diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3152.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3152.json index 7a0c41e2c36..de991445abd 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3152.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3152.json @@ -2,8 +2,8 @@ "id": "CVE-2012-3152", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-10-16T23:55:03.823", - "lastModified": "2017-08-29T01:31:49.993", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:48:04.847", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -88,23 +110,41 @@ "references": [ { "url": "http://blog.netinfiltration.com/2013/11/03/oracle-reports-cve-2012-3152-and-cve-2012-3153/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://blog.netinfiltration.com/2014/01/19/upcoming-exploit-release-oracle-forms-and-reports-11g/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://seclists.org/fulldisclosure/2014/Jan/186", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.exploit-db.com/exploits/31253", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", @@ -116,23 +156,41 @@ }, { "url": "http://www.osvdb.org/86394", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.osvdb.org/86395", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/55955", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.youtube.com/watch?v=NinvMDOj7sM", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Exploit" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79295", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-72xx/CVE-2016-7255.json b/CVE-2016/CVE-2016-72xx/CVE-2016-7255.json index 1d6d5ee7604..20e029101ee 100644 --- a/CVE-2016/CVE-2016-72xx/CVE-2016-7255.json +++ b/CVE-2016/CVE-2016-72xx/CVE-2016-7255.json @@ -2,8 +2,8 @@ "id": "CVE-2016-7255", "sourceIdentifier": "secure@microsoft.com", "published": "2016-11-10T07:00:09.460", - "lastModified": "2018-10-12T22:14:26.237", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:56:42.057", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,17 +20,17 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", @@ -75,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "NVD-CWE-noinfo" } ] } @@ -89,38 +89,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", - "matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "7519928D-0FF2-4584-8058-4C7764CD5671" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", - "matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", - "matchCriteriaId": "197E82CB-81AF-40F1-A55C-7B596891A783" + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, @@ -139,13 +139,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", - "matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" } ] } @@ -155,35 +155,59 @@ "references": [ { "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/94064", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1037251", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/mwrlabs/CVE-2016-7255", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://securingtomorrow.mcafee.com/mcafee-labs/digging-windows-kernel-privilege-escalation-vulnerability-cve-2016-7255/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html", @@ -194,7 +218,12 @@ }, { "url": "https://www.exploit-db.com/exploits/40745/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/40823/", @@ -207,7 +236,12 @@ }, { "url": "https://www.exploit-db.com/exploits/41015/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-117xx/CVE-2017-11774.json b/CVE-2017/CVE-2017-117xx/CVE-2017-11774.json index 2d9e6476a6d..e14acc205b7 100644 --- a/CVE-2017/CVE-2017-117xx/CVE-2017-11774.json +++ b/CVE-2017/CVE-2017-117xx/CVE-2017-11774.json @@ -2,8 +2,8 @@ "id": "CVE-2017-11774", "sourceIdentifier": "secure@microsoft.com", "published": "2017-10-13T13:29:00.427", - "lastModified": "2021-08-30T14:28:30.737", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:42:48.707", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -87,11 +87,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "B9DC0862-CAD4-45B8-9C29-C1E060B4FFBB" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*", @@ -99,8 +94,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*", - "matchCriteriaId": "D7B6DF1E-0DDA-4809-B216-7CEFE0A53E2B" + "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*", + "matchCriteriaId": "8D513A61-6427-4F85-AADF-99D6F223AF2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*", + "matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859" }, { "vulnerable": true, @@ -117,6 +117,7 @@ "url": "http://www.securityfocus.com/bid/101098", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -125,6 +126,7 @@ "url": "http://www.securitytracker.com/id/1039542", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -139,7 +141,10 @@ }, { "url": "https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json b/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json index 654a9a27764..8f240fcc429 100644 --- a/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json +++ b/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json @@ -2,8 +2,8 @@ "id": "CVE-2017-5638", "sourceIdentifier": "security@apache.org", "published": "2017-03-11T02:59:00.150", - "lastModified": "2023-11-07T02:49:27.957", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:58:42.913", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,26 +20,26 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 10.0, + "baseScore": 9.8, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 6.0 + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -75,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-755" } ] } @@ -89,213 +89,145 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "84408BC6-E785-4874-9409-AC02AF0A7897" + "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.3", + "versionEndExcluding": "2.3.32", + "matchCriteriaId": "40D3EE72-E37F-4F4C-996D-50E144CF43DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "79E08D3E-9F86-4E9D-B1BF-EBEA8AB3BEE3" + "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.5.0", + "versionEndExcluding": "2.5.10.1", + "matchCriteriaId": "E2F63D06-B26A-4DB6-8B07-B847554ABCA8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:7.7.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB119E1-7736-4C99-AD9C-9E8820769D4F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709" + "criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:7.8.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A0C06E-B833-4A52-B1F0-FEC9BEF372A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:7.7.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "F445D22E-8976-4ADC-81FD-49B351B2802A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2" + "criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:7.8.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9E6724-8796-4DD5-9CE2-8E602DA893F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:7.7.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "D1D7A801-1861-4479-9367-60F792BF8016" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4" + "criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:7.8.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EDF96E49-9530-4718-B5A9-7366D10CC890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:storage_v5030_firmware:7.7.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "371CD28E-6187-4EB1-8B73-645F7A6BFFD6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B" - }, + "criteria": "cpe:2.3:o:lenovo:storage_v5030_firmware:7.8.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DA0AFFAA-F7AE-416C-A40D-24F972EE18BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", - "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", - "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", - "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", - "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", - "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", - "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", - "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", - "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", - "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", - "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", - "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", - "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", - "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", - "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", - "matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", - "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", - "matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", - "matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", - "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", - "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", - "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", - "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D" + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:storage_v5030:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A4179B-51C5-486B-8CFF-D49436D60910" } ] } @@ -309,58 +241,89 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77" + "criteria": "cpe:2.3:a:hp:server_automation:9.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "112DFE68-A609-4B76-8227-4DE9CAC25F54" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248" + "criteria": "cpe:2.3:a:hp:server_automation:10.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "951C042F-9C83-4DBB-8070-A926A1B46591" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F" + "criteria": "cpe:2.3:a:hp:server_automation:10.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AC9404A4-6B73-436E-A8FB-914530D6000A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489" + "criteria": "cpe:2.3:a:hp:server_automation:10.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32AFBE84-5394-49A1-844A-ED964A46ACF7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C" + "criteria": "cpe:2.3:a:hp:server_automation:10.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "38ABFD4F-8E97-4418-A921-BF9F4D95A4A4" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B40B13B7-68B3-4510-968C-6A730EB46462" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77" + "criteria": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C93CC705-1F8C-4870-99E6-14BF264C3811" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285" + "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "29F4C533-DE42-463B-9D80-5D4C85BF1A5B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197" - }, + "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A1728D5-E03B-49A0-849C-B722197AF054" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E" - }, + "criteria": "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.5", + "matchCriteriaId": "8D1193B0-59C9-4AC0-BBA0-CED6FCC91883" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", - "matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC" + "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1" } ] } @@ -372,7 +335,7 @@ "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html", "source": "security@apache.org", "tags": [ - "Technical Description", + "Exploit", "Third Party Advisory" ] }, @@ -380,41 +343,56 @@ "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/", "source": "security@apache.org", "tags": [ - "Technical Description", + "Exploit", "Third Party Advisory" ] }, { "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html", "source": "security@apache.org", "tags": [ - "Press/Media Coverage" + "Press/Media Coverage", + "Third Party Advisory" ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/96729", "source": "security@apache.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1037973", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/", "source": "security@apache.org", "tags": [ + "Exploit", "Press/Media Coverage" ] }, @@ -428,23 +406,34 @@ }, { "url": "https://cwiki.apache.org/confluence/display/WW/S2-046", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://exploit-db.com/exploits/41570", "source": "security@apache.org", "tags": [ "Exploit", + "Third Party Advisory", "VDB Entry" ] }, { "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/mazen160/struts-pwn", @@ -457,45 +446,65 @@ "url": "https://github.com/rapid7/metasploit-framework/issues/8064", "source": "security@apache.org", "tags": [ - "Exploit" + "Exploit", + "Issue Tracking" ] }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_us", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_us", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://isc.sans.edu/diary/22169", "source": "security@apache.org", "tags": [ - "Technical Description", + "Exploit", "Third Party Advisory" ] }, { "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html", "source": "security@apache.org", "tags": [ + "Exploit", "Third Party Advisory" ] }, @@ -504,47 +513,78 @@ "source": "security@apache.org", "tags": [ "Exploit", + "Third Party Advisory", "VDB Entry" ] }, { "url": "https://security.netapp.com/advisory/ntap-20170310-0001/", - "source": "security@apache.org" - }, - { - "url": "https://struts.apache.org/docs/s2-045.html", - "source": "security@apache.org" - }, - { - "url": "https://struts.apache.org/docs/s2-046.html", - "source": "security@apache.org" - }, - { - "url": "https://support.lenovo.com/us/en/product_security/len-14200", - "source": "security@apache.org" - }, - { - "url": "https://twitter.com/theog150/status/841146956135124993", "source": "security@apache.org", "tags": [ "Third Party Advisory" ] }, + { + "url": "https://struts.apache.org/docs/s2-045.html", + "source": "security@apache.org", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] + }, + { + "url": "https://struts.apache.org/docs/s2-046.html", + "source": "security@apache.org", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] + }, + { + "url": "https://support.lenovo.com/us/en/product_security/len-14200", + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://twitter.com/theog150/status/841146956135124993", + "source": "security@apache.