Auto-Update: 2024-08-06T14:00:17.304709+00:00

This commit is contained in:
cad-safe-bot 2024-08-06 14:03:12 +00:00
parent 42b2a43efb
commit ee5263fa28
71 changed files with 3617 additions and 155 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-4608",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-07-03T04:22:15.310",
"lastModified": "2024-05-17T00:59:57.730",
"lastModified": "2024-08-06T12:15:20.573",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-5160",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-08-01T11:13:09.790",
"lastModified": "2024-05-17T01:00:13.937",
"lastModified": "2024-08-06T12:15:31.283",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-6392",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-09-15T14:55:12.587",
"lastModified": "2024-05-17T01:00:48.230",
"lastModified": "2024-08-06T13:15:27.023",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-7042",
"sourceIdentifier": "cret@cert.org",
"published": "2014-10-16T19:55:12.817",
"lastModified": "2024-05-17T01:01:06.023",
"lastModified": "2024-08-06T13:15:35.490",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33960",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.130",
"lastModified": "2024-08-06T12:15:49.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'end' in '/admin/mod_reports/printreport.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33961",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.360",
"lastModified": "2024-08-06T12:15:49.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'code' in '/admin/mod_reservation/controller.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33962",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.570",
"lastModified": "2024-08-06T12:15:49.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'code' in '/admin/mod_reservation/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33963",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.790",
"lastModified": "2024-08-06T12:15:49.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/admin/mod_room/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33964",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.000",
"lastModified": "2024-08-06T12:15:50.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/admin/mod_users/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33965",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.223",
"lastModified": "2024-08-06T12:15:50.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'view' in '/tubigangarden/admin/mod_accomodation/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33966",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.440",
"lastModified": "2024-08-06T12:15:50.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'xtsearch' in '/admin/mod_reports/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33967",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.667",
"lastModified": "2024-08-06T12:15:50.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'view' in 'Attendance' and 'YearLevel' in '/AttendanceMonitoring/report/attendance_print.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33968",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:50.887",
"lastModified": "2024-08-06T12:15:50.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Attendance' and 'YearLevel' in '/AttendanceMonitoring/report/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33969",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.100",
"lastModified": "2024-08-06T12:15:51.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/AttendanceMonitoring/department/index.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33970",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.330",
"lastModified": "2024-08-06T12:15:51.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'studid' in '/candidate/controller.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33971",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.550",
"lastModified": "2024-08-06T12:15:51.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'username' in '/login.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33972",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.773",
"lastModified": "2024-08-06T12:15:51.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'events' in '/report/event_print.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33973",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:51.993",
"lastModified": "2024-08-06T12:15:51.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Attendance' and 'YearLevel' in '/report/attendance_print.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33974",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:52.213",
"lastModified": "2024-08-06T12:15:52.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Users in '/report/printlogs.php' parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33982",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:53.257",
"lastModified": "2024-08-06T13:15:53.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'StudentID' parameter in '/AttendanceMonitoring/student/controller.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33983",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:53.480",
