVE-2024-6183,0,0,103c390d46ed5a5b34f5195878be208fa52acfb25358825f2747fb4a1823c1fd,2024-06-20T16:15:14.903000 CVE-2024-6184,0,0,6ed410242918c83588a5b17ccbcdbea871e2837aedc3a54aaddf5510e1de1707,2024-06-20T14:15:11.953000 CVE-2024-6185,0,0,cd6c234b3ed72fe4a1ddcb674b9d77147cb4f951db51bc078af89543191ba8a4,2024-06-25T21:16:01.940000 @@ -259570,7 +259584,7 @@ CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089 CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000 CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000 CVE-2024-6329,0,0,0297471d5ff859b5002d32cf7c9376114df7d0652dd734345b853093c75ae3a1,2024-08-08T13:04:18.753000 -CVE-2024-6330,0,1,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90cd8,2024-08-19T16:35:30.907000 +CVE-2024-6330,0,0,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90cd8,2024-08-19T16:35:30.907000 CVE-2024-6331,0,0,c6787bd55270acc7343ac6783b2d9d688cd57b7e4b276e49ad54dc36ae42c1b9,2024-08-05T12:41:45.957000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000 @@ -259581,14 +259595,14 @@ CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193d CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 CVE-2024-6347,0,0,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000 -CVE-2024-6348,1,1,ce1355b045055e9209f6106ae15dc5afb1d16e145933d7f35bb12bc4befd7c52,2024-08-19T16:15:08.973000 +CVE-2024-6348,0,1,1f0be4740551130c8620cc606781e2a1ae91ed22562ad0c79d0d1aac8719e4a7,2024-08-19T18:36:20.123000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000 -CVE-2024-6357,0,1,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000 -CVE-2024-6358,0,1,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000 -CVE-2024-6359,0,1,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000 +CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000 +CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000 +CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000 CVE-2024-6361,0,0,c78d54a60cbe74050dfcceec663bceae239fbbf7a647cea8c5a73a6e5ad54d91,2024-08-06T16:30:24.547000 CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000 CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000 @@ -259650,7 +259664,7 @@ CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a0 CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 -CVE-2024-6451,0,1,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000 +CVE-2024-6451,0,0,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,a31f9b2d11e920ef5820d5943bd943df178bc2e27d100b648bd1b922afad8eca,2024-07-03T12:53:24.977000 CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000 @@ -259705,8 +259719,8 @@ CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bed CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6532,0,0,34d446197f804dcbdd8feccdfe721cd1c46fe7ee3b5e0da65e1be9d287c7b644,2024-08-14T13:00:37.107000 -CVE-2024-6533,0,0,b55415c8a3326493bab22d96091fd9d4920c37fac71c14ba4d6220bd75764dae,2024-08-15T13:01:10.150000 -CVE-2024-6534,0,0,344d056965dec5d877ed06f701d4d5a6e6cf7d1c589efba645766e0b9264aea7,2024-08-15T13:01:10.150000 +CVE-2024-6533,0,1,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 +CVE-2024-6534,0,1,0cc2422c4acf0879987370c9bde0fddfc0c65c819154f83a709538e35fb27fca,2024-08-19T18:17:15.110000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 @@ -259873,7 +259887,7 @@ CVE-2024-6777,0,0,ca29db0995c8af0d3bc27804bd1f135839d6af869a949f56fbd75929b6968b CVE-2024-6778,0,0,84b088ec3020aa8ff5e55451d795a5507972d54955d86abc44832d806c764933,2024-08-01T14:00:42.093000 CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b9702520701b,2024-08-01T14:00:42.927000 CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000 -CVE-2024-6781,0,1,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000 +CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000 CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000 CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000 @@ -259968,8 +259982,8 @@ CVE-2024-6964,0,0,815859cc57fe1a509677a232142e7af830e9bd80af5bd8fd21b38ac7c8d853 CVE-2024-6965,0,0,3fcc61d8816494da9c26f25f69a0ed15273dbb039cc70730e1622c80fae9b32d,2024-07-25T15:44:21.740000 CVE-2024-6966,0,0,9bcf3a85a92d9b124d33de40d1bdd9ce83a8dac5678f842d3cd1baea965ede65,2024-08-12T16:45:39.317000 CVE-2024-6967,0,0,870b920e0be825c6590c6673bb0d8cf413db8e6c0b55292ec96a766089d15726,2024-07-25T15:42:18.417000 -CVE-2024-6968,0,1,dcf4fdd98b06a8e0045757b1e3508bd497797b584b272df840a344f24010b384,2024-08-19T17:49:54.017000 -CVE-2024-6969,0,1,a98e2b6f93f948b11fce949d5d2bf2ae38a52860637730f6865f49bf11e07542,2024-08-19T17:50:03.167000 +CVE-2024-6968,0,0,dcf4fdd98b06a8e0045757b1e3508bd497797b584b272df840a344f24010b384,2024-08-19T17:49:54.017000 +CVE-2024-6969,0,0,a98e2b6f93f948b11fce949d5d2bf2ae38a52860637730f6865f49bf11e07542,2024-08-19T17:50:03.167000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 CVE-2024-6973,0,0,f4f6073cfad6735c79993dea118c012d4505943ec69d6e1dd04d0e4ec60e6fc6,2024-08-01T12:42:36.933000 @@ -259997,8 +260011,8 @@ CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa4 CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000 CVE-2024-7006,0,0,e6fa209ac0713e033e0ece6a5e36f45d5c69970bc1d46f1daeb274aa6fa96cd4,2024-08-13T15:14:35.167000 CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000 -CVE-2024-7008,0,1,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 -CVE-2024-7009,0,1,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 +CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 +CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7029,0,0,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c22,2024-08-05T12:41:45.957000 @@ -260280,12 +260294,12 @@ CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f9 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000 CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000 -CVE-2024-7494,0,1,3a598ade67522bffd51a3365723ddb5bff4182d602034c8ec8df719958075683,2024-08-19T17:34:50.933000 -CVE-2024-7495,0,1,c193334e09e583bf41cda7d073dca2acbe46aabc3be2513a6c4a0be4587cb1db,2024-08-19T17:10:27.693000 -CVE-2024-7496,0,1,427bcb1106924d8f1bd58fd00923557097983d876631b3e46ebbaafc9076bb1e,2024-08-19T16:48:09.717000 -CVE-2024-7497,0,1,0b61186b94b142a62d9e9f0acfce344b96081e5204490ce5b3e8bca14a427cbd,2024-08-19T16:49:16.057000 -CVE-2024-7498,0,1,623e638103810e4789310bc9099fac82c458299de515e7f7648501d0c3caa45f,2024-08-19T16:50:27.013000 -CVE-2024-7499,0,1,88dc350a7d4a37af9159d17f7298271a0f73fc5917030391f4aaba949b8b7a86,2024-08-19T16:51:07.057000 +CVE-2024-7494,0,0,3a598ade67522bffd51a3365723ddb5bff4182d602034c8ec8df719958075683,2024-08-19T17:34:50.933000 +CVE-2024-7495,0,0,c193334e09e583bf41cda7d073dca2acbe46aabc3be2513a6c4a0be4587cb1db,2024-08-19T17:10:27.693000 +CVE-2024-7496,0,0,427bcb1106924d8f1bd58fd00923557097983d876631b3e46ebbaafc9076bb1e,2024-08-19T16:48:09.717000 +CVE-2024-7497,0,0,0b61186b94b142a62d9e9f0acfce344b96081e5204490ce5b3e8bca14a427cbd,2024-08-19T16:49:16.057000 +CVE-2024-7498,0,0,623e638103810e4789310bc9099fac82c458299de515e7f7648501d0c3caa45f,2024-08-19T16:50:27.013000 +CVE-2024-7499,0,0,88dc350a7d4a37af9159d17f7298271a0f73fc5917030391f4aaba949b8b7a86,2024-08-19T16:51:07.057000 CVE-2024-7500,0,0,931897362fb2ba79107882fb00e70aa09beff68614f848f39093ae56ae63e032,2024-08-06T16:30:24.547000 CVE-2024-7501,0,0,2fd4188d1999778b891385946f595754b20c012f67cab248f9517d628952073d,2024-08-19T13:00:23.117000 CVE-2024-7502,0,0,400715e8cd7f13a2a067bad8525237ee0b427d91f26288ec69911983b1e213dc,2024-08-12T18:50:46.897000 @@ -260296,7 +260310,7 @@ CVE-2024-7507,0,0,9ee6b1f3055c97ac339bf30e0d1417aae3da9bf356f9abf09b7c1835de3b70 CVE-2024-7512,0,0,fd60e70364aecbce0fd684b3f477fa2db11613b9801433a567920464277243a1,2024-08-12T13:41:36.517000 CVE-2024-7513,0,0,e97e1d0b0fe1604d4a2f532bc408d930683f8ae2e20453bb5753c9f4d8138c3f,2024-08-15T13:01:10.150000 CVE-2024-7515,0,0,8f90672a6914551f82bc626d65743d72c8253ec3b911121a42fadfbade21f50a,2024-08-15T13:01:10.150000 -CVE-2024-7518,0,1,3d74948c02d4c957921d5b67aab57df80b7795ebc72bd26ca456b0a500d24f9e,2024-08-19T17:52:53.887000 +CVE-2024-7518,0,0,3d74948c02d4c957921d5b67aab57df80b7795ebc72bd26ca456b0a500d24f9e,2024-08-19T17:52:53.887000 CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20 CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000 CVE-2024-7521,0,0,93e518aa5fe4de4582901fabd10f56f08fc773ab920d9d06860ccc32d826d11d,2024-08-12T16:05:10.907000 @@ -260321,7 +260335,7 @@ CVE-2024-7539,0,0,8ca50ab02514fa4f50147af014ed5c28ffea833055fdfc32acd3499e2ad0c8 CVE-2024-7540,0,0,cb5a554aa0c84746e2f58930cfb8b74760d168567497ea5e5c5527a69f70db0f,2024-08-06T16:30:24.547000 CVE-2024-7541,0,0,c9b87438ef0c3389f655c0ae7417b44a4e34fadd136e084427d65c8d9544c3b6,2024-08-06T16:30:24.547000 CVE-2024-7542,0,0,7d7280aebe9dc168d7a4a09def93da0d42a3442b7c1b4b2a8bbd3843df2a029b,2024-08-06T16:30:24.547000 -CVE-2024-7543,0,0,721a2ea3a2fbf70c403a7a60a3a0d9c1df1269d375b5343ae41c4c373db220a4,2024-08-06T16:30:24.547000 +CVE-2024-7543,0,1,503a11ee44f99a51704a6abc3db92fb588f21d0ff08bd2bd9e412e5d0c2d46f8,2024-08-19T19:59:55.340000 CVE-2024-7544,0,0,5e5704656f3acf323916d86aa21ce308fffec1da803881dd5ee0eea27f03b767,2024-08-06T16:30:24.547000 CVE-2024-7545,0,0,41789b4aa3b486ddf7d25b9471bfc90c88f8496bc14386811c5c685b59c848ee,2024-08-06T16:30:24.547000 CVE-2024-7546,0,0,a0b520d000dce64c3863ed1b5eb696449d97e5ef3503a621e0cf62f26b7a1008,2024-08-06T16:30:24.547000 @@ -260351,6 +260365,7 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 +CVE-2024-7592,1,1,f5528a09220a8b4c03dbb46c177bf2b13223c76de9acbf71ed1979f6742b92c3,2024-08-19T19:26:46.993000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 CVE-2024-7613,0,0,06e5e4cabe0ef18122aca52d435df5e080447fe62b8094db57d734d45448c36d,2024-08-12T13:41:36.517000 @@ -260373,7 +260388,7 @@ CVE-2024-7641,0,0,31531d7ba6c4790873e3e2cbb5e0f029b43c16ba80a6eb72b0be87c4075223 