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, { "url": "https://www.exploit-db.com/exploits/41614/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.kb.cert.org/vuls/id/834067", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json index 31a96be3182..cdd346d9a90 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json @@ -2,8 +2,8 @@ "id": "CVE-2017-9805", "sourceIdentifier": "security@apache.org", "published": "2017-09-15T19:29:00.237", - "lastModified": "2019-08-12T21:15:15.000", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:40:54.857", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -89,293 +89,87 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4" + "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1.2", + "versionEndExcluding": "2.3.34", + "matchCriteriaId": "13744BE3-2443-4640-BDB4-722C4D393B65" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76" + "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.5.0", + "versionEndExcluding": "2.5.13", + "matchCriteriaId": "6B45E858-E783-4D6E-AFD3-97E9963EB05B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B1E953-33EF-498D-AB75-4A0A7733BC54" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A" + "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\\(1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "CF4C9089-0F27-4C66-8E12-2BCAC148B7C9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76" + "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.0\\(1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "7FCC3E9D-4D39-4530-A5FC-7E9A4E395D60" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A" + "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.5\\(1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "F972A2A1-3002-4086-8FA2-F231D4ED0B00" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E" + "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.6\\(1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "D52C5D91-33D1-4C90-BEC9-90D955AA5883" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642" + "criteria": "cpe:2.3:a:cisco:media_experience_engine:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "93C3A3B2-B346-47F4-B987-0098AB95F939" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7" + "criteria": "cpe:2.3:a:cisco:media_experience_engine:3.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "87CCEC7F-058D-4202-88B3-F06372DFFA99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772" + "criteria": "cpe:2.3:a:cisco:network_performance_analysis:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76D400A4-9918-494E-89B7-EAA57B2830D2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A" - }, + "criteria": "cpe:2.3:a:cisco:video_distribution_suite_for_internet_streaming:-:*:*:*:*:*:*:*", + "matchCriteriaId": "912F9C5E-AA5F-4746-AC49-D33C2495C73B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", - "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", - "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", - "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", - "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", - "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", - "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", - "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", - "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", - "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", - "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", - "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", - "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*", - "matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*", - "matchCriteriaId": "8E5068CA-A472-47D2-A89F-A43EA8617874" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", - "matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "725DBE04-720B-421E-B76A-4EE92FEE171C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3BC73DA-F68C-4CB9-B843-061B747353B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:struts:2.5.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0F36F794-B949-40DB-986A-EDB0E6619100" + "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1" } ] } @@ -387,6 +181,7 @@ "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "source": "security@apache.org", "tags": [ + "Patch", "Third Party Advisory" ] }, @@ -394,6 +189,7 @@ "url": "http://www.securityfocus.com/bid/100609", "source": "security@apache.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -402,6 +198,7 @@ "url": "http://www.securitytracker.com/id/1039263", "source": "security@apache.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -432,16 +229,23 @@ }, { "url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20170907-0001/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://struts.apache.org/docs/s2-052.html", "source": "security@apache.org", "tags": [ + "Mitigation", "Vendor Advisory" ] }, @@ -456,13 +260,18 @@ "url": "https://www.exploit-db.com/exploits/42627/", "source": "security@apache.org", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.kb.cert.org/vuls/id/112992", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json b/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json index b5eb9ad51e4..58cce8d5a5f 100644 --- a/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json +++ b/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0802", "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-10T01:29:00.820", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:45:59.623", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -99,8 +99,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", - "matchCriteriaId": "120690A6-E0A1-4E36-A35A-C87109ECC064" + "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*", + "matchCriteriaId": "552E1557-D6FA-45DD-9B52-E13ACDBB8A62" }, { "vulnerable": true, @@ -129,8 +129,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", - "matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA" + "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*", + "matchCriteriaId": "D7A48E44-F01A-40AD-B8AF-8FE368248003" }, { "vulnerable": true, @@ -152,6 +152,7 @@ "url": "http://www.securityfocus.com/bid/102347", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -160,6 +161,7 @@ "url": "http://www.securitytracker.com/id/1040153", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -168,6 +170,7 @@ "url": "https://0patch.blogspot.com/2018/01/the-bug-that-killed-equation-editor-how.html", "source": "secure@microsoft.com", "tags": [ + "Exploit", "Third Party Advisory" ] }, @@ -183,7 +186,6 @@ "url": "https://github.com/zldww2011/CVE-2018-0802_POC", "source": "secure@microsoft.com", "tags": [ - "Exploit", "Third Party Advisory" ] }, @@ -197,7 +199,10 @@ }, { "url": "https://research.checkpoint.com/another-office-equation-rce-vulnerability/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json b/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json index a8e416ec1a8..dabcd269174 100644 --- a/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json +++ b/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6789", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-08T23:29:01.170", - "lastModified": "2021-06-03T18:15:07.720", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T13:47:22.850", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -75,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } @@ -130,13 +130,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", - "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", - "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6" }, { "vulnerable": true, @@ -159,7 +159,12 @@ }, { "url": "http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2018/02/07/2", @@ -173,6 +178,7 @@ "url": "http://www.securityfocus.com/bid/103049", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -181,6 +187,7 @@ "url": "http://www.securitytracker.com/id/1040461", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -189,7 +196,7 @@ "url": "https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/", "source": "cve@mitre.org", "tags": [ - "Technical Description", + "Exploit", "Third Party Advisory" ] }, @@ -204,8 +211,7 @@ "url": "https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Patch" ] }, { @@ -227,6 +233,7 @@ "url": "https://www.debian.org/security/2018/dsa-4110", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json index 9bee623b2d6..a7274e508a6 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6968", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:52.810", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T12:48:56.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themoneytizer:the_moneytizer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "10.0.1", + "matchCriteriaId": "80061CEE-BA8D-4D0D-9105-80A52D957F76" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/the-moneytizer/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14351561-bd31-4aaa-931a-e72917458013?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7271.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7271.json new file mode 100644 index 00000000000..d9adad088de --- /dev/null +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7271.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-7271", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-07-25T12:15:02.207", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-840" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0231.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0231.json index 21963d8a728..d95d1cbc397 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0231.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0231", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:09.340", - "lastModified": "2024-07-24T23:15:09.340", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json index 50bc8950d97..e65f5ea0527 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0910", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.010", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T12:52:10.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:restrict:restrict_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.8", + "matchCriteriaId": "6406EED1-9297-4D70-9CB6-FDE6DF1605D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/restrict-for-elementor/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14993c04-7fe3-4c42-a605-2e431df14d79?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json index 737000e9f8b..e8bedeec06a 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0972", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:10.923", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:04:13.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:membersonly:buddypress_members_only:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.3.5", + "matchCriteriaId": "78EE05A1-2A66-45DA-A85D-8964E9D02E0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/buddypress-members-only/trunk/buddypress-members-only.php#L682", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfead67-d75d-46ae-ac68-a34643ac2f52?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json index b342d2b21ac..2d890729326 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2017", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T03:15:08.847", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:02:47.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,26 +39,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:edmonsoft:countdown_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.8.1", + "matchCriteriaId": "EF0A4F03-3B81-4182-906D-1EECC944C73A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/countdown-builder/trunk/classes/Ajax.php#L51", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/countdown-builder/trunk/classes/Ajax.php#L92", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3096150/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097588/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8fab229-cd6b-45a3-9e80-a03a1704ad3e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21684.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21684.json index c26e2c090a0..cc9a94f5946 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21684.