"lastModified": "2024-08-06T13:15:53.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate' and 'YearLevel' parameters in '/AttendanceMonitoring/report/attendance_print.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33984",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:53.693",
"lastModified": "2024-08-06T13:15:53.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate' and 'YearLevel' parameters in '/AttendanceMonitoring/report/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33985",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:53.907",
"lastModified": "2024-08-06T13:15:53.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/course/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33986",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:54.123",
"lastModified": "2024-08-06T13:15:54.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/department/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33987",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:54.327",
"lastModified": "2024-08-06T13:15:54.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate', 'YearLevel', 'eventdate', 'events', 'Users' and 'YearLevel' parameters in '/report/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33988",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:54.547",
"lastModified": "2024-08-06T13:15:54.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate' and 'YearLevel' parameters in '/report/attendance_print.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33989",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:54.757",
"lastModified": "2024-08-06T13:15:54.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the\u00a0'eventdate' and 'events' parameters in 'port/event_print.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33990",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:54.973",
"lastModified": "2024-08-06T13:15:54.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the\u00a0'id' and 'view' parameters in '/user/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33991",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:55.250",
"lastModified": "2024-08-06T13:15:55.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the\u00a0'view' parameter in '/eventwinner/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33992",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:55.487",
"lastModified": "2024-08-06T13:15:55.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the\u00a0'view' parameter in '/student/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33993",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:55.693",
"lastModified": "2024-08-06T13:15:55.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the\u00a0'view' parameter in /candidate/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33994",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T13:15:55.897",
"lastModified": "2024-08-06T13:15:55.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the\u00a0'view' parameter in '/event/index.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37343",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T17:15:50.910",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:48:32.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.06",
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37343/",
"source": "SecurityResponse@netmotionsoftware.com"
"source": "SecurityResponse@netmotionsoftware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37344",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T17:15:51.153",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:49:14.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 1.4
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.06",
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37344/",
"source": "SecurityResponse@netmotionsoftware.com"
"source": "SecurityResponse@netmotionsoftware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37345",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T17:15:51.397",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:49:26.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.06",
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37345/",
"source": "SecurityResponse@netmotionsoftware.com"
"source": "SecurityResponse@netmotionsoftware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37347",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T17:15:51.853",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:50:02.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 1.4
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.06",
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37347/",
"source": "SecurityResponse@netmotionsoftware.com"
"source": "SecurityResponse@netmotionsoftware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38856",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-05T09:15:56.780",
"lastModified": "2024-08-05T12:41:45.957",