CVE-2024-7642,0,0,7529ae7f3e258c0bacf9321b53a5a8cb22d41a7a410253e46b217922db56c34d,2024-08-15T18:17:34.597000 CVE-2024-7643,0,0,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c1a,2024-08-15T18:18:22.827000 CVE-2024-7644,0,0,af133dd73ba0f9ae2c852b6a18dbacddae25120427cf0e48515211be4d6d6b46,2024-08-15T18:19:11.080000 -CVE-2024-7645,0,1,96cf494c675c38f631be8ab24881ec75b542e3b7a70aa5d3b002279709a08889,2024-08-19T17:48:06.303000 +CVE-2024-7645,0,0,96cf494c675c38f631be8ab24881ec75b542e3b7a70aa5d3b002279709a08889,2024-08-19T17:48:06.303000 CVE-2024-7646,0,0,0e47e4757200b360ac0ac2cd875beb2809de05dd15d4a2274662b759af795194,2024-08-19T13:00:23.117000 CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000 @@ -260425,33 +260440,33 @@ CVE-2024-7743,0,0,3235187f2f7061cd444ef7d2afe0cb7960f2e8c10cbb31f71abd28ffcd7aa9 CVE-2024-7746,0,0,57c293bd84bcc81db971f993e54710083e23fbaa2d9a714afae737b9c1e2cedc,2024-08-13T17:11:53.553000 CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000 CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000 -CVE-2024-7750,0,1,ae9806ea563d7ef9ab418b33b0dd9169de6692e64ddca227f95ec3ceb4e78bc1,2024-08-19T17:48:40.913000 -CVE-2024-7751,0,1,3d4779511baf725a6e5d9f65d6769396fd6275e830b17a69e8bf93efeb313eab,2024-08-19T17:47:51.890000 -CVE-2024-7752,0,1,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470a9,2024-08-19T17:48:25.793000 -CVE-2024-7753,0,1,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000 -CVE-2024-7754,0,1,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000 +CVE-2024-7750,0,0,ae9806ea563d7ef9ab418b33b0dd9169de6692e64ddca227f95ec3ceb4e78bc1,2024-08-19T17:48:40.913000 +CVE-2024-7751,0,0,3d4779511baf725a6e5d9f65d6769396fd6275e830b17a69e8bf93efeb313eab,2024-08-19T17:47:51.890000 +CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470a9,2024-08-19T17:48:25.793000 +CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000 +CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000 CVE-2024-7790,0,0,de624b84b425469d8968a7638e184d821831162387748e3efe2ea228bbbb34bb,2024-08-14T17:49:14.177000 CVE-2024-7792,0,0,7d3f3c07d41892a0d0321fd066142bcd5acf123ab60b0c0966ac419cc49f752e,2024-08-15T13:01:10.150000 -CVE-2024-7793,0,1,bb4d13faa2c61a286b24cee75d87f2b6ca9a8400f7f1f86af9de88e306f04a14,2024-08-19T16:25:22.220000 -CVE-2024-7794,0,1,518887acdec1d096ed1811f068ac701594939d9da7ca16210cb9fbd6cafa8631,2024-08-19T16:27:08.303000 -CVE-2024-7797,0,1,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5fe,2024-08-19T16:28:23.557000 -CVE-2024-7798,0,1,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 -CVE-2024-7799,0,1,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 -CVE-2024-7800,0,1,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 -CVE-2024-7808,0,0,5bac6dc4dc07c41c69483c5f899fb77777a9e9cb69ea7572ebd80cda7536569a,2024-08-15T13:01:10.150000 -CVE-2024-7809,0,0,533b50e0991bad430f4deb1434ac33572f5717d888895a04422ca7c00662a0c0,2024-08-15T13:01:10.150000 -CVE-2024-7810,0,0,c90b5fdb8bde24a1dfff93ba09cf18d76fc940709980b339ca495384e6bda381,2024-08-15T13:01:10.150000 -CVE-2024-7811,0,0,f9663e1dbc7b666ddba8fd8c8190a7d5e556050b2d1a2d19505eb8482f4fa115,2024-08-15T13:01:10.150000 -CVE-2024-7812,0,0,87c8d3cae623ce1eef58ebcf5867542fcf8f448ff1f043ac591948ff64f4200f,2024-08-15T13:01:10.150000 -CVE-2024-7813,0,0,c7c7b405db382b7d1a8964cfae575bd88ce05da7418b380f87d1967f0c558e10,2024-08-15T13:01:10.150000 -CVE-2024-7814,0,0,ffb1db5e495c4997b53b24d1013713e889218ca8ab7574d26dadf29020db00e8,2024-08-15T13:01:10.150000 -CVE-2024-7815,0,0,e8d85ae8e8b4512ed03f8c1f85ced2d5e4f9a31cc41104b07492a8ecd6943ea5,2024-08-15T13:01:10.150000 -CVE-2024-7828,0,0,15d05c897f506630f894d4ec4dc5ee6cd5bf09be7bf6ffc8bafb644320e8b411,2024-08-15T16:15:23.897000 -CVE-2024-7829,0,0,0363cd5df53f6cf0905488df73d9a86a0ca4a87bf0d5cf17b2d2a721b0c919ce,2024-08-15T16:15:24.677000 -CVE-2024-7830,0,0,aecb53ebfd191520b119aaf0f7b625954609768446e132bf583298cf7e78a8f5,2024-08-15T16:15:25.330000 -CVE-2024-7831,0,0,06a5ef48758a8ea0a3ac5881dbf010524be5d68b8a3bd1febf7a6780bcb7bcb0,2024-08-15T16:15:25.957000 -CVE-2024-7832,0,1,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000 -CVE-2024-7833,0,1,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 +CVE-2024-7793,0,0,bb4d13faa2c61a286b24cee75d87f2b6ca9a8400f7f1f86af9de88e306f04a14,2024-08-19T16:25:22.220000 +CVE-2024-7794,0,0,518887acdec1d096ed1811f068ac701594939d9da7ca16210cb9fbd6cafa8631,2024-08-19T16:27:08.303000 +CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5fe,2024-08-19T16:28:23.557000 +CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 +CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 +CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 +CVE-2024-7808,0,1,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 +CVE-2024-7809,0,1,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 +CVE-2024-7810,0,1,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 +CVE-2024-7811,0,1,88c1b109895453b0e016b8f565457741ad81c89fc2c5c56111b619f9ad92c4a8,2024-08-19T18:15:40.487000 +CVE-2024-7812,0,1,7d23c7651a18766135526d086e05755f7342e9775f0f39e533e1590484eb2e31,2024-08-19T18:16:21.283000 +CVE-2024-7813,0,1,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f7f,2024-08-19T18:16:48.327000 +CVE-2024-7814,0,1,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000 +CVE-2024-7815,0,1,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000 +CVE-2024-7828,0,1,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 +CVE-2024-7829,0,1,c3cc2e26bac7b68e3fabf3f591217b419b1c20cb19d25c24cc8b101a28c94a8b,2024-08-19T18:34:00.040000 +CVE-2024-7830,0,1,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f88,2024-08-19T18:34:36.987000 +CVE-2024-7831,0,1,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000 +CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000 +CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 CVE-2024-7838,0,0,08896d0dd5f0d271651ed959479ababcf3678bab2f6de38319217dbebd9121c3,2024-08-19T13:00:23.117000 CVE-2024-7839,0,0,94790d44c57f3d6cda88c2d05a1aec9fac8c3738af92c1bbde24c4a763e8b732,2024-08-19T13:00:23.117000 CVE-2024-7841,0,0,009f80811a7e510b5a67a297d5581e736005de8d0fd00ac7dc1232d79672e30e,2024-08-19T13:00:23.117000 @@ -260468,8 +260483,8 @@ CVE-2024-7867,0,0,6a317fb9db8a508202f8841173e6c3d2bd77edc707a891aff0fcaf7f472e0f CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 -CVE-2024-7896,0,1,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 -CVE-2024-7897,0,1,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000 +CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 +CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000 