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21684", "sourceIdentifier": "security@atlassian.com", "published": "2024-07-24T18:15:03.793", - "lastModified": "2024-07-24T18:15:03.793", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json index 902e43ba0ed..1ee2bd672a7 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2350", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.237", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T12:57:24.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,22 +59,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cleversoft:clever_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.9", + "matchCriteriaId": "D3DDC4F1-2CE0-45AA-A8BE-92F9DA5AFF6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-icon.php#L396", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-slider.php#L1394", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-team-member.php#L948", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca5befe9-7769-4367-84cf-05aabeced67a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2473.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2473.json index 7c4b5003e90..21881d2756c 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2473.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2473", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-11T03:15:10.183", - "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:25:04.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.16", + "matchCriteriaId": "2191D991-CFCD-44CC-B4D0-CB2D07AA80BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3099109/wps-hide-login", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd21c7d3-a5f1-4c3a-b6ab-0a979f070a62?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json index b73f0673b1f..c3f771e34eb 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30471", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T09:15:02.640", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-25T13:39:17.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de verificaci\u00f3n de tiempo de uso (TOCTOU) en Apache StreamPipes en el registro autom\u00e1tico del usuario. Esto permite que un atacante solicite potencialmente la creaci\u00f3n de varias cuentas con la misma direcci\u00f3n de correo electr\u00f3nico hasta que se registre la direcci\u00f3n de correo electr\u00f3nico, lo que crea muchos usuarios id\u00e9nticos y corrompe la administraci\u00f3n de usuarios de StreamPipe. Este problema afecta a Apache StreamPipes: hasta 0.93.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.95.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.95.0", + "matchCriteriaId": "B5EC9EC8-4988-4DAC-A92F-CCDED7F9CB52" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/8yodrmohgcybq900or3d4hc1msl230fr", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json index 166648eb4ac..d76864d81ef 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31979", "sourceIdentifier": "security@apache.org", "published": "2024-07-17T09:15:02.907", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-25T13:38:56.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Apache StreamPipes durante el proceso de instalaci\u00f3n de elementos de canalizaci\u00f3n. Anteriormente, StreamPipes permit\u00eda a los usuarios configurar endpoints personalizados desde los cuales instalar elementos de canalizaci\u00f3n adicionales. Estos endpoints no se validaron adecuadamente, lo que permiti\u00f3 que un atacante lograra que StreamPipes enviara una solicitud HTTP GET a una direcci\u00f3n arbitraria. Este problema afecta a Apache StreamPipes: hasta 0.93.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.95.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.95.0", + "matchCriteriaId": "B5EC9EC8-4988-4DAC-A92F-CCDED7F9CB52" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/8lryp3bxnby9kmk13odkz2jbfdjfvf0y", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json index 4ae554e14ed..150c5050548 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33519", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:03.640", - "lastModified": "2024-07-24T20:15:03.640", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35737.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35737.json index 77a8d8c9943..b0551eacd24 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35737.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35737", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:56.140", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:07:47.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:loopus:wp_visitors_tracker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "84E5F4ED-4ADB-4C79-A7D9-7D5B70845A59" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp_visitorstracker/wordpress-wp-visitors-tracker-plugin-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35738.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35738.json index e37f917d00c..1afa06db65b 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35738.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35738", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:56.430", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:08:32.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kognetics:kognetiks_chatbot:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.9", + "matchCriteriaId": "1CC3A804-5A69-4C7D-992B-6120E2CED37E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/chatbot-chatgpt/wordpress-kognetiks-chatbot-for-wordpress-plugin-1-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json index 5691ac433e3..44105594233 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35739", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:56.660", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:09:33.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radiustheme:post_grid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.7.2", + "matchCriteriaId": "705EA9B4-5219-47A8-ABD8-8791B3D6D3B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/the-post-grid/wordpress-the-post-grid-plugin-7-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35740.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35740.json index a4f55362a34..baaeb557665 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35740.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35740", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:56.910", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:10:22.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themefreesia:pixgraphy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.9", + "matchCriteriaId": "1F13062A-CED2-46EB-A8AD-D42C1FE3912D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pixgraphy/wordpress-pixgraphy-theme-1-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35751.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35751.json index cb82808da45..f50ce8848de 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35751.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35751.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35751", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:57.370", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:17:42.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cm-wp:woody_ad_snippets:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.1", + "matchCriteriaId": "4E70D871-71CE-4853-8CFD-158C72BAFC8A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/insert-php/wordpress-woody-code-snippets-plugin-2-4-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35752.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35752.json index aafcc7e0ede..3b539f0929a 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35752.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35752.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35752", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:57.607", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:23:13.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:overclokk:stellissimo_text_box:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.4", + "matchCriteriaId": "DCB6E237-765E-424A-9F9D-64230B2BB604" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stellissimo-text-box/wordpress-stellissimo-text-box-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json index c311ecf22b4..d4e7517e580 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36533", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:03.903", - "lastModified": "2024-07-24T20:15:03.903", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json index 470aef72310..43e40049071 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36534.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36534", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:03.967", - "lastModified": "2024-07-24T20:15:03.967", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json index a4978ce798d..7034e69878d 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36535", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:04.030", - "lastModified": "2024-07-24T20:15:04.030", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json index 659374be342..584412ed314 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36536", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.293", - "lastModified": "2024-07-24T19:15:04.293", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json index afe6060330e..53b43ec807a 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36537", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.373", - "lastModified": "2024-07-24T19:15:04.373", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json index 820f6e8c72a..69cb508a47c 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36538", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.487", - "lastModified": "2024-07-24T19:15:04.487", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json index 2323272b43b..a6fe3578a46 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36539", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T17:15:10.767", - "lastModified": "2024-07-24T17:15:10.767", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json index 8de26e0b01d..877f126cad9 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36540", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T17:15:10.827", - "lastModified": "2024-07-24T17:15:10.827", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json index 6edbfe9f623..b6aaed15d6c 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37084", "sourceIdentifier": "security@vmware.com", "published": "2024-07-25T10:15:07.260", - "lastModified": "2024-07-25T10:15:07.260", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37245.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37245.json index b1a0c08d871..7dde516a256 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37245.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37245.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37245", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:05.123", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:57:37.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vsourz:all_in_one_redirection:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.0", + "matchCriteriaId": "EF71FAB4-FA16-461F-B57B-86DAEAA8E41A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/all-in-one-redirection/wordpress-all-in-one-redirection-plugin-2-2-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37246.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37246.json index c92942c98f5..f03088b0b09 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37246.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37246.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37246", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:05.390", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:57:08.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gallery_slideshow_project:gallery_slideshow:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.1", + "matchCriteriaId": "FB592903-65B0-4221-8B9A-3F084A176021" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/gallery-slideshow/wordpress-gallery-slideshow-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37257.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37257.json index 096474ee3c6..bfafdb37b71 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37257.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37257", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:05.627", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:55:53.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.3.4", + "matchCriteriaId": "343AD6DF-1B44-4EAA-ABA0-F982E4BE0CD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/permalink-manager/wordpress-permalink-manager-lite-plugin-2-4-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37258.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37258.json index 67afeeaf696..2c44093b249 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37258.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37258", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:05.870", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:54:49.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpsocialrocket:social_rocket:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.4", + "matchCriteriaId": "994ED751-31A4-4373-9E43-2B8A6F7955F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/social-rocket/wordpress-social-rocket-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37259.