"lastModified": "2024-08-06T13:35:01.497",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache OFBiz. Este problema afecta a Apache OFBiz: hasta la versi\u00f3n 18.12.14. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.15, que soluciona el problema. Los puntos finales no autenticados podr\u00edan permitir la ejecuci\u00f3n del c\u00f3digo de representaci\u00f3n de pantallas si se cumplen algunas condiciones previas (por ejemplo, cuando las definiciones de pantalla no comprueban expl\u00edcitamente los permisos del usuario porque dependen de la configuraci\u00f3n de sus endpoints)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40951",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.420",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:29:07.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,109 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: corrige la desreferencia del puntero NULL en ocfs2_abort_trigger() bdev->bd_super se ha eliminado y el commit 8887b94d9322 cambia el uso de bdev->bd_super a b_assoc_map->host->i_sb. Dado que ocfs2 no ha configurado bh->b_assoc_map, activar\u00e1 la desreferencia del puntero NULL al llamar a ocfs2_abort_trigger(). En realidad, esto se se\u00f1al\u00f3 en la historia, consulte el commit 74e364ad1b13. Pero comet\u00ed un error al revisar el commit 8887b94d9322 y luego reintroducir esta regresi\u00f3n. Dado que no podemos reactivar bdev en el encabezado del b\u00fafer, solucione este problema inicializando todos los tipos de activadores de ocfs2 cuando complete el super, y luego obtenga el activador de ocfs2 espec\u00edfico de ocfs2_caching_info cuando acceda al diario. [joseph.qi@linux.alibaba.com:v2] Enlace: https://lkml.kernel.org/r/20240602112045.1112708-1-joseph.qi@linux.alibaba.com"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "7811AF31-E4C8-4CC1-8D27-717621D639B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/67bcecd780609f471260a8c83fb0ae15f27734ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/685d03c3795378fca6a1b3d43581f7f1a3fc095f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eb63357ef229fae061ce7ce2839d558681c42f1a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41684",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-07-26T12:15:02.763",
"lastModified": "2024-08-01T08:15:03.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:25:49.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -73,10 +105,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*",
"matchCriteriaId": "86741534-D753-4728-BA0B-AF4E5F911DF5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85FA5240-DBBB-42C6-807F-59024B25269A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41685",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-07-26T12:15:02.977",
"lastModified": "2024-08-01T08:15:03.547",
"lastModified": "2024-08-06T12:51:23.760",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -59,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -73,10 +105,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*",
"matchCriteriaId": "86741534-D753-4728-BA0B-AF4E5F911DF5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3AC77A6-E942-41FD-998A-12E96BA002CF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41686",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-07-26T12:15:03.113",
"lastModified": "2024-08-01T08:15:03.640",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:20:05.540",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -73,10 +105,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*",
"matchCriteriaId": "86741534-D753-4728-BA0B-AF4E5F911DF5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85FA5240-DBBB-42C6-807F-59024B25269A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43114",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-08-06T13:15:56.130",
"lastModified": "2024-08-06T13:15:56.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.07.1 possible privilege escalation due to incorrect directory permissions"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5179",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T02:15:54.487",
"lastModified": "2024-06-06T14:17:35.017",
"lastModified": "2024-08-06T12:10:17.047",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -39,34 +39,92 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codeless:cowidgets_elementor_addons:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0",
"matchCriteriaId": "4BCA1C3B-FAB1-44E2-B090-BF82C4364981"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-portfolio-grid.php#L707",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-post-navigation.php#L257",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-carousel.php#L727",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-grid.php#L582",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-staff-carousel.php#L603",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-testimonial-carousel.php#L600",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd6acc9-b7df-4cf8-a211-1e39f3abcf79?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6357",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-06T13:15:56.333",
"lastModified": "2024-08-06T13:15:56.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Direct Object Reference vulnerability identified in OpenText ArcSight Intelligence."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000032593",