CVE-2024-7898,0,0,8c09771630e516b5f0f9a153f946d68f8ead0f340784a4987dcbcd7e91566a30,2024-08-19T15:15:09.297000 CVE-2024-7899,0,0,eae1357abf47e41c71af7e92c424ab9c792614c8de4efe8ea4e3fa4fd0ad24e8,2024-08-19T12:59:59.177000 CVE-2024-7900,0,0,80f124872895e5bd3ab8b707b60991c4a83751766ca4ab41aca3042ca240f062,2024-08-19T12:59:59.177000 @@ -260479,17 +260494,19 @@ CVE-2024-7903,0,0,65c75a540b1b29079982843aeb23d97ba8ab7149bfb3184abe8ee63d1aa7fd CVE-2024-7904,0,0,00b92af797fcf7243beef8cf467d3a4a50194d2f529bd582708c05ea102b2d8d,2024-08-19T12:59:59.177000 CVE-2024-7905,0,0,6de58aadea45ceeb00cc6fb61fbda9d7e7d95e6ea77af9889eb16144c4609628,2024-08-19T12:59:59.177000 CVE-2024-7906,0,0,5925ebd1a52432bd63b3f19ac1ead0d4887664fec659899d48bbaa77d66a321d,2024-08-19T12:59:59.177000 -CVE-2024-7907,0,0,a46fb17a22e049c9f8086001d3b237cc91336e6b31d48c1d648b6b54427137df,2024-08-19T12:59:59.177000 -CVE-2024-7908,0,0,12734ffdf3f625da7309d68c372ef230abaa16a785542b05a428d828372adf5b,2024-08-19T12:59:59.177000 -CVE-2024-7909,0,0,52eda1c6c71f08f62c60acd660b7ad69a9a36f7b4ed2e75cab8ac7841280a9d6,2024-08-19T12:59:59.177000 -CVE-2024-7910,0,0,e3b835723e9c9e3266c0dcb29284e7f0f2687c7d4e617116a92dc28c5689994a,2024-08-19T12:59:59.177000 -CVE-2024-7911,0,0,af7147b4a7f81aa5c808bf816c3387e1915a0295fff50b816fcead3dd261cd80,2024-08-19T12:59:59.177000 -CVE-2024-7912,0,1,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000 -CVE-2024-7913,0,1,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f2280f,2024-08-19T16:14:30.670000 -CVE-2024-7914,0,1,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000 +CVE-2024-7907,0,1,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000 +CVE-2024-7908,0,1,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000 +CVE-2024-7909,0,1,3ff5920e8c2d440f1d0a0566cd9f8d3e8252d8e263e071d23d56a988554a2719,2024-08-19T18:51:07.600000 +CVE-2024-7910,0,1,dddecbe9efccf1f397282c79f0ba4716c91b37bb24bbae91fa6ba76ac0a217be,2024-08-19T18:49:49.110000 +CVE-2024-7911,0,1,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24e4,2024-08-19T18:48:06.527000 +CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000 +CVE-2024-7913,0,0,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f2280f,2024-08-19T16:14:30.670000 +CVE-2024-7914,0,0,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000 CVE-2024-7916,0,0,cd8976783d2078b1d7553acb748a0124156db02ede21116d7f974c5bc201c436,2024-08-19T12:59:59.177000 CVE-2024-7917,0,0,eee101cab94721701b8799ab6e3327ea4308628e86850d2bd714ca62d0b6ed31,2024-08-19T12:59:59.177000 CVE-2024-7919,0,0,f2bb5e312b080254029100aad55ac0e116f106f8875406ee9eda26e8584e5716,2024-08-19T12:59:59.177000 CVE-2024-7920,0,0,c41e33ff5de5a36152bea0a48597e7ee27df39730a99a7d96b4832bf67ef32a2,2024-08-19T12:59:59.177000 CVE-2024-7921,0,0,373fc8493a42dec9024075bfa6d26cd35595f3ee4bbd93f8a4d782f94f96ad56,2024-08-19T12:59:59.177000 -CVE-2024-7922,0,0,2bddc524dfcdb213b19554e66c50edd6cd3d16ea531d6dc304d81e3c9eb3f120,2024-08-19T15:15:09.403000 +CVE-2024-7922,0,1,b9a52276ef0e4b4e0a811fa837019df24b09b6e9a0ad97caa8b416fc4ac9a3e3,2024-08-19T18:36:20.123000 +CVE-2024-7924,1,1,26e80ca5a6c3d5242f65253bd49607d64ce3c4f3d838752c2baea16ef867ef89,2024-08-19T18:36:07.297000 +CVE-2024-7925,1,1,f91a011a841c4359c403a134e1dd493039b70a163d3e50145ae97ad8d71d5ebe,2024-08-19T18:36:07.297000