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37259.json index 5a3fec7c70c..e535bf9adb8 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37259.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37259", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:06.123", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:54:19.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpextended:wp_extended:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.0", + "matchCriteriaId": "1492775E-0762-43FF-A81F-AF0D3FFACA06" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpextended/wordpress-wp-extended-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37261.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37261.json index 5f9af4e7eeb..6df65a94ae8 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37261.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37261.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37261", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:06.380", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:53:30.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wplab:wp-lister_lite_for_amazon:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.17", + "matchCriteriaId": "079C64E0-6F1E-47A6-B7E5-439B4C397A41" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-lister-for-amazon/wordpress-wp-lister-lite-for-amazon-plugin-2-6-16-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json index 078c197d2c0..d79c46b02fc 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37262", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:06.623", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:52:40.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.4.3", + "matchCriteriaId": "6D841E0E-5D9D-4B92-971B-553D8BA51178" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/meeting-scheduler-by-vcita/wordpress-online-booking-scheduling-calendar-plugin-4-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37263.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37263.json index f336445f896..83c61117716 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37263.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37263", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:06.890", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:52:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themelooks:enter_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.7", + "matchCriteriaId": "64963988-4780-49C7-A096-71A4A853CF6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/enteraddons/wordpress-enter-addons-ultimate-template-builder-for-elementor-plugin-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37264.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37264.json index ebe0b393302..106035e7264 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37264.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37264", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:07.127", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:51:29.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:groundhogg:groundhogg:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.3", + "matchCriteriaId": "CF4C5C4D-466B-47D8-AB64-693F911EAB46" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/groundhogg/wordpress-groundhogg-plugin-3-4-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37265.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37265.json index ba873c84fc6..dfc10b8eb85 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37265.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37265.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37265", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:07.350", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:51:00.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:northernbeacheswebsites:ideapush:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.61", + "matchCriteriaId": "B86D7275-0287-40D5-B50B-0A1DFC97D75B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ideapush/wordpress-ideapush-plugin-8-60-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37267.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37267.json index bc1fc85729c..4a146bcd361 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37267.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37267", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:07.593", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:47:43.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kaptinlin:striking:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.5", + "matchCriteriaId": "F07B1927-C1B4-4391-BE98-AE8E6EE237E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/striking-r/wordpress-striking-theme-2-3-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37271.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37271.json index d0be45373ec..c1d44b3c658 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37271.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37271.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37271", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:07.967", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T13:46:39.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:print_my_blog_project:print_my_blog:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.27.1", + "matchCriteriaId": "E16B3E6D-C06E-46DA-8076-06A69A1F7EA7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/print-my-blog/wordpress-print-my-blog-plugin-3-27-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37533.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37533.json index aefb47bf4f9..5f04aed37a0 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37533.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37533", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-24T18:15:04.690", - "lastModified": "2024-07-24T18:15:04.690", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39670.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39670.json new file mode 100644 index 00000000000..d776b8bef4d --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39670", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-07-25T12:15:02.483", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Privilege escalation vulnerability in the account synchronisation module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39671.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39671.json new file mode 100644 index 00000000000..a0c0b182e98 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39671.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39671", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-07-25T12:15:02.800", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Access control vulnerability in the security verification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-840" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39672.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39672.json new file mode 100644 index 00000000000..f69d82d86ee --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39672.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39672", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-07-25T12:15:03.087", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory request logic vulnerability in the memory module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39673.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39673.json new file mode 100644 index 00000000000..b549d0fa352 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39673.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39673", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-07-25T12:15:03.350", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-26" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39674.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39674.json new file mode 100644 index 00000000000..82501b4fcdc --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39674.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39674", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-07-25T12:15:03.563", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Plaintext vulnerability in the Gallery search module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json index a0d390c1bb8..e73db20fa9c 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40137.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40137", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.637", - "lastModified": "2024-07-24T19:15:04.637", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json index 8e6142f5ba5..a64d24bd658 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40495", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T19:15:04.693", - "lastModified": "2024-07-24T19:15:04.693", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41110.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41110.json index 91da9dc032f..1c0888b485c 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41110.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41110.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41110", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T17:15:11.053", - "lastModified": "2024-07-24T17:15:11.053", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json index 815fa3c12f7..76d5c9d200f 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41133", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:04.237", - "lastModified": "2024-07-24T20:15:04.237", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json index 091c7272e48..5677b0864be 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41134", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:04.427", - "lastModified": "2024-07-24T20:15:04.427", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json index 1598aa40df1..bdf7cf501b0 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41135", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T20:15:04.600", - "lastModified": "2024-07-24T20:15:04.600", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json index db88a1edc21..39095dc7769 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41136", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T21:15:11.857", - "lastModified": "2024-07-24T21:15:11.857", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json index e1b3812bb2f..cbf10c17054 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41459", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.037", - "lastModified": "2024-07-24T21:15:12.037", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json index e6c4e51effa..11793d7fff6 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41460.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41460", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.097", - "lastModified": "2024-07-24T21:15:12.097", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json index 8b290651cca..9ccc5e6aa5d 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41461", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.150", - "lastModified": "2024-07-24T21:15:12.150", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json index 6952f1eef3c..76a6f68ad84 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41462", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.207", - "lastModified": "2024-07-24T21:15:12.207", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json index c11fe3709f7..cc4834d87d2 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41463", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.260", - "lastModified": "2024-07-24T21:15:12.260", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json index fb83c6b155b..6d0e4d189b5 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41464", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.313", - "lastModified": "2024-07-24T21:15:12.313", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json index cc82980518f..1e0ec003d47 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41465", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.370", - "lastModified": "2024-07-24T21:15:12.370", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json index f186892c5ae..61cf236a90f 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41466", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.423", - "lastModified": "2024-07-24T21:15:12.423", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json index 1824fec24ee..c76c108ca00 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41550.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41550", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:04.777", - "lastModified": "2024-07-24T20:15:04.777", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json index 95ebb850c94..88006537d76 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41551", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T20:15:04.837", - "lastModified": "2024-07-24T20:15:04.837", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41662.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41662.json index 6451929d339..9e51f712af1 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41662.