"source": "security@opentext.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6358",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-06T13:15:56.547",
"lastModified": "2024-08-06T13:15:56.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability identified in OpenText ArcSight Intelligence."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000032595",
"source": "security@opentext.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6359",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-06T13:15:56.757",
"lastModified": "2024-08-06T13:15:56.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation vulnerability identified in OpenText ArcSight Intelligence."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000032594",
"source": "security@opentext.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6729",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-14T02:15:02.117",
"lastModified": "2024-07-21T06:15:02.240",
"lastModified": "2024-08-06T12:15:52.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -122,7 +122,7 @@
],
"references": [
{
"url": "https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6729",
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729",
"source": "cna@vuldb.com"
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7172",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-28T23:15:10.117",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T12:51:40.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/getSaveConfig.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272593",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272593",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378039",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-29T00:15:02.030",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T12:52:46.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/loginauth.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272594",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272594",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378040",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-29T00:15:02.320",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T13:14:59.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDeviceName.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272595",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272595",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378041",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-29T01:15:09.830",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T12:57:14.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDiagnosisCfg.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272596",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272596",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378042",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-29T02:15:12.810",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T12:58:00.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setIpQosRules.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272597",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272597",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378043",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-29T02:15:13.077",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-06T13:15:14.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272598",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272598",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.378044",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7217",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T05:15:09.957",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-06T13:54:06.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,63 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*",
"matchCriteriaId": "F8729CF2-38C8-483B-9BDB-7C4ACA2C8D97"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "006251DF-FF38-4FC5-8BE2-96374D8F6B7B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CA300-PoE/loginauth_password.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272788",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272788",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.378333",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-7518",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:56.970",
"lastModified": "2024-08-06T13:15:56.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875354",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7519",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.040",
"lastModified": "2024-08-06T13:15:57.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902307",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-7520",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.107",
"lastModified": "2024-08-06T13:15:57.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903041",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7521",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.167",