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41662", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T17:15:11.310", - "lastModified": "2024-07-24T17:15:11.310", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json index f5d1220c5fa..5cacb1d192c 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41666", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.090", - "lastModified": "2024-07-24T18:15:05.090", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json index a4825eac522..274ba33d2f9 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41667", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.310", - "lastModified": "2024-07-24T18:15:05.310", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41672.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41672.json index aa4c61e4ae5..2d795afe8a1 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41672.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41672", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.527", - "lastModified": "2024-07-24T18:15:05.527", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json index 85919b87266..4d6247c86f7 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41705", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T08:15:02.467", - "lastModified": "2024-07-25T08:15:02.467", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json index 3b1cc6b2706..216c886b0be 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41706", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T08:15:02.783", - "lastModified": "2024-07-25T08:15:02.783", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json index d718fce635b..4e85f0f4f99 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41707", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T08:15:02.980", - "lastModified": "2024-07-25T08:15:02.980", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4811.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4811.json index 94c60a14d1f..5aa7f83d995 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4811.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4811", "sourceIdentifier": "security@octopus.com", "published": "2024-07-25T05:15:26.513", - "lastModified": "2024-07-25T05:15:26.513", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json index 69205a1cc58..197d96fa42c 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5067", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:09.610", - "lastModified": "2024-07-24T23:15:09.610", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json index d792fa9987a..40c0d15fd37 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5653", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-05T21:15:15.247", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-25T12:45:19.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:changjietong:t\\+:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "0C1FA189-72A1-40B7-BF82-5F24EBF97183" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vulreport3r/cve-reports/blob/main/There_is_a_SQL_injection_vulnerability_in_the_Changjietong_T%2Bsystem/report.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.267185", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.267185", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.345311", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6589.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6589.json index fab95d89583..51ce8e7808b 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6589.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6589.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6589", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-25T11:15:10.333", - "lastModified": "2024-07-25T11:15:10.333", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6972.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6972.json index a10de1a4f39..f93a868ced5 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6972.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6972", "sourceIdentifier": "security@octopus.com", "published": "2024-07-25T06:15:01.967", - "lastModified": "2024-07-25T06:15:01.967", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7047.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7047.json index c039d4c0dd7..04c9aa561e0 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7047.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7047", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-25T01:15:09.830", - "lastModified": "2024-07-25T01:15:09.830", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json index 982e21fe067..a503f2ca2c7 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7057", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-25T01:15:10.040", - "lastModified": "2024-07-25T01:15:10.040", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json index 045a8794a5e..2104d30d100 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7060", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:09.817", - "lastModified": "2024-07-24T23:15:09.817", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7080.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7080.json index d2ccf751d5c..fa485d8255e 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7080.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7080", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-24T20:15:05.117", - "lastModified": "2024-07-24T20:15:05.117", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7081.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7081.json index 27fba7433bc..0e1412c0673 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7081.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7081", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-24T21:15:12.913", - "lastModified": "2024-07-24T21:15:12.913", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json index 01e9edb11ea..c5330bab2a2 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7091", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:10.013", - "lastModified": "2024-07-24T23:15:10.013", - "vulnStatus": "Received", + "lastModified": "2024-07-25T12:36:39.947", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index c023f47c602..0e29bb98c3b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-25T12:00:17.018055+00:00 +2024-07-25T14:00:17.952126+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-25T11:15:10.333000+00:00 +2024-07-25T13:58:42.913000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257949 +257955 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `6` -- [CVE-2024-37084](CVE-2024/CVE-2024-370xx/CVE-2024-37084.json) (`2024-07-25T10:15:07.260`) -- [CVE-2024-6589](CVE-2024/CVE-2024-65xx/CVE-2024-6589.json) (`2024-07-25T11:15:10.333`) +- [CVE-2023-7271](CVE-2023/CVE-2023-72xx/CVE-2023-7271.json) (`2024-07-25T12:15:02.207`) +- [CVE-2024-39670](CVE-2024/CVE-2024-396xx/CVE-2024-39670.json) (`2024-07-25T12:15:02.483`) +- [CVE-2024-39671](CVE-2024/CVE-2024-396xx/CVE-2024-39671.json) (`2024-07-25T12:15:02.800`) +- [CVE-2024-39672](CVE-2024/CVE-2024-396xx/CVE-2024-39672.json) (`2024-07-25T12:15:03.087`) +- [CVE-2024-39673](CVE-2024/CVE-2024-396xx/CVE-2024-39673.json) (`2024-07-25T12:15:03.350`) +- [CVE-2024-39674](CVE-2024/CVE-2024-396xx/CVE-2024-39674.json) (`2024-07-25T12:15:03.563`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `81` +- [CVE-2024-41462](CVE-2024/CVE-2024-414xx/CVE-2024-41462.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41463](CVE-2024/CVE-2024-414xx/CVE-2024-41463.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41464](CVE-2024/CVE-2024-414xx/CVE-2024-41464.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41465](CVE-2024/CVE-2024-414xx/CVE-2024-41465.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41466](CVE-2024/CVE-2024-414xx/CVE-2024-41466.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41550](CVE-2024/CVE-2024-415xx/CVE-2024-41550.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41551](CVE-2024/CVE-2024-415xx/CVE-2024-41551.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41662](CVE-2024/CVE-2024-416xx/CVE-2024-41662.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41666](CVE-2024/CVE-2024-416xx/CVE-2024-41666.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41667](CVE-2024/CVE-2024-416xx/CVE-2024-41667.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41672](CVE-2024/CVE-2024-416xx/CVE-2024-41672.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41705](CVE-2024/CVE-2024-417xx/CVE-2024-41705.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41706](CVE-2024/CVE-2024-417xx/CVE-2024-41706.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-41707](CVE-2024/CVE-2024-417xx/CVE-2024-41707.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-4811](CVE-2024/CVE-2024-48xx/CVE-2024-4811.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-5067](CVE-2024/CVE-2024-50xx/CVE-2024-5067.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-5653](CVE-2024/CVE-2024-56xx/CVE-2024-5653.json) (`2024-07-25T12:45:19.830`) +- [CVE-2024-6589](CVE-2024/CVE-2024-65xx/CVE-2024-6589.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-6972](CVE-2024/CVE-2024-69xx/CVE-2024-6972.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-7047](CVE-2024/CVE-2024-70xx/CVE-2024-7047.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-7057](CVE-2024/CVE-2024-70xx/CVE-2024-7057.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-7060](CVE-2024/CVE-2024-70xx/CVE-2024-7060.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-7080](CVE-2024/CVE-2024-70xx/CVE-2024-7080.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-7081](CVE-2024/CVE-2024-70xx/CVE-2024-7081.json) (`2024-07-25T12:36:39.947`) +- [CVE-2024-7091](CVE-2024/CVE-2024-70xx/CVE-2024-7091.json) (`2024-07-25T12:36:39.947`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 254095090f2..930dfbf2b4f 100644 --- a/_state.csv +++ b/_state.csv @@ -54630,7 +54630,7 @@ CVE-2012-3148,0,0,732839a00cfd9bdda703408b26e8ed6eafb432e01415fd2f3ed23a04016cd4 CVE-2012-3149,0,0,6970b0df1a9ca1d3084e56a4b488a39f914051e29e0f00c13ce301698819c523,2019-12-17T15:25:27.643000 CVE-2012-3150,0,0,b17f58d55ec260e217d4333ee3133f8d76e7bdbdac13b483cfb443d5a714db65,2022-08-29T20:56:10.397000 CVE-2012-3151,0,0,55a058993d122bda5cfb8f2c4957e268a8091c6553efa4be9cd157ab956239e4,2013-10-11T03:44:26.287000 -CVE-2012-3152,0,0,d477890f67d08313a851d8a4a81f2a3639bee5b814e91822470e70ded0c99da9,2017-08-29T01:31:49.993000 +CVE-2012-3152,0,1,0c3328208a3aca25ec708e000f21db8b26c3be4787794edcb5ac89c1895b8e0d,2024-07-25T13:48:04.847000 CVE-2012-3153,0,0,c92d9c9a5343fda3bfb8fde50e9c143d86c160885e6cbf0e7ce9c5c5fcd4b7cb,2017-08-29T01:31:50.057000 CVE-2012-3154,0,0,118ec05c13da0f0b40b5fea7905a3119a3101eae6dd7d65be7fcc3dad0402ce3,2013-10-11T03:44:26.507000 CVE-2012-3155,0,0,45d60f73ebe35d94b58549a3502525ab7fb65d1660288c3d06cc1cc54cf58264,2013-10-11T03:44:26.633000 @@ -90202,7 +90202,7 @@ CVE-2016-7251,0,0,07de8dc4f852ba1e9e87207e1275b09dac7989aa24d20af1cf4d2fd835ac6e CVE-2016-7252,0,0,8f02ba49da7a4ec39a1e008a10fd32328d9cd9121ddbad53fb1b67deab0d3b88,2018-10-12T22:14:25.437000 CVE-2016-7253,0,0,3690c09ebeda287d940b3c5e0a9cf0153589d08ce6d0bb477dce9e419de2cafc,2018-10-12T22:14:25.703000 CVE-2016-7254,0,0,f550693366ee4923a06591a8e6de88b3eb563a4eb476632fb507c43beb1ff170,2018-10-12T22:14:25.953000 -CVE-2016-7255,0,0,091b1786571c88ffdf2ae56da52238f0414d80c440045147c583e2f7dba90607,2018-10-12T22:14:26.237000 +CVE-2016-7255,0,1,df86a7f298d265d02d90da8deb8c839a1e993dc49a362c53fc8a78d12a0cb7de,2024-07-25T13:56:42.057000 CVE-2016-7256,0,0,15d3b7de56fa5777f16cf83798319a5f5e235a25876f626e37ad14782dd22c92,2024-07-02T12:58:59.060000 CVE-2016-7257,0,0,24d9aad80e16bc3a4c2e63f2fed4f52d316a0d45ab5fb46717793fa9af3ad76c,2018-10-12T22:14:27.517000 CVE-2016-7258,0,0,1ffae5fd1d009d9ce4f5c36f94407d1aa57df7fc508bb0b87647a0daf679dc67,2018-10-12T22:14:28 @@ -95688,7 +95688,7 @@ CVE-2017-1177,0,0,b5efd601f1a05116335552f23cadf9475d7bdc24e52e8a9866dd055fbcb80e CVE-2017-11770,0,0,dc4428c324d156a985f1ff905ae038d2178aae3c4b30d9e0a24bd73606a01156,2019-04-16T20:01:07.733000 CVE-2017-11771,0,0,735c97d9bb3e38f022b05e80e9b72f93e0a1d22a3a78f3cb2a9fda5e5fa7078c,2019-10-03T00:03:26.223000 CVE-2017-11772,0,0,2f9ce76708448d5fc60608c5ec2347bc761076823702379e20c76ef3c11eb8c1,2017-10-20T13:37:34.603000 -CVE-2017-11774,0,0,8b2b4f980deb3eb4472b9e00bdaae42113bac4226a1686785706db9910717ace,2021-08-30T14:28:30.737000 +CVE-2017-11774,0,1,ba18ec1616a914f8d01c8309b89d47b8f053365afb678d1de06443305f39c336,2024-07-25T13:42:48.707000 CVE-2017-11775,0,0,ab5841eabaf6ece5cb1ac7099b8f7f7964aabd7b81ce623e0acf0eef71e7190c,2017-10-20T13:27:13.730000 CVE-2017-11776,0,0,74dcf2a044291d00c2cef8ca61f9eb729a4a5ffadd30ef4d6d11706a8a95d7d3,2017-11-03T16:18:43.790000 CVE-2017-11777,0,0,5a1ac8e8bde0f8ef00c904fb38c4cda6ad7db65004a4cff7b18890a803a34ff2,2017-10-20T13:27:00.853000 @@ -105868,7 +105868,7 @@ CVE-2017-5634,0,0,8681204f66f1e5daa436479e65c62a254601945aaace0acd5aa225f47b1c6d CVE-2017-5635,0,0,ce85fdd2d8fb6256be1adb60e15f7ae9fcf5bb08abe059283ebb90b416a18ca7,2019-10-03T00:03:26.223000 CVE-2017-5636,0,0,da15186947abc3dd02d00bc523083c143a22fa87f2cf2caa633fd940434513e1,2017-11-07T13:52:00.423000 CVE-2017-5637,0,0,178fbc5f84b0ced7fdb4b2703233a1cfcd6889f484425edc497676c188b4f09d,2023-11-07T02:49:27.780000 -CVE-2017-5638,0,0,b6caec6648b827a7b70feddfcc4588ba3ee470ce7f25f54b6c0be45fe5bc5763,2023-11-07T02:49:27.957000 +CVE-2017-5638,0,1,2d481c0f084e830b63d0f605125a6c560492a6ea5f6908ce74e868b1ae9ceb73,2024-07-25T13:58:42.913000 CVE-2017-5639,0,0,462a0f7c78ab8086edebd9f13969ca06172b26aeaf48715bd8ef53f97b1e42ea,2023-11-07T02:49:28.107000 CVE-2017-5640,0,0,3a2b2af3dda8acc621d49785ce2f904b9ef980a1cf484620cd3202f2315b00be,2023-11-07T02:49:28.357000 CVE-2017-5641,0,0,ddddaf9c8edcd1f950abc4d2bfd7bfb9fecd65bd2633d3f4e705568d57385d3a,2023-11-07T02:49:28.413000 @@ -109565,7 +109565,7 @@ CVE-2017-9801,0,0,3a54093ea736d5a0e30829805636ef1cb3d79e3a6d31f3beb661854399464e CVE-2017-9802,0,0,3cdd28d95b70cf9d9da69844949a45c92764d9a83772befd6ce766c1d9a1b62a,2023-11-07T02:50:53.480000 CVE-2017-9803,0,0,70bfc4d0b80906b7e541ae79c4b23114b0b8e7dcbb7102a3ed45e85e05505704,2023-11-07T02:50:53.537000 CVE-2017-9804,0,0,582acc236bde4d1385b350146750e311f729169d297cb4025c648a4d587ea7b7,2019-10-03T00:03:26.223000 -CVE-2017-9805,0,0,d39a54b4a3ed157cafc4929e086329940dec9ef45b00814a35ecf400d65c8cd6,2019-08-12T21:15:15 +CVE-2017-9805,0,1,cf35d631a0a5982ea5bf0e626f505d885be500095f9b3f3e9ef9a0d1b85b6644,2024-07-25T13:40:54.857000 CVE-2017-9806,0,0,e3e196b8ef878ba193a4a32cde4f2c64a33f3b73052c7abdaa6bd842a58664cc,2022-02-07T16:28:26.933000 CVE-2017-9807,0,0,92539cdd42a2cbe0edca4392cda264ee66158db99c31ee02bd14f2f368b86419,2017-10-13T01:29:00.927000 CVE-2017-9808,0,0,11ee9a9e4386545a63ca4ddca0d4d7542f29659bdd5807a37a54e1cf3b40214d,2019-05-23T13:11:02.273000 @@ -110495,7 +110495,7 @@ CVE-2018-0798,0,0,fd8ff0498648651caee61a37b7ce21ce567fc19f8c7b32789e12fe2e4c78ed CVE-2018-0799,0,0,93a19ef649c5f859d878f4d15c302f54b49cbc0c417ae15fed5c1ac9da83d6bd,2018-01-29T15:58:50.593000 CVE-2018-0800,0,0,af6bdbeba375169c2516bd5860cdd8dc799333cce29a5dd00ca73507df404ebb,2018-01-17T16:06:34.300000 CVE-2018-0801,0,0,dcf255124e7e333ddb006c356dcd029e89ebac47171c8b628d62aafe9a650b0a,2020-08-24T17:37:01.140000 -CVE-2018-0802,0,0,8968aab2506b830abc5ccf77249245be1417c2cf63611d5c5059663a13423d65,2020-08-24T17:37:01.140000 +CVE-2018-0802,0,1,4a9a6439dc0e21d11fa0045ca2086a8930a1b4398b0352bb62d5c2189b9c0d16,2024-07-25T13:45:59.623000 CVE-2018-0803,0,0,1539c2f5ea35f98ada31aed5f5b1d97b8ead8204e810b7aa4db5489d88582653,2020-08-24T17:37:01.140000 CVE-2018-0804,0,0,6e64f0e7ff40d9d5eb7fbeba80f429a52736290f14f4a4792303da7b52effe45,2020-08-24T17:37:01.140000 CVE-2018-0805,0,0,70dd103e8156a5dd421a788834e6a0f125e2333be2dd6ed40d99c6d89183efdf,2020-08-24T17:37:01.140000 @@ -124913,7 +124913,7 @@ CVE-2018-6785,0,0,f73df0c8f751db98b890c7fb9908bd0b404676d0a04f72285b4014b5f1705a CVE-2018-6786,0,0,fc4e48510f5cf392d96cf3d3372856f250e92326633c58a45b1261817813916c,2018-02-22T14:27:34.793000 CVE-2018-6787,0,0,bb25f0935a7ce3002f44f9be32c33fab9bf2a57c69896399186053a7646ce898,2018-02-22T14:27:38.497000 CVE-2018-6788,0,0,a784d0a3b892574ff190613030e026cc5943158e94e0a0f4d8fb3154d7e22cf0,2018-02-22T14:26:35.557000 -CVE-2018-6789,0,0,747bd1c1dc6e71567d1c08628ed446a6748660aa37bddaca2281b5211c2244f1,2021-06-03T18:15:07.720000 +CVE-2018-6789,0,1,155cea5470c45cd2d4406c493055d06fd701b853db2a229ed5b2ca441ab0eb3d,2024-07-25T13:47:22.850000 CVE-2018-6790,0,0,85bc94e88d04b645811d24428d2c1d667b725b916dffc66788d57298294b2f0e,2019-08-06T17:15:39.307000 CVE-2018-6791,0,0,77cfc85c653a13a3806cd39422f7ebd2db9f21bcec2b644978b66cba890798c1,2019-10-03T00:03:26.223000 CVE-2018-6792,0,0,93a4eaa9e747de2ede1571ffa954cc77674ae8f6d9c119f09985e036cd2964ed,2018-03-01T15:25:57.807000 @@ -240573,7 +240573,7 @@ CVE-2023-6964,0,0,6b353abfee4e0f60ba07ed53b519d8cdcc5c6e3e583c876cd6af699df966c5 CVE-2023-6965,0,0,f49ac78940fe244c72647e51516e80a6e573f5fa400fc7065d825c4c692cabcd,2024-04-10T13:24:00.070000 CVE-2023-6966,0,0,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000 CVE-2023-6967,0,0,7fa49a7c16574cbfe3664c75658ac16ae96710a4d17734528b42e15e81f0ce19,2024-04-10T13:24:00.070000 -CVE-2023-6968,0,0,a4751c3d52b515d1d942809757ebd5c330a2b3fb28572a1d55882f3452313b5b,2024-06-06T14:17:35.017000 +CVE-2023-6968,0,1,660880bf3585104149b43896964e50abfbe0de221bb4b1048e46c5941eca859d,2024-07-25T12:48:56.047000 CVE-2023-6969,0,0,28305747d8b707ea006f2410a4d39a2af33e21a9599b2601ee1414912a46183e,2024-03-13T18:16:18.563000 CVE-2023-6970,0,0,f04ab87a1b089d8446df3edb8ad738caf9514f7c93e8d28cbff976bc6db6184a,2024-01-24T20:48:25.003000 CVE-2023-6971,0,0,dbf2002d25fe2863f3f7217440bd5fd57ee5f38811b51e99bf0e4a7034176303,2023-12-29T06:21:25.760000 @@ -240831,6 +240831,7 @@ CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba15 CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000 CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000 CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000 +CVE-2023-7271,1,1,3e307303c92928740949f0130fc49de091c30f6742adc012d6c4aaa808a584a9,2024-07-25T12:36:39.947000 CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000 CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000 CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000 @@ -240984,7 +240985,7 @@ CVE-2024-0227,0,0,a4e84e1b9f9ff8bb72dc26c9ff00c9b99f09150a51fa56e523e138aad08ff0 CVE-2024-0228,0,0,fd96fc161d3d60477c711a5fbf3929339bbdfc61029c2327b7af9a111ceab709,2024-01-09T17:15:12.223000 CVE-2024-0229,0,0,6602b8ec5feb6956074bc84551508bf34334ccf644b16f57e9c8158e1fe1529f,2024-05-22T17:16:11.003000 CVE-2024-0230,0,0,24d638afd0420bef6a46df36ab91db6a8f8e82d99d85e08e0b6837b09034d463,2024-01-19T18:35:52.493000 -CVE-2024-0231,0,0,3592f179b116fea396ee0af63f0bfa7a66b9e111d9f4f63aa01e97f75c2333be,2024-07-24T23:15:09.340000 +CVE-2024-0231,0,1,0b1f359d05b991116fd20e65902981fd9d93a2d134a95a3df9e53716cd7e8a2b,2024-07-25T12:36:39.947000 CVE-2024-0232,0,0,50f8b538617e3018d181a108bdc49b9892bbe872fc5ca5e706ebe486bdd760be,2024-03-15T11:15:08.560000 CVE-2024-0233,0,0,d56b903220eef660a47b790a5d6791a2bbbbf0dd9be28166c548968d23c1254a,2024-01-19T14:28:14.077000 CVE-2024-0235,0,0,615010b7812a96135df60a4a20a410f40f762c1296d8ced3aa653a835b32a371,2024-01-19T14:28:22.047000 @@ -241617,7 +241618,7 @@ CVE-2024-0906,0,0,ecd2a3754eed82a083b40796214258d51b38bf0df2a24b6927463849671545 CVE-2024-0907,0,0,1364bca6d0570882150b59a3486f38c7119a748222b12a5aad50b11063b7c472,2024-02-29T13:49:29.390000 CVE-2024-0908,0,0,c4bed403e2f7a7c69654d60d6e8a1177e48925d40e212c09088c91c7af3e68ba,2024-05-02T18:00:37.360000 CVE-2024-0909,0,0,c5f806ecbe49cf4ad26e2d68fa67515c4aae5c3e1fdea5f15704815c4a050c84,2024-02-08T20:07:51.410000 -CVE-2024-0910,0,0,cb885e5e2eb37952f8b4fe4df551067b546fc16826c2b014e57145c3c3b9f149,2024-06-06T14:17:35.017000 +CVE-2024-0910,0,1,b96b516432c77dd0f5a3feaac7c2dbb57d041f36982c0161d27cdc867ac5d197,2024-07-25T12:52:10.070000 CVE-2024-0911,0,0,eaa26f2f67e50e20256c589fab58ca11a8ca23f334767d77744b980dbb115d3a,2024-02-14T18:15:48.077000 CVE-2024-0912,0,0,3908c827becd344604b3097cf0917df58a20276cc839d1aa1cc7b2ff97eb3746,2024-07-18T18:56:17.547000 CVE-2024-0913,0,0,a4286c53265bdc9941d1a0e8a2b4cded325439db1965c3ecb938d791912ee424,2024-03-29T12:45:02.937000 @@ -241674,7 +241675,7 @@ CVE-2024-0967,0,0,253affdacf77d7113a7d67308592643957bef7f401183b36849120592d1636 CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368df,2024-04-08T11:15:49.610000 CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000 CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000 -CVE-2024-0972,0,0,6d081f05093e58d9dc10bca8d35d9b39f6ea53215294616b1f838864ca5f6685,2024-06-06T14:17:35.017000 +CVE-2024-0972,0,1,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000 CVE-2024-0973,0,0,e5fb6b4d7ce253b144fdf362ec0f968de6ca466dcd6c3adca143df6bc6e05926,2024-03-18T19:40:00.173000 CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000 CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000 @@ -242714,7 +242715,7 @@ CVE-2024-2013,0,0,aefc6eb68e306e4a20fc38a6af2d431b70230e994324d4a86b2abf95d7edda CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000 -CVE-2024-2017,0,0,733075bc65b00c2e15c6055bbf078e3cafa03a1ef7a0517a28c77d1d4aceb5fa,2024-06-06T14:17:35.017000 +CVE-2024-2017,0,1,933e8ff636fe2ab7cb46d071d13f27b7e4e9cc524571c8399c505c71019f64e8,2024-07-25T13:02:47.370000 CVE-2024-2018,0,0,b0f9ae0369953ccbca640cf5f49daa4b77f77d07b56365b607aeded37791144d,2024-04-10T13:23:38.787000 CVE-2024-2019,0,0,53248e55dd95cbc64e231f2f90de793159d4e7b2f316ab08d3d75b38eceab44b,2024-06-04T16:57:41.053000 CVE-2024-2020,0,0,327bb7f0a8d2adb19b6b9d8647efba4c5092a1dc3ce0e1ddfbe9d6570932d024,2024-03-13T18:15:58.530000 @@ -243763,7 +243764,7 @@ CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc7783 CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000 CVE-2024-21682,0,0,ea94962fb19bc771b1e7e5a4a1b57027a5c5c8b332b79d32007472ab6d5177d5,2024-02-20T19:50:53.960000 CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000 -CVE-2024-21684,0,0,033d0c2fabc1d276dc5b62b7abcda94db7f8ee0250b414706e22682d08c59c20,2024-07-24T18:15:03.793000 +CVE-2024-21684,0,1,38895b1f4cf0d220e88e468f430cc16bd239496d7cb5e201c757adb6991a236b,2024-07-25T12:36:39.947000 CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000 CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000 CVE-2024-21687,0,0,7f853701aecb2ebf7acbec91687c790cb83db5ee246802aacc74de3322b22abf,2024-07-17T13:34:20.520000 @@ -244886,7 +244887,7 @@ CVE-2024-23492,0,0,46751fe2061ad3facdf2aff38df0184415be7875a8a3492c12dafb804ab2f CVE-2024-23493,0,0,41faef1e9094c06fb658ed025cd0528960b3cda2fdce17eb6a2104883c4041b9,2024-02-29T13:49:29.390000 CVE-2024-23494,0,0,1761cecf4d1aa42fc2142275287576a82851a4af1416d215b879da20539b4bb7,2024-03-22T12:45:36.130000 CVE-2024-23496,0,0,c3856130b65624b5767002912c0501b965e2549e4b94367c7a809441839aa00b,2024-02-26T18:15:07.580000 -CVE-2024-2350,0,0,ef4f7558db79fa735188adfbcb60e3e2eeda68135435149c8c977ee2f420458f,2024-06-06T14:17:35.017000 +CVE-2024-2350,0,1,b224bf65ace6a631c4679b3350fe7c7082c8e455c9408f918ff58e10f6a6fd6a,2024-07-25T12:57:24.040000 CVE-2024-23500,0,0,9f0ca72522aa1768710bac3d52af84b3704000817095134026ac1a86c6c1c178,2024-03-28T12:42:56.150000 CVE-2024-23501,0,0,e5aebbfbd9d9417005e3d705da6a35d8860fa8db7dc1ef11a82d27e4462980c8,2024-02-29T13:49:29.390000 CVE-2024-23502,0,0,83d1eff93264c02df77da434637a6f1d78b39d6668a422c92b943a584897b606,2024-02-09T14:46:17.743000 @@ -245600,7 +245601,7 @@ CVE-2024-24721,0,0,f12e91432517af5c3cc6447aad0467c1bd7f0eb543342bb75a7b5b64e02e4 CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000 CVE-2024-24724,0,0,49e36beb0292b27c4af21607f62c8098e243af86c10e87204060b3a2a9eb0caa,2024-04-03T12:38:04.840000 CVE-2024-24725,0,0,fa4c4ce65e4991dcf18e22afc18c407373bea4c35493c8cf2afcfe5d0757cc18,2024-03-25T01:51:01.223000 -CVE-2024-2473,0,0,f62e0e8505793d4599425cd8ceed5dbed4de5d864d9ecc6cd7e97fa88e353812,2024-06-11T13:54:12.057000 +CVE-2024-2473,0,1,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000 CVE-2024-2474,0,0,e295561a11995d9c40e939a773b47208b6445581a981c9a04645753adc140ddf,2024-03-20T13:00:16.367000 @@ -249734,7 +249735,7 @@ CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288 CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6667,2024-04-01T01:12:59.077000 CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000 CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000 -CVE-2024-30471,0,0,238195cb7683eb4a42e80d113f36bafcf9aee3d28b09318cbb422d4ffda21b8a,2024-07-17T13:34:20.520000 +CVE-2024-30471,0,1,79659bf7d789b82a7e19ed443423e3fa13ec0376dddc72d808cfe63edcab7726,2024-07-25T13:39:17.913000 CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000 CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 @@ -250693,7 +250694,7 @@ CVE-2024-31971,0,0,c01103c7a27f61a563b001c647885d07de844f2c03f92bb191e43610aaea5 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31977,0,0,2e845dd8e2dbf0b94e2238c6740554d5934910b7cebbf8cf7289ad0332368bf6,2024-07-24T17:12:32.367000 CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000 -CVE-2024-31979,0,0,f9deec5ae1bbbfb21f2bdc6463cb5006e2e3b0c363609d81cd2769fd53ba3bc0,2024-07-17T13:34:20.520000 +CVE-2024-31979,0,1,e93fa35c4ec6bcda67006b59383a9c622c442c60b97962ab4ca126b51f4ba81e,2024-07-25T13:38:56.897000 CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000 CVE-2024-31981,0,0,f2d3a632894e526ffc79a652f25d3a7da1db8610794379510e264c8e37958abd,2024-04-11T12:47:44.137000 @@ -251690,7 +251691,7 @@ CVE-2024-33515,0,0,0a29698b566d1ce96badc6c9dd3f9a2648c522eb6b37724b52074d909a3a4 CVE-2024-33516,0,0,2a125f75033a85309256af5b7bcbd9cab289bd0eb807ee2035c6ab7d5101ea26,2024-07-03T01:58:22.457000 CVE-2024-33517,0,0,825ccd60c40de640bc82816af8a7f66687631cc679103ccdd5ad49c6ebb772ea,2024-05-01T19:50:25.633000 CVE-2024-33518,0,0,84ccf326440e53cdc178e6fa27177ba3577a132315b02d47fe46572cfd6ace26,2024-07-03T01:58:23.150000 -CVE-2024-33519,0,0,d60c79dbd3d2c033476c6aa697685627904c4f0e1ebdb3fc9445124d7147c90e,2024-07-24T20:15:03.640000 +CVE-2024-33519,0,1,59fd839d628cf730bca214c2d6504e3272b22a5cf272dd2492829adc807f0510,2024-07-25T12:36:39.947000 CVE-2024-3352,0,0,be8f28061e5ae4d9d9b2e6a11ede257adb292cc79dc8c4235b725fe02c0776ab,2024-05-17T02:39:51.777000 CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215895,2024-04-30T13:11:16.690000 CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 @@ -253024,11 +253025,11 @@ CVE-2024-35733,0,0,f768e378b78ddbd5bf5896dbc23e3e8053bbb605f8234ac257e9950048828 CVE-2024-35734,0,0,8bb03f84519a1d3d44c02c94cda8b87a1d42d1f14ac46e034c223fcc323146e1,2024-07-18T16:28:21.817000 CVE-2024-35735,0,0,62b930331700efebd8687438f856d220eed4a951459790e435c2059f637d7605,2024-06-12T16:26:08.450000 CVE-2024-35736,0,0,711aab1a9c48068e8f7b91881a4d282ca9326016a3e7dd35e9aa4632ac5ca1f3,2024-07-18T16:29:28.607000 -CVE-2024-35737,0,0,ea1d4bc45fbc96c9dad103849bbd7143efcf5484e2478a5bbe94ba2f5f8dac3c,2024-06-10T02:52:08.267000 -CVE-2024-35738,0,0,2eab6288af9a85fa788a9ab73a939f337697cb39eb88d19480b2c5d875b6a5f0,2024-06-10T02:52:08.267000 -CVE-2024-35739,0,0,43f4044eca114a3413cc521d72bc767dc68665c3dce3c35fb421e32e5cfb0486,2024-06-10T02:52:08.267000 +CVE-2024-35737,0,1,88cfdb0a41471ef51113ede55c3ff2c7542d18bceb4ee23c63c98a65e1e0e25e,2024-07-25T13:07:47.233000 +CVE-2024-35738,0,1,dd52917df205822aa2c0e1e5a75b617767a0ba59797c70b3a4a4ac80cebef7b3,2024-07-25T13:08:32.617000 +CVE-2024-35739,0,1,2db52c49e8f503106364f541851e1ef7c57f86d968e247fe70b26ff65e6a3187,2024-07-25T13:09:33.943000 CVE-2024-3574,0,0,fdf6368eb343b1cfef30906f52798b661fa8a26cd0269be1d79674f9e7728b69,2024-04-16T13:24:07.103000 -CVE-2024-35740,0,0,46cedfc81434e65c916ed20f3d4fdf9ac75c39b513ce2084a7fb7746bd26cef2,2024-06-10T02:52:08.267000 +CVE-2024-35740,0,1,401554f561e7efafd58ec36e8a5992457a4c0105d9f97aed3cfe1b7ecb1c9553,2024-07-25T13:10:22.557000 CVE-2024-35741,0,0,20acab16de95803defdbc5fba79c812c48d55ec4a7c8007fc65bb01c7ff0c2dc,2024-06-12T17:54:46.150000 CVE-2024-35742,0,0,70d70e160eb76f9d84b3c6a2a2bfa0e4e377d0cd0e859c5bfed2c807dd69a4b1,2024-06-12T19:32:19.827000 CVE-2024-35743,0,0,367d5c8c43acd2a35f618e9e43308a8fecadb7e17d24accc6800bd96761cf1cc,2024-06-12T17:42:56.900000 @@ -253040,8 +253041,8 @@ CVE-2024-35748,0,0,0d0ae6570b9b5dd7d8320e68cedce9cf69c0c9ccda564604cf2b92bad42c2 CVE-2024-35749,0,0,3be9161c0f99f99e480b0f4d9d6c3b5b6bdb08738620c21eb9fc65f646cc2eeb,2024-06-12T18:19:55.050000 CVE-2024-3575,0,0,7b73b64d176ee42e3f815efb129e0a4e8daabc141e22843995ce14322618115c,2024-04-16T13:24:07.103000 CVE-2024-35750,0,0,337904e02d48eff7e7f71ff4e0b4d15f230905a46ebf33e9ed3f06ed45b6365c,2024-06-10T02:52:08.267000 -CVE-2024-35751,0,0,2f4b51636ece37d50579e65fb58d2700611ff65fd14c4b21be633ae796fa0057,2024-06-10T02:52:08.267000 -CVE-2024-35752,0,0,062777696b3e277bdd4663be2181ce3994f39fef6908c28ebd787d505d32576b,2024-06-10T02:52:08.267000 +CVE-2024-35751,0,1,101697b5bf451e180a159cfc87bcd152cec0359b270dfd38749557af16169787,2024-07-25T13:17:42.720000 +CVE-2024-35752,0,1,2959743628a1736f3c2cc142d9df4f39137eeb6a8e6aeb3884b9986bb7f210b1,2024-07-25T13:23:13.527000 CVE-2024-35753,0,0,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000 CVE-2024-35754,0,0,6542d4ccfbee23f434dbe55310367fe2a58769f4413cd83c76145804203a6991,2024-06-12T18:19:06.043000 CVE-2024-35755,0,0,2571e4c1c85d187483b8d6945db6f40920f15adf47a26bbdda7476c12f520093,2024-07-23T20:15:16.157000 @@ -253673,15 +253674,15 @@ CVE-2024-36528,0,0,2720657851e73513f2a766ff74bcbf76f8ccd5ffff5f964570f2d3734bd16 CVE-2024-3653,0,0,2ce001c8a2558fa4f76ef87c21e8ceeb7eaae4cf2cb26c9cd78a019c19336759,2024-07-09T18:19:14.047000 CVE-2024-36531,0,0,309244ba7df6e757b847511595184db51193505c4bbceece7db96d568b889d7a,2024-06-10T18:06:22.600000 CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 -CVE-2024-36533,0,0,7caf29ed6123de0d689f704a3b91401a2d09000b2b4aae618d54c53a03a7b516,2024-07-24T20:15:03.903000 -CVE-2024-36534,0,0,47b2e78d72f7bd02a803a2d5686d98735bc06d44ad43437ccc9d04efec526a9e,2024-07-24T20:15:03.967000 -CVE-2024-36535,0,0,ba934554b33d635eabed1670346e75564abbba425228e7b83356f7c815ef0501,2024-07-24T20:15:04.030000 -CVE-2024-36536,0,0,81055ba9345781f5ac2845b9e16cd1860116e534627f5e505b90c732d23d0422,2024-07-24T19:15:04.293000 -CVE-2024-36537,0,0,ca15d636672c067611f82db6e8fed44b605c0751c3b3623ed5e71b0748bc3dbe,2024-07-24T19:15:04.373000 -CVE-2024-36538,0,0,68a27c850ff04774e300a8695ee6ca1ffa9c9c746aa07894c18d7b077245e44d,2024-07-24T19:15:04.487000 -CVE-2024-36539,0,0,1c06ea00d48a9cd0f3aabb67d1610f7b7cb65726a791ef13a8c51d92f718b2c5,2024-07-24T17:15:10.767000 +CVE-2024-36533,0,1,1205040237632adb8a3c93a382d514a5d5d6316cc610c8578c3968478d6b24ab,2024-07-25T12:36:39.947000 +CVE-2024-36534,0,1,ab12522f627b3cba39f87dce1551ce4d112cf52e6c10ca853202cfbcb092e1fb,2024-07-25T12:36:39.947000 +CVE-2024-36535,0,1,11f672d791f105a811d7af6721c8e114e00e9333dfbd773142111f9fd8133a1e,2024-07-25T12:36:39.947000 +CVE-2024-36536,0,1,7fe2c1a5a12e2fda22adfc2d8dbfc91319bc8e7cd5ac16b7bf38458ca4086ddd,2024-07-25T12:36:39.947000 +CVE-2024-36537,0,1,b6bc7f01b826e7e80a93d01e3d9ae1800e30d7599a8011d950c38a049eebe0f6,2024-07-25T12:36:39.947000 +CVE-2024-36538,0,1,aac4f9929cddecc0784b98831a4a3c3b2e94512ba7cc3c149bdb1ef3488e9f91,2024-07-25T12:36:39.947000 +CVE-2024-36539,0,1,fd8e06c5a4aafc35fe5ea218ed9e25a0b2fb207d6af8477fc6df401a6d78debf,2024-07-25T12:36:39.947000 CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000 -CVE-2024-36540,0,0,4d633887b87eb1c8060a8e6786bca44ee4e71578563e85032fbd12a9e5e29066,2024-07-24T17:15:10.827000 +CVE-2024-36540,0,1,6eeb37da95be9363691e64f704f0832366ea0b62d194e2d6102f1975a215f8e9,2024-07-25T12:36:39.947000 CVE-2024-36541,0,0,6a8a7f7727809c1260cd3b5c8c832484186631ab30a12c54c0721ce5292077c7,2024-07-24T17:12:32.367000 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 CVE-2024-36547,0,0,63fa93ba07106c565a1033909cd3b8147be168386a42b3286a8bfe46cc4ab092,2024-06-06T15:16:11.897000 @@ -253981,7 +253982,7 @@ CVE-2024-3708,0,0,d5d3127cf1ebbe4d1277dc91ebc9f2ee01faea98cb7a29c27942fe94c97d6c CVE-2024-37080,0,0,f0a9bd7effb46ac30e1d20f1d1aa7a7b386c0ee7e62089b4e1cc310e9f341fd9,2024-06-20T12:44:01.637000 CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000 CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000 -CVE-2024-37084,1,1,a9a415180d55f187a8422650468ec1e2da51490c6a9314421d241ae87e9f5117,2024-07-25T10:15:07.260000 +CVE-2024-37084,0,1,bb008f8c46408a7710cf451e2b0ae4252c58def74fe03a21a33d942184d931ba,2024-07-25T12:36:39.947000 CVE-2024-37085,0,0,4b965e98ee84a1f21a1cc50472486b78f46c71d7d7f35fdfea4d6b86e3425175,2024-06-25T18:50:42.040000 CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000 @@ -254094,30 +254095,30 @@ CVE-2024-37234,0,0,fea6d0a90424156a06bdb00d769e0d960a6f376259af6537661bd5a3b2a1e CVE-2024-37239,0,0,5b836970d9434edbdc8941839ba4be6185c3985b9f091c19c42c88993436d46d,2024-07-22T13:00:31.330000 CVE-2024-3724,0,0,a45515256d1a21ae3fa37b44c62076cfa44f7692bce577ec434a496f38d89c35,2024-05-02T18:00:37.360000 CVE-2024-37244,0,0,efa1ad686bdf9a11d96ee3945abc885f625d88132bd1e8e7c6ef92b04a9aaa22,2024-07-22T13:00:31.330000 -CVE-2024-37245,0,0,1b71bcd59f3ee99656fdc28662a51ee8a1a0e8c46d3d91d929fed484b775c78e,2024-07-22T13:00:31.330000 -CVE-2024-37246,0,0,35d6e9bcc0ad48ccb982f0bdc86e31489a40248124076526fe8fa8f47c13ccfb,2024-07-22T13:00:31.330000 +CVE-2024-37245,0,1,8626e25882ebd198de3d6126617dae182d8919ea6f8ef7871e0dcb2fe24a154c,2024-07-25T13:57:37.537000 +CVE-2024-37246,0,1,f9f8bdafd1958cb5c1daa37efa79cd775cf389b1f9af5ac8e8eb74aad2cdac69,2024-07-25T13:57:08.393000 CVE-2024-37247,0,0,8228dfcf5cae02c0a86d645ad30e042bbfe31c09ad0d308292ed19a0aff45168,2024-06-27T12:47:19.847000 CVE-2024-37248,0,0,02a07ebeaf12f56a9f57d183dc0eb9a1b36d4373e8e10165c77133b909c93eaa,2024-06-27T12:47:19.847000 CVE-2024-3725,0,0,b3b29463d0daa3afb9af3d4851601af4b7e3fe7bc65e993937cf3285f5f421a7,2024-05-02T18:00:37.360000 CVE-2024-37252,0,0,666ab75f24718a9ee651c100748889c59e85a940dd5a4bd4a0cf762d4dd4918c,2024-06-26T12:44:29.693000 CVE-2024-37253,0,0,e8b3ddb7f0f7d9b21f3fd58f2a666ff68cda618f6bf43670f9bccbbcd9bf1b79,2024-07-09T18:19:14.047000 CVE-2024-37256,0,0,7da95e9b22e085f1394d81e729de5474f21048af1b93b9ae1956737a9ee5690f,2024-07-09T18:19:14.047000 -CVE-2024-37257,0,0,479b21ea44b18a076a1ed587eaa32cbb2ff4098a40ce61041201d5259912ee2e,2024-07-22T13:00:31.330000 -CVE-2024-37258,0,0,8e15a35fa81970039b0250e7055f0c9c45b1a685fa69e9dc5a0ab3ef13c685fd,2024-07-22T13:00:31.330000 -CVE-2024-37259,0,0,f1e66179758602d0455316590f9badd11247a3cc39f1cedc0ac59902e233ddca,2024-07-22T13:00:31.330000 +CVE-2024-37257,0,1,ba955a777c88a8e4bf980877123b29fac72ab541a5d5656beccb5196c1267e18,2024-07-25T13:55:53.217000 +CVE-2024-37258,0,1,a3e04350d6cb7fadaa45f136e4648b756f0e9bc09851b1fa2971daab74eb824a,2024-07-25T13:54:49.790000 +CVE-2024-37259,0,1,3fa60055319b8df5491abc7c5102926a5a6cad44c7f9e639b27d543bd5bdbe34,2024-07-25T13:54:19.540000 CVE-2024-3726,0,0,6ed1c63f9a76463fbd5e561dc6a9aee2dc85246e9cd4867ff0e748854eb71719,2024-05-30T13:15:41.297000 CVE-2024-37260,0,0,71ae32d07f60a869d4092274a4024739c347edcdf7f6c400a5ce16269ff56260,2024-07-09T18:56:18.260000 -CVE-2024-37261,0,0,1a0dcacb78bea24dedb840d1a4c40a9b853ade81c54d957ed7ebbb29ae37f1b6,2024-07-22T13:00:31.330000 -CVE-2024-37262,0,0,b2e88fe58f616e64d630044e5624f57bfd33349fc8c761fcdaeb1ee87595cf98,2024-07-22T13:00:31.330000 -CVE-2024-37263,0,0,1aa503e8bed9c2ec1bbc735b3023842c97556dc202bc7f98a5635e39517f1374,2024-07-22T13:00:31.330000 -CVE-2024-37264,0,0,40f28484231968f6b7eeb78918195bda91a3bc07b06904b453a6b9237b265f69,2024-07-22T13:00:31.330000 -CVE-2024-37265,0,0,56108af5d79c27bda9a0808d34264885ff716b8823e8f0c8c0410c1baf00a526,2024-07-22T13:00:31.330000 +CVE-2024-37261,0,1,536f621b303d72a8e560706e326255b1b3f9876b04c30bdb5f30937479f45206,2024-07-25T13:53:30.123000 +CVE-2024-37262,0,1,bfd35f6ffa4a502a2174f2475f90d1a20af4256a72bb5700eb1b012a7e0d9339,2024-07-25T13:52:40.207000 +CVE-2024-37263,0,1,c26d26fa0b61ee0557a46b3c00f9d1f085b4a554319cc1567de65ae63f4ead42,2024-07-25T13:52:13.823000 +CVE-2024-37264,0,1,8c4f576afeee9717cff5bada01e9d60e0d4eb0514b5eb42d3f304e6c2501ad87,2024-07-25T13:51:29.393000 +CVE-2024-37265,0,1,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5497,2024-07-25T13:51:00.093000 CVE-2024-37266,0,0,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000 -CVE-2024-37267,0,0,1977bda7cd9a7b659f07f231147128d900172e605902d7437ab044e6479db3c7,2024-07-22T13:00:31.330000 +CVE-2024-37267,0,1,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000 CVE-2024-3727,0,0,6ea1859ff32067d0bf242910db22b4416978471db9586adf5bc39f25cdfa21a6,2024-07-24T21:15:11.570000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 -CVE-2024-37271,0,0,f651b63b133b4d5ccf45d34bbf9b95a58b5e6755451ba309185b115ed1924729,2024-07-22T13:00:31.330000 +CVE-2024-37271,0,1,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,701ddd83e97e8ea6c808ca5d8f57033bb1466851ddfe669965d2b1947df1df2f,2024-06-11T14:12:23.210000 CVE-2024-37275,0,0,ed16fc8bc6c608f35a8b7d5acc4e01aceb7115e810ed76f0ef20187fdb243170,2024-07-24T02:52:01.253000 CVE-2024-37278,0,0,f099ad6e686108b7aa0982a8f779de2fbae21e6d456841af0260dad64229b388,2024-07-24T02:51:37.857000 @@ -254289,7 +254290,7 @@ CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd809966 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 CVE-2024-3753,0,0,7ec7e7ddead92833cf7c33f0b6871feebee71d63726e8d778e9efc350bba07de,2024-07-15T13:00:34.853000 CVE-2024-37532,0,0,aa877fbc00f03a99fc2b9d43fb935fba6551700aac862f95f49a54cca4d5d3d2,2024-06-20T16:07:50.417000 -CVE-2024-37533,0,0,15e39a76c61052aaace04c07adce9e7f91231eabe293d2964440b2a84473d749,2024-07-24T18:15:04.690000 +CVE-2024-37533,0,1,da5287e5ab0d04799a5af2aa0e5f741fa0aa195630a31cdc71edd340fca7f147,2024-07-25T12:36:39.947000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 CVE-2024-37536,0,0,df209a8df9bdd9e6c141521f70aae153351cd936d4fcc329ecd5520bb21d30d3,2024-07-22T13:00:31.330000 CVE-2024-37537,0,0,d6f2faf95678b7215b67e0396b1da334479107789418e26bf8fa81b809970ca6,2024-07-22T13:00:31.330000 @@ -255331,6 +255332,11 @@ CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1 CVE-2024-3966,0,0,73fb2ae6dbee87e9388d8eb74bc7dee75170ed92fa9ef996fc6e09e4c624edd8,2024-06-17T12:42:04.623000 CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000 +CVE-2024-39670,1,1,0d203953f143bb2b144a41db4bb88a8a655f481337d9b160294ae1b9c812f298,2024-07-25T12:36:39.947000 +CVE-2024-39671,1,1,9a7afcbf27d1e713433356dddae37faefc777fd6148f92dcb8fb10f18997b9b1,2024-07-25T12:36:39.947000 +CVE-2024-39672,1,1,ed5c0411f38631b5b1977b3b377edb417fef8ad73d9440e1336a055469287d12,2024-07-25T12:36:39.947000 +CVE-2024-39673,1,1,65597e775ea8c9f8f57ec5429b6a4a83ab9ed57cd2ce0e0885a33d1e069a91a2,2024-07-25T12:36:39.947000 +CVE-2024-39674,1,1,2d9ffc9bb192b7c713aee86e0d332b1af8e657a2ca6979b3ef7cb4749360338c,2024-07-25T12:36:39.947000 CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000 CVE-2024-39676,0,0,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000 CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000 @@ -255497,7 +255503,7 @@ CVE-2024-40119,0,0,aa3f22f2b45cca59856fa60c50a815719d2780bf42b0db28717c574ce736b CVE-2024-40129,0,0,ff07d2c16c2d7f391b26147b4d490409bfa9117fc71e9ac1a4c2f99b87b4353c,2024-07-17T13:34:20.520000 CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000 CVE-2024-40130,0,0,e8c5d76bc1438487e9c98dcf68a804e04354d33532c30674477455ae2e09b468,2024-07-17T13:34:20.520000 -CVE-2024-40137,0,0,87af7c12a16acb2a389840419e63627e065241b5c99d013f2eb3094ba75365de,2024-07-24T19:15:04.637000 +CVE-2024-40137,0,1,f1a99a721b2861d10c789836b6a791ef603795040e4de00f669c55e545146693,2024-07-25T12:36:39.947000 CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000 