"lastModified": "2024-08-06T13:15:57.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904644",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7522",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.237",
"lastModified": "2024-08-06T13:15:57.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906727",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7523",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.297",
"lastModified": "2024-08-06T13:15:57.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A select option could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 129."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908344",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7524",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.357",
"lastModified": "2024-08-06T13:15:57.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in \"strict-dynamic\" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7525",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.420",
"lastModified": "2024-08-06T13:15:57.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909298",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7526",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.483",
"lastModified": "2024-08-06T13:15:57.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1910306",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7527",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.543",
"lastModified": "2024-08-06T13:15:57.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871303",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-7528",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.600",
"lastModified": "2024-08-06T13:15:57.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895951",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7529",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.657",
"lastModified": "2024-08-06T13:15:57.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903187",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7530",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.723",
"lastModified": "2024-08-06T13:15:57.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect garbage collection interaction could have led to a use-after-free. This vulnerability affects Firefox < 129."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904011",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7531",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.787",
"lastModified": "2024-08-06T13:15:57.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905691",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7551",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-06T13:15:57.850",
"lastModified": "2024-08-06T13:15:57.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been classified as problematic. Affected is an unknown function of the file /admin-cp/theme/editor/default of the component Theme Editor. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273696. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE9-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.273696",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.273696",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.381444",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-06T12:00:17.445195+00:00
2024-08-06T14:00:17.304709+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-06T11:16:07.800000+00:00
2024-08-06T13:54:06.807000+00:00
```
### Last Data Feed Release
@ -33,40 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259071
259118
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `47`
- [CVE-2024-33957](CVE-2024/CVE-2024-339xx/CVE-2024-33957.json) (`2024-08-06T11:16:04.443`)
- [CVE-2024-33958](CVE-2024/CVE-2024-339xx/CVE-2024-33958.json) (`2024-08-06T11:16:04.920`)
- [CVE-2024-33959](CVE-2024/CVE-2024-339xx/CVE-2024-33959.json) (`2024-08-06T11:16:05.133`)
- [CVE-2024-33975](CVE-2024/CVE-2024-339xx/CVE-2024-33975.json) (`2024-08-06T11:16:05.343`)
- [CVE-2024-33976](CVE-2024/CVE-2024-339xx/CVE-2024-33976.json) (`2024-08-06T11:16:05.580`)
- [CVE-2024-33977](CVE-2024/CVE-2024-339xx/CVE-2024-33977.json) (`2024-08-06T11:16:05.793`)
- [CVE-2024-33978](CVE-2024/CVE-2024-339xx/CVE-2024-33978.json) (`2024-08-06T11:16:06.017`)
- [CVE-2024-33979](CVE-2024/CVE-2024-339xx/CVE-2024-33979.json) (`2024-08-06T11:16:06.223`)
- [CVE-2024-33980](CVE-2024/CVE-2024-339xx/CVE-2024-33980.json) (`2024-08-06T11:16:06.477`)
- [CVE-2024-33981](CVE-2024/CVE-2024-339xx/CVE-2024-33981.json) (`2024-08-06T11:16:06.733`)
- [CVE-2024-7246](CVE-2024/CVE-2024-72xx/CVE-2024-7246.json) (`2024-08-06T11:16:07.587`)
- [CVE-2024-7317](CVE-2024/CVE-2024-73xx/CVE-2024-7317.json) (`2024-08-06T11:16:07.800`)
- [CVE-2024-33989](CVE-2024/CVE-2024-339xx/CVE-2024-33989.json) (`2024-08-06T13:15:54.757`)
- [CVE-2024-33990](CVE-2024/CVE-2024-339xx/CVE-2024-33990.json) (`2024-08-06T13:15:54.973`)
- [CVE-2024-33991](CVE-2024/CVE-2024-339xx/CVE-2024-33991.json) (`2024-08-06T13:15:55.250`)
- [CVE-2024-33992](CVE-2024/CVE-2024-339xx/CVE-2024-33992.json) (`2024-08-06T13:15:55.487`)
- [CVE-2024-33993](CVE-2024/CVE-2024-339xx/CVE-2024-33993.json) (`2024-08-06T13:15:55.693`)
- [CVE-2024-33994](CVE-2024/CVE-2024-339xx/CVE-2024-33994.json) (`2024-08-06T13:15:55.897`)
- [CVE-2024-43114](CVE-2024/CVE-2024-431xx/CVE-2024-43114.json) (`2024-08-06T13:15:56.130`)
- [CVE-2024-6357](CVE-2024/CVE-2024-63xx/CVE-2024-6357.json) (`2024-08-06T13:15:56.333`)
- [CVE-2024-6358](CVE-2024/CVE-2024-63xx/CVE-2024-6358.json) (`2024-08-06T13:15:56.547`)
- [CVE-2024-6359](CVE-2024/CVE-2024-63xx/CVE-2024-6359.json) (`2024-08-06T13:15:56.757`)
- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-08-06T13:15:56.970`)
- [CVE-2024-7519](CVE-2024/CVE-2024-75xx/CVE-2024-7519.json) (`2024-08-06T13:15:57.040`)
- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T13:15:57.107`)
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T13:15:57.167`)
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-06T13:15:57.237`)
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T13:15:57.297`)
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T13:15:57.357`)
- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T13:15:57.420`)
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-08-06T13:15:57.483`)
- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T13:15:57.543`)
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-06T13:15:57.600`)
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T13:15:57.657`)
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-06T13:15:57.723`)
- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T13:15:57.787`)
- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T13:15:57.850`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `22`
- [CVE-2014-1607](CVE-2014/CVE-2014-16xx/CVE-2014-1607.json) (`2024-08-06T10:15:27.997`)
- [CVE-2014-2734](CVE-2014/CVE-2014-27xx/CVE-2014-2734.json) (`2024-08-06T11:15:33.523`)
- [CVE-2014-2913](CVE-2014/CVE-2014-29xx/CVE-2014-2913.json) (`2024-08-06T11:15:36.897`)
- [CVE-2014-2941](CVE-2014/CVE-2014-29xx/CVE-2014-2941.json) (`2024-08-06T11:15:37.307`)
- [CVE-2014-3180](CVE-2014/CVE-2014-31xx/CVE-2014-3180.json) (`2024-08-06T11:15:40.610`)
- [CVE-2024-6731](CVE-2024/CVE-2024-67xx/CVE-2024-6731.json) (`2024-08-06T11:16:07.010`)
- [CVE-2024-6732](CVE-2024/CVE-2024-67xx/CVE-2024-6732.json) (`2024-08-06T11:16:07.173`)
- [CVE-2024-6802](CVE-2024/CVE-2024-68xx/CVE-2024-6802.json) (`2024-08-06T11:16:07.290`)
- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2024-08-06T11:16:07.450`)
- [CVE-2014-4608](CVE-2014/CVE-2014-46xx/CVE-2014-4608.json) (`2024-08-06T12:15:20.573`)
- [CVE-2014-5160](CVE-2014/CVE-2014-51xx/CVE-2014-5160.json) (`2024-08-06T12:15:31.283`)
- [CVE-2014-6392](CVE-2014/CVE-2014-63xx/CVE-2014-6392.json) (`2024-08-06T13:15:27.023`)
- [CVE-2014-7042](CVE-2014/CVE-2014-70xx/CVE-2014-7042.json) (`2024-08-06T13:15:35.490`)
- [CVE-2024-37343](CVE-2024/CVE-2024-373xx/CVE-2024-37343.json) (`2024-08-06T13:48:32.297`)
- [CVE-2024-37344](CVE-2024/CVE-2024-373xx/CVE-2024-37344.json) (`2024-08-06T13:49:14.817`)
- [CVE-2024-37345](CVE-2024/CVE-2024-373xx/CVE-2024-37345.json) (`2024-08-06T13:49:26.063`)
- [CVE-2024-37347](CVE-2024/CVE-2024-373xx/CVE-2024-37347.json) (`2024-08-06T13:50:02.077`)
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-06T13:35:01.497`)
- [CVE-2024-40951](CVE-2024/CVE-2024-409xx/CVE-2024-40951.json) (`2024-08-06T13:29:07.827`)
- [CVE-2024-41684](CVE-2024/CVE-2024-416xx/CVE-2024-41684.json) (`2024-08-06T13:25:49.640`)
- [CVE-2024-41685](CVE-2024/CVE-2024-416xx/CVE-2024-41685.json) (`2024-08-06T12:51:23.760`)
- [CVE-2024-41686](CVE-2024/CVE-2024-416xx/CVE-2024-41686.json) (`2024-08-06T13:20:05.540`)
- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-08-06T12:10:17.047`)
- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-06T12:15:52.700`)
- [CVE-2024-7172](CVE-2024/CVE-2024-71xx/CVE-2024-7172.json) (`2024-08-06T12:51:40.243`)
- [CVE-2024-7173](CVE-2024/CVE-2024-71xx/CVE-2024-7173.json) (`2024-08-06T12:52:46.230`)
- [CVE-2024-7174](CVE-2024/CVE-2024-71xx/CVE-2024-7174.json) (`2024-08-06T13:14:59.030`)
- [CVE-2024-7175](CVE-2024/CVE-2024-71xx/CVE-2024-7175.json) (`2024-08-06T12:57:14.623`)
- [CVE-2024-7176](CVE-2024/CVE-2024-71xx/CVE-2024-7176.json) (`2024-08-06T12:58:00.850`)
- [CVE-2024-7177](CVE-2024/CVE-2024-71xx/CVE-2024-7177.json) (`2024-08-06T13:15:14.603`)
- [CVE-2024-7217](CVE-2024/CVE-2024-72xx/CVE-2024-7217.json) (`2024-08-06T13:54:06.807`)
## Download and Usage

View File

@ -66045,7 +66045,7 @@ CVE-2014-1598,0,0,86f5d71d3081884e796c0c2dc8619fec5ce0633bafb3999e36e8c561b67b57
CVE-2014-1599,0,0,ee250602a48f8c199fed6bf215ed30e597e04627625e4eade94817ce50e5c79e,2018-10-09T19:42:56.547000
CVE-2014-1603,0,0,bad6b09a0bf70de2953bafc9e1dfa585099bd47762fffacb2135420098555eed,2018-10-30T16:27:48.670000
CVE-2014-1604,0,0,413679a54590bf619dc7a302a8f0639390f694b6e0cc0925d9e816c0c95d1e40,2017-08-29T01:34:25.983000
CVE-2014-1607,0,1,1943ccea924d49044ec7d630a68950e406543167b20b4817e278e4f9ab4a692a,2024-08-06T10:15:27.997000
CVE-2014-1607,0,0,1943ccea924d49044ec7d630a68950e406543167b20b4817e278e4f9ab4a692a,2024-08-06T10:15:27.997000
CVE-2014-1608,0,0,a39bd494e2538c8e337589c19f539caef9bb3453c107fc68cd4b2dac31932c1f,2021-01-12T18:05:59.507000
CVE-2014-1609,0,0,46bc7381404eec4ae636c9e37ea54f0029835a8a0158e9be29b550ddcd2a1be1,2021-01-12T18:05:59.507000
CVE-2014-1610,0,0,2f062c19e654df0a5059b9bce8c585d26687afce6a33737f5538b64ab383dca7,2016-05-25T15:01:37.037000
@ -67011,7 +67011,7 @@ CVE-2014-2730,0,0,f7b5f4b6d8661bcbf165dedc4f88368e7c21c5fab7d319a500eb618ba67731
CVE-2014-2731,0,0,664411607193785639b3672cde44f1e2c89ecb5c0a62c959dc080e2d3b4f4add,2014-04-21T19:28:08.697000
CVE-2014-2732,0,0,1cdde2cb8b5b4c49ef680dcd5c3355d970d42f7ddccd23a1e120ab0fb7493ebe,2015-10-08T14:51:06.893000
CVE-2014-2733,0,0,f865336356e93b437922f18f813bdf5b4b3fbae550fbcdc950c4836f12361194,2014-04-21T19:31:57.517000
CVE-2014-2734,0,1,cc72503d7a0531856e66034b962dc2cf40f4e310ec598e8565cc84586caeef7f,2024-08-06T11:15:33.523000
CVE-2014-2734,0,0,cc72503d7a0531856e66034b962dc2cf40f4e310ec598e8565cc84586caeef7f,2024-08-06T11:15:33.523000
CVE-2014-2735,0,0,5a80c924a17cffbc2c0445834faee419abdcf092163bfffdae9e4f7abf082788,2018-10-09T19:43:35.940000
CVE-2014-2736,0,0,87762f16104b4fb450479d1bfac1b57c87109220a9a80e9a95c7dc2a856e9863,2019-10-22T17:23:37.007000
CVE-2014-2737,0,0,6dbc290b1ede7e3f777bc4eeb9e6087ff158771a9152b18b795a94de14a61518,2018-10-09T19:43:36.190000
@ -67171,7 +67171,7 @@ CVE-2014-2906,0,0,28c352b17f90f6da40502b8393258d209f5a592514e6807683e1a78bdacbd5
CVE-2014-2907,0,0,141364a54a0713ecda79e4fbdb28eab9fd6a841b1743e79f04a8d015ab6ed21a,2023-11-07T02:19:39.597000
CVE-2014-2908,0,0,87ea7facec4faa6e6426ec73d62e0cfb615d737069a38d0d3c14f65ec92e900c,2018-05-25T01:29:00.303000
CVE-2014-2909,0,0,ef79baf456d509b55c66e129796daf3f8745b169fda41a9757cd13f4c2dc1246,2020-02-10T15:15:17.637000
CVE-2014-2913,0,1,5388343bba58e340534bd0c3618fe1a264656ef721cd174170ddc4987252f2cc,2024-08-06T11:15:36.897000
CVE-2014-2913,0,0,5388343bba58e340534bd0c3618fe1a264656ef721cd174170ddc4987252f2cc,2024-08-06T11:15:36.897000
CVE-2014-2914,0,0,c0220900fdeda573b374eb0cf80ed7d59cc3dfd5cb565b12abb994203f116f38,2020-02-04T17:09:46.907000
CVE-2014-2915,0,0,0fcde6d319d58cc8235a134cb1401bd7a437bbba78376d366d8bff803aad096c,2018-10-30T16:26:53.700000
CVE-2014-2916,0,0,158378f5bc1d2ebbb62d33b2659baa4e2570f5f4107675a4a8fd8f9519d0643e,2015-08-01T01:35:47.170000
@ -67189,7 +67189,7 @@ CVE-2014-2937,0,0,abeba8d66cd33626a90f869ef5a79d32093243b18b25be5b63e16f7fad77d8
CVE-2014-2938,0,0,f8a193333a1f0ece9a3a7a00db71204c165c888e56c1417483b81c425117f5f9,2014-07-16T18:54:15.227000
CVE-2014-2939,0,0,47cdd1cee965c12f1bc6bc089d843135db5be432a19cbdf5e9825907e512140d,2014-06-03T15:30:22.707000
CVE-2014-2940,0,0,a7b6ec3ece66dc7aa6ee59e0b4ccabd5bdf5a5abdc92ffb8c8881a9711385867,2014-08-15T17:21:16.587000
CVE-2014-2941,0,1,f41f6230d893b174f37a09737949d528fa91619df63db7ea66fd991445c59856,2024-08-06T11:15:37.307000
CVE-2014-2941,0,0,f41f6230d893b174f37a09737949d528fa91619df63db7ea66fd991445c59856,2024-08-06T11:15:37.307000
CVE-2014-2942,0,0,5422822f6ac30daa02f5050cfc43c32aebe5de2684366351fa2c23cfa67e8320,2014-09-22T14:43:08.123000
CVE-2014-2943,0,0,598c14c2e2ea02d6f429cc399a67ad1f7d85c0e54a2060d679ba3b26a6918944,2023-11-07T02:19:40.113000
CVE-2014-2944,0,0,2eb007f4b4b5e60502264aea8e13ef42bfead1009fc1b6926d91f3ea08e6ff46,2023-11-07T02:19:40.363000
@ -67383,7 +67383,7 @@ CVE-2014-3176,0,0,d7ed514a4ea6f3a3783d104d7f8e6d582442ba233fe11770accb433fadd1d2
CVE-2014-3177,0,0,6769268fc66684fe9a3caafc0c9f7bbe5daf1525906019802a54397d5202ffe6,2023-11-07T02:19:54.083000
CVE-2014-3178,0,0,777dc65d3dd17ba12ee6989b8b8fa3a8f7f3d191d1c4f4f46b955181bab4bbac,2023-11-07T02:19:54.553000
CVE-2014-3179,0,0,6d24265cc52e07e5d258d59b94aedcab5b793d8ddf876f9b059ea1b97bce0829,2023-11-07T02:19:55.030000
CVE-2014-3180,0,1,0e88ae50a422f247ceaf1dfa212e259bdb39757c73857435346a0cfe14043ad6,2024-08-06T11:15:40.610000
CVE-2014-3180,0,0,0e88ae50a422f247ceaf1dfa212e259bdb39757c73857435346a0cfe14043ad6,2024-08-06T11:15:40.610000
CVE-2014-3181,0,0,f118ecb28d47e16a54d8b75dc850e113cbf7eaa6f17cb5c3025597e856fccf77,2024-02-09T19:25:26.897000
CVE-2014-3182,0,0,76d03818778187bd4e1f8268b0fcf42819952a9d88876a3f4708f81a152f0479,2023-12-29T15:41:33.040000
CVE-2014-3183,0,0,8cf5246fe987b83149dc4acc3804822498060a74cde252b5226b0772f3b7831b,2023-12-29T15:42:53.263000
@ -68695,7 +68695,7 @@ CVE-2014-4604,0,0,9518cff87a2419d611e6369af0b5c4a14f017a8d094ba5b2e600de3e5231e4
CVE-2014-4605,0,0,3f8874c6518c37d68f8b25cb763dcf2b4510b487a19d99c3c6af4f1a0c21db16,2014-07-09T18:48:18.740000
CVE-2014-4606,0,0,d63114f062b715dc6ca859784e1b1a7c721b7d45d271547d389d7b867f9acb5d,2014-07-09T18:45:46.887000
CVE-2014-4607,0,0,76c308a41abef0a008fc88a19bef429b478190e1a2cb12963321920266d2788b,2020-02-14T15:26:45.467000
CVE-2014-4608,0,0,5b03cf0e42a1c98e6afb2f1e41839d3ef0f4d84a6f574ea7a63b438b621d24af,2024-05-17T00:59:57.730000
CVE-2014-4608,0,1,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000
CVE-2014-4609,0,0,02f363f1f4d393ebc3c8ae96b30f28d565a2167efe6f6ed5eba18e083e921498,2020-01-21T16:49:14.900000
CVE-2014-4610,0,0,69e982ba357cffccbdeb69b942e2cf7fc23318c8f6e1a1c9ce98382bdefeb111,2020-01-21T16:15:47.263000
CVE-2014-4611,0,0,5b0a0b2d930406e341b0eadab49a8c3103b3e070a88dd1cdbb44744d7348b67a,2023-11-07T02:20:35.810000
@ -69125,7 +69125,7 @@ CVE-2014-5149,0,0,bf89fff2b7d7fb1898245bb39172b1690d6a6dcf714f55e192c833521f8f3f
CVE-2014-5157,0,0,20b30f94262d35528c8c4054941678b4012e0d73ca1bb989ac5bc05faea16745,2023-11-07T02:20:43.213000
CVE-2014-5158,0,0,69b174d059b5613fbc8787663238e346de163fb5a34219ad608f575a9d07052b,2014-08-21T16:49:13.957000
CVE-2014-5159,0,0,cbb914a4ffff4faac8f656bc14172cec1f496e6b93a106c0c0a79bbaac7e0927,2014-08-21T16:52:27.390000
CVE-2014-5160,0,0,387256cb5e1255e819e2ab1f42d9416457c360c1600513c15503fb51d4b09f04,2024-05-17T01:00:13.937000
CVE-2014-5160,0,1,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000
CVE-2014-5161,0,0,a5733c5886a7fd117f35743a4d62fb2ad6f5bf3a7398054dce26553f65b41efc,2023-11-07T02:20:43.307000
CVE-2014-5162,0,0,55a074f06578f9c03bbfb061862adc51ce82414234c86ddb99e28cc655d69793,2023-11-07T02:20:43.360000
CVE-2014-5163,0,0,0d197e409f0d56efe3be7ebc23f3a7a6c6ce2765c03651d4015b2d3f057df755,2023-11-07T02:20:43.433000
@ -70207,7 +70207,7 @@ CVE-2014-6386,0,0,ef82c1e20abd6fddce3e54b667e7069b568034a8a8ee66cf3efaa7bdfccd29
CVE-2014-6387,0,0,972e3cbc4b72a77f92f3f7627c7f26ba687ffa97ddb3c5305d3a355fcf6350d9,2021-01-12T18:05:59.507000
CVE-2014-6388,0,0,12f3ce7c137bfe0765d68119caeb7cfc8dada96a9a6b2446d364aa74c4dd90ac,2023-11-07T02:21:00.773000
CVE-2014-6389,0,0,cad73347ec1c88f3955ef944343f00ae78ebbc3947c86a62e6caddd8575ff04c,2017-09-08T01:29:14.323000
CVE-2014-6392,0,0,8141c550c78a154df08e477382ea1a99a2a1a19f4c18d487e6c657b6c2da1f17,2024-05-17T01:00:48.230000
CVE-2014-6392,0,1,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000
CVE-2014-6393,0,0,43d76059da78ad5015fd5bfe8333a1086660d3510e767febac7e3c8cd7f4e226,2021-07-30T16:36:04.447000
CVE-2014-6394,0,0,f9d29995346dd1a27f941fddd5be7eae240f45195f583c62fd35d1e336f0f9bb,2017-09-08T01:29:14.403000
CVE-2014-6395,0,0,92184a2aefd3b7037f480e16eee81c1021d8086a8a1934d26adf4b6e3c966cad,2020-02-26T13:35:52.343000
@ -70831,7 +70831,7 @@ CVE-2014-7038,0,0,43f538f66efc5a0c9ad9f347bb92dc3cbfb62bf8ff2fecbcbb9adb1fe0e25b
CVE-2014-7039,0,0,703bbb7bc8333bb3b0e81946f5cdb59e2ae7d57563c96580667bb6016b90dc2e,2014-11-14T14:06:58.313000
CVE-2014-7040,0,0,df752d3efa2c8bb27ed54b80f43838fcc810331450911bf5b97c5b0e975f11f3,2014-11-14T14:06:59.797000
CVE-2014-7041,0,0,679e23897b29337d95abcfa90d66f31ec7b4ab58714df1e3ec10ab4c456c8295,2014-11-14T14:07:01.280000
CVE-2014-7042,0,0,04cc6926850b8bab3a35aced64fa1e1e0a22845572c3cb00965a2900cff28ccb,2024-05-17T01:01:06.023000
CVE-2014-7042,0,1,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000
CVE-2014-7043,0,0,03b4d65083446f9c65cc7361c07ac8e1850c3c51a82b557ccf21e09a43ad55f7,2014-11-14T14:07:04.283000
CVE-2014-7044,0,0,1d41bf09ddf845283a05e370faa8421a4366b01485587d02fbb366d598d4646a,2014-11-14T17:10:15.843000
CVE-2014-7045,0,0,20a5cd0a4191deb5ad84964202c6c6b980f988bed5b64a3a08d5d4e3831719a0,2014-11-14T14:07:07.250000
@ -252164,16 +252164,44 @@ CVE-2024-33953,0,0,63e46ea726d37d8745ea34fab8c10792202a96224f50f42661862439d0baa
CVE-2024-33954,0,0,56971cf7819e69848d3a992a0087660ba05ca96712d3a36deca39fdf2a1bac6b,2024-05-14T16:12:23.490000
CVE-2024-33955,0,0,74cb745cdb62a336c3f876a0fd00b4b23bbd1044d9dae83da460a24660cf3426,2024-05-14T16:12:23.490000
CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc712f,2024-05-14T16:12:23.490000
CVE-2024-33957,1,1,88de846bc8d97892cfd8f5e3fb77365a046bd14d735fe9ff0fdf5bdcf43f6627,2024-08-06T11:16:04.443000
CVE-2024-33958,1,1,53178196a6e998522e42efb1164438403365268d7b5d0361801382f2258b9980,2024-08-06T11:16:04.920000
CVE-2024-33959,1,1,d458bbf5f43f23837870d410a9e46f289d63332eee24acb672fc9cd8a2d0c483,2024-08-06T11:16:05.133000
CVE-2024-33975,1,1,a46b370542e31d699ba01a1fac4d9ed4c848d3b0a25985f5a0ce53b5bcb63a6a,2024-08-06T11:16:05.343000
CVE-2024-33976,1,1,02e20b804a284cea017672c564c762d3fb7d7c9c8cfcb4a61b9fa58410196b8b,2024-08-06T11:16:05.580000
CVE-2024-33977,1,1,2eb5edafc06dded0ff925fe2cae461b6fb7bd8b6a70ba49c1b48907f8554dce2,2024-08-06T11:16:05.793000
CVE-2024-33978,1,1,d464745d4bd7f31f1fc51af542d385e5cae6b8ccd3d85ce164396a41cfda2e8d,2024-08-06T11:16:06.017000
CVE-2024-33979,1,1,b983164577546938ffe33145f2e0f3b698c4bc7ada5e2728f77b5638aeef3640,2024-08-06T11:16:06.223000
CVE-2024-33980,1,1,dee037246a927f3ca3153211de0c62347441b8e779709e076f12ac9e0599f054,2024-08-06T11:16:06.477000
CVE-2024-33981,1,1,e0e57ce80d6753fe0d3c97c236c4bbf725d864b47682f7bd24299ca9dc3d8626,2024-08-06T11:16:06.733000
CVE-2024-33957,0,0,88de846bc8d97892cfd8f5e3fb77365a046bd14d735fe9ff0fdf5bdcf43f6627,2024-08-06T11:16:04.443000
CVE-2024-33958,0,0,53178196a6e998522e42efb1164438403365268d7b5d0361801382f2258b9980,2024-08-06T11:16:04.920000
CVE-2024-33959,0,0,d458bbf5f43f23837870d410a9e46f289d63332eee24acb672fc9cd8a2d0c483,2024-08-06T11:16:05.133000
CVE-2024-33960,1,1,c53c593ec668667e287363e16e108fa27ae08f29f861b438346e205e55b6bf01,2024-08-06T12:15:49.130000
CVE-2024-33961,1,1,03a2cfe3185829675da53ac4ddc9ee5f23ae56d659f31c4d457aaacfe6d3563e,2024-08-06T12:15:49.360000
CVE-2024-33962,1,1,0f5af782ce7b0b6f1af8a57e7f1705aedaabb08b378b29d3510d617216679428,2024-08-06T12:15:49.570000
CVE-2024-33963,1,1,850e588f9be54795f0489ea09b2fa9cbb18170832d11bb6b87faea54977e7809,2024-08-06T12:15:49.790000
CVE-2024-33964,1,1,25b775cb98d6d75d3b8868c9df78a96e26f554bc0894605cc9030849d51599db,2024-08-06T12:15:50
CVE-2024-33965,1,1,3ddb893fff6f2a0965a82defedff9401de724e71057282952143e3c624d8f57b,2024-08-06T12:15:50.223000
CVE-2024-33966,1,1,f4f7eaf3e81606089