CVE-2024-4018,0,0,74eaff707843a7b5f103084c6ce08054e0cc1b873b7afe3ef59eb208a28e4429,2024-04-22T13:28:50.310000 @@ -255552,7 +255558,7 @@ CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dd CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 CVE-2024-40492,0,0,18603dc677df2f037c3e12bbfcb2354793a3ae9660f3df13b65361dfae39cba9,2024-07-18T12:28:43.707000 -CVE-2024-40495,0,0,b0de96acd68b371348356a923cdea10e232737434cfb2ab77a5540fd2def635e,2024-07-24T19:15:04.693000 +CVE-2024-40495,0,1,88aeee223c049132d220ddb2b44f716ff0efad59827fab92a9147868c5828f67,2024-07-25T12:36:39.947000 CVE-2024-40502,0,0,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000 CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000 CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000 @@ -255804,7 +255810,7 @@ CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000 CVE-2024-41107,0,0,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d60165da,2024-07-19T14:15:06.080000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 -CVE-2024-41110,0,0,57c4a02d46f68819ab468fcb7c496560361bf6cb0c8ad019c35ea49425fa6b56,2024-07-24T17:15:11.053000 +CVE-2024-41110,0,1,728d345a8d6ef55c8935dff0d03755da57ad89f57b0c9a280e58436630161517,2024-07-25T12:36:39.947000 CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000 CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000 CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000 @@ -255815,10 +255821,10 @@ CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b544765313 CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 CVE-2024-41131,0,0,a469b327dab2c70b64323f08923a0a3cc6492c0286887e2f02007c413d21dc21,2024-07-24T12:55:13.223000 CVE-2024-41132,0,0,059caff7cce7231a7c76b300becd4e4b27d779e1effce439666ebf7a5ba8a7a0,2024-07-24T12:55:13.223000 -CVE-2024-41133,0,0,a8fc51e91104481181c150237b1cafc8d41cf1ec2c145f70ae44c7db457dda40,2024-07-24T20:15:04.237000 -CVE-2024-41134,0,0,e03dca28fdb7b52cbf7019488e44915e43532e727ffcad33d2cc394f47bae0f9,2024-07-24T20:15:04.427000 -CVE-2024-41135,0,0,0ced017b96a8b5cbfaf8c16811753dbbd5f6d2580099cd1e35c139935259f2c7,2024-07-24T20:15:04.600000 -CVE-2024-41136,0,0,e48cc56c9a9b12c12e2f2f06984429c12de97fcb43cc741fea6cda30f529e448,2024-07-24T21:15:11.857000 +CVE-2024-41133,0,1,e5ad4a1eaf4c034d810408578353faa9771695c8ef9b4f89e54a23d6b7f939b5,2024-07-25T12:36:39.947000 +CVE-2024-41134,0,1,1f67c7ac372f8fd80f15e721cdafa3ce00463ae71c43026b338111ab1ec18ba2,2024-07-25T12:36:39.947000 +CVE-2024-41135,0,1,489118406e14a87ebeb4e1cf740e4d8eeb474f31616618459af95bc72e2df2b8,2024-07-25T12:36:39.947000 +CVE-2024-41136,0,1,da10dde379d176b1800a24228cbc78a48656ad00c312f61e14b9a084ea1e1388,2024-07-25T12:36:39.947000 CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 @@ -255856,15 +255862,15 @@ CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a2 CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000 CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000 CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 -CVE-2024-41459,0,0,bd69cb55f288e967a8912b09554cd20829adb710389d645d48d9ce4a10751441,2024-07-24T21:15:12.037000 +CVE-2024-41459,0,1,c59c81b34e4e1a07ad25a6c069197c93b77187a97be49f75e9c0adb2b9877288,2024-07-25T12:36:39.947000 CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000 -CVE-2024-41460,0,0,81c8b8a7faa85141d62d767ef66f4ba29ca0e89e3f4d516f58efdbf1a385e7e4,2024-07-24T21:15:12.097000 -CVE-2024-41461,0,0,1b5f14d3bc04750fe5e880684aa12ded52528aa3e6fd673a1b6ac900559ee256,2024-07-24T21:15:12.150000 -CVE-2024-41462,0,0,60343e428391914d12f6e57d7214675cd37475a86a32ed8cecdbe3d932cec870,2024-07-24T21:15:12.207000 -CVE-2024-41463,0,0,f43d78ec38b8d657694c338e20c63dcfbcc47d5d020b1e2d6720a8c425cd8243,2024-07-24T21:15:12.260000 -CVE-2024-41464,0,0,7849c83b08f5e819ea51bb84894d10f31c554ba9a32f08a8c9f5e780d92aa34e,2024-07-24T21:15:12.313000 -CVE-2024-41465,0,0,67839b6036b5aaaa3749636ed778bb962a561c3e0f2cb63b8e08721c06f00217,2024-07-24T21:15:12.370000 -CVE-2024-41466,0,0,5ef9cc31c6ce382df25d5c0553646d7bf268fa6341cb5db4bf959a844925a405,2024-07-24T21:15:12.423000 +CVE-2024-41460,0,1,f19387196140dfddcd4317999dc774f842391c96495aa8e27e4e3e2e875e0ed9,2024-07-25T12:36:39.947000 +CVE-2024-41461,0,1,a91a3372bd8744860a184e5a2e1724460efb5fc112bd66a8f05d1359f505c00c,2024-07-25T12:36:39.947000 +CVE-2024-41462,0,1,fbfa04f30aa7e112541f9cd64b0821d63dfada5837ed2a42eeb26c83e123adbd,2024-07-25T12:36:39.947000 +CVE-2024-41463,0,1,bd01c30877b33f610aa36a40e0ea829fcf3c906cb5c49b0b716e6bdd4345e86a,2024-07-25T12:36:39.947000 +CVE-2024-41464,0,1,912b66e2d05b713f45914d4cd1fa3604e8464867c0f39c45c7d1525cacb1b691,2024-07-25T12:36:39.947000 +CVE-2024-41465,0,1,e029cd8634fe3086d10430ea064b95ae8512deac6d3845daffbb574768625c7b,2024-07-25T12:36:39.947000 +CVE-2024-41466,0,1,97aa02d971ce915f9cf78bd3459f554b45935900ee34841cc9fdabfe7a6874b8,2024-07-25T12:36:39.947000 CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000 CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000 CVE-2024-41492,0,0,99c2077a213e0f65a294335ccdb0c65c6a250420405be03860c1fbd393c7f4a6,2024-07-22T13:00:53.287000 @@ -255874,8 +255880,8 @@ CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1 CVE-2024-4153,0,0,3fae78b221751422ac040502ea12520d7ce5149857852489782ffbd186ca2e2d,2024-06-07T17:15:51.640000 CVE-2024-4154,0,0,84badb779862aa9714be3b2e958a85563e0b4bd20cc10469a3787dcbbdfc4755,2024-05-22T12:46:53.887000 CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a867,2024-06-11T10:15:13.260000 -CVE-2024-41550,0,0,f4ff256c835b70fb2be11d6362312cd85afe842b2338e68f4047828b84d9180c,2024-07-24T20:15:04.777000 -CVE-2024-41551,0,0,3eabe416112e89ee94d0023a6cb20d21a06800b0e56191004f7a9be7727d1380,2024-07-24T20:15:04.837000 +CVE-2024-41550,0,1,7d7076e0b2e639a4f03a00e5a03b3d92cddc6a833bc93fe47b36d2a4e446215f,2024-07-25T12:36:39.947000 +CVE-2024-41551,0,1,a0a69e4afc5574aaa9c1839f60d7de59a6551dcf46ace05280e2656726515e08,2024-07-25T12:36:39.947000 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 @@ -255896,23 +255902,23 @@ CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000 CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000 CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000 -CVE-2024-41662,0,0,027a23d20ac7f041b008226b693a861075372c52682261d575778ca6ca9fab2c,2024-07-24T17:15:11.310000 +CVE-2024-41662,0,1,919a35dcf0c28f191ac4c6cfd568d8d42c7650d464e027cb7edacb995b2d7d91,2024-07-25T12:36:39.947000 CVE-2024-41663,0,0,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000 CVE-2024-41664,0,0,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000 CVE-2024-41665,0,0,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000 -CVE-2024-41666,0,0,cc3fd73062efb2936120c102f2985762b4a922ac1e8ab8c2cab7a268f65cba88,2024-07-24T18:15:05.090000 -CVE-2024-41667,0,0,1f9db84f3f6fead0dc9db71fdbfa16e28b3702084aeef443585f27944b2afe0e,2024-07-24T18:15:05.310000 +CVE-2024-41666,0,1,0375155254884f774ba6c1bf65be8527b5535973799e11a8779eb527e144ed30,2024-07-25T12:36:39.947000 +CVE-2024-41667,0,1,7a0d38f51bb876529e5a20368a13b36a328307ee0a9c9ad609e8a6d11c45fa5c,2024-07-25T12:36:39.947000 CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000 CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000 -CVE-2024-41672,0,0,85102b17f81785d70b6bc95473e15cb41b94b472a01f04c8239327e5cecce8cb,2024-07-24T18:15:05.527000 +CVE-2024-41672,0,1,c445ad7d826ddcac22902530a2e686289f099e89069390baf727ebdc437f2aef,2024-07-25T12:36:39.947000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 CVE-2024-41703,0,0,1c3b299376ef5ce17a21e7b5646c9d050d5b45bd92d1e35dddd90617bf6ddc38,2024-07-22T13:00:31.330000 CVE-2024-41704,0,0,0be617904c777d7b9dc53e786f05db778e1c4b756b7b2091d648829174b58747,2024-07-22T13:00:31.330000 -CVE-2024-41705,0,0,5ffeb4f3b1ed5768c105eab2d087d4a880ca48ab071f0bf50fc47b993fad7e85,2024-07-25T08:15:02.467000 -CVE-2024-41706,0,0,65753859841076a2c598d5e988db4c971c37a1bf17a162950021d17e8e874c15,2024-07-25T08:15:02.783000 -CVE-2024-41707,0,0,8afa17852c89022131cbf2f2cb75902b0724eef0c75229a5ce3250312652b8be,2024-07-25T08:15:02.980000 +CVE-2024-41705,0,1,7ad36214246d3505f47341eca353a6e89a57c7421606f46a575e2c200ebd5197,2024-07-25T12:36:39.947000 +CVE-2024-41706,0,1,c54f7449081e3b2cf2e3ab43d5a7b590b18453d449b7c4962e22d19102850392,2024-07-25T12:36:39.947000 +CVE-2024-41707,0,1,24329663dd76ae1f72f3cfdd54c53a72b691e0b10ff003de1c551fa68a8194c1,2024-07-25T12:36:39.947000 CVE-2024-41709,0,0,2bdff8d893d96056721920d5bf998022e35373c018be8a15f2bfa536aa265890,2024-07-22T13:00:31.330000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 @@ -256482,7 +256488,7 @@ CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 -CVE-2024-4811,0,0,24ec5a23352dd74e9a5ec369affa049ebaa890dca6e211903458224e4879e96d,2024-07-25T05:15:26.513000 +CVE-2024-4811,0,1,65842f57a162939976e6234a710fd74ca84e9588d5abc78ec5588ee84aed93b5,2024-07-25T12:36:39.947000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 @@ -256690,7 +256696,7 @@ CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 -CVE-2024-5067,0,0,ecc15f3b13d6be79ed7718445a8a9763cb2d1d5ba9eef10c9ce72c52f9809916,2024-07-24T23:15:09.610000 +CVE-2024-5067,0,1,ec8060b17ca06fa7076a296ca5136d65be0c78085423bd2edd770ef034ed8933,2024-07-25T12:36:39.947000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,785631f9585d5c4be650f1d6b68cd50ecc66584beb25a8693cb2019c0e550973,2024-06-26T12:44:29.693000 CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000 @@ -257171,7 +257177,7 @@ CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfc CVE-2024-5649,0,0,852ca7872009baccfafdaae89cb4c14a0a1251efee63fc8b4145a812e05b230f,2024-06-20T12:44:01.637000 CVE-2024-5650,0,0,c39b4a582c551c0a2a7178518ad417e8ac9a87e5b86c36cc6d93d2e99ad988c5,2024-06-17T12:42:04.623000 CVE-2024-5652,0,0,7e423119960d286a82f2194dff7590cb101783621bba898f5af7050faa75102a,2024-07-12T17:14:32.033000 -CVE-2024-5653,0,0,665629d3b594f42f38af36bc864775fec67f180a3f9626c58cc0a3c2c1511176,2024-06-06T14:17:35.017000 +CVE-2024-5653,0,1,b1d5d7ca6c03c0860bfa9c89a981cb1e40654b9c0dd686ee52416437c8a7183f,2024-07-25T12:45:19.830000 CVE-2024-5654,0,0,be6d98376b5bde79348830f6677e04bc437e5abfb9a06a2bd0a591f9c8d1c938,2024-06-10T02:52:08.267000 CVE-2024-5655,0,0,16e9b1f63d749b21100036f5c9070a5ffe6aef567bd66a512cb553f6f989c7f6,2024-06-28T13:16:40.613000 CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000 @@ -257763,7 +257769,7 @@ CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 -CVE-2024-6589,1,1,e45ff7e87c25dfc54dcd2dc238380aa5459a05b7a0544b26208a08a6e162636f,2024-07-25T11:15:10.333000 +CVE-2024-6589,0,1,287c83b8ab794bcff92c2dc6cb5016c9b23681e87f0536775cc3bb7c8901c364,2024-07-25T12:36:39.947000 CVE-2024-6595,0,0,97cf6a37af39b7f5832976478077fe225f57d63ffd9a5f39caf9eca8e3545339,2024-07-19T14:52:54.943000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000 @@ -257933,18 +257939,18 @@ CVE-2024-6967,0,0,5f19e165dee42428e0d969fa8fc5f74084843adc50630c62175a00d155773d CVE-2024-6968,0,0,8e5752619c85b26bba4ce547fa3d54bdd5591cb73642b239c05438d96051005a,2024-07-22T13:00:31.330000 CVE-2024-6969,0,0,b23347441c89b903c83a899acb9bf7f48b605b0728961bbb1ac995d86a8850d6,2024-07-22T13:00:31.330000 CVE-2024-6970,0,0,521037b9963b74c39659cf9df97626ee5f8ca87b48a1750eb71f414432d46515,2024-07-22T13:00:31.330000 -CVE-2024-6972,0,0,0166795684092dc8a7acd1c9b41656ff0f1c534b59789d4c54d365f1592c49e2,2024-07-25T06:15:01.967000 +CVE-2024-6972,0,1,45bfc09a78a937a10b77612392aef83348a218e9546ffde91f758c134440c143,2024-07-25T12:36:39.947000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 -CVE-2024-7047,0,0,2b1573f3cc18c2aa026dba40654687716fbeec1cc6b14e4dee9e3be223e6f721,2024-07-25T01:15:09.830000 -CVE-2024-7057,0,0,52aa98d027c65d76fdbb47c952844bf1cfa52c91e82e71a016c5d3cea037f087,2024-07-25T01:15:10.040000 -CVE-2024-7060,0,0,0cb6356c2703a31f44da01a49f1d4d7205d995c5d01453cce761197116c6edec,2024-07-24T23:15:09.817000 +CVE-2024-7047,0,1,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000 +CVE-2024-7057,0,1,134fb7ecedd83008f512f96c952415d9fe42c8f642d80f45f533232c0a6892c0,2024-07-25T12:36:39.947000 +CVE-2024-7060,0,1,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f49,2024-07-25T12:36:39.947000 CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000 CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000 CVE-2024-7067,0,0,cd81f5e59f5ccc969e002fbd0535f928704dbb9e13b2c7b953cab40d6b4980c7,2024-07-24T17:12:32.367000 CVE-2024-7068,0,0,eb9a728b0e4f24863b90d18d69d6956459c7f7f272d8ea5eb0f258d70cb7d654,2024-07-24T17:12:32.367000 CVE-2024-7069,0,0,c4ab9f752bac2645a76cae34601a6412cc6a70cc3262d39aa941af9fa7d8f5b8,2024-07-24T17:12:32.367000 CVE-2024-7079,0,0,af9d3a4629d0dee8d9c1382cf5b8b38f2af1c4359748e6b63c5acce1d7ffd90b,2024-07-24T17:12:32.367000 -CVE-2024-7080,0,0,899d93e27154d355f1cab6e8a2230fd79e288953e78c42df2881018f9ff766b0,2024-07-24T20:15:05.117000 -CVE-2024-7081,0,0,82842dc9f70c75bdf648c9e7c6fe771c6810906c75d09d47d47dc898ac294dfc,2024-07-24T21:15:12.913000 -CVE-2024-7091,0,0,41704f8673a7fd5ff354f8cdeffd7b456eab7c22a30ede9ca7486f26d6f17cd3,2024-07-24T23:15:10.013000 +CVE-2024-7080,0,1,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e95,2024-07-25T12:36:39.947000 +CVE-2024-7081,0,1,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000 +CVE-2024-7091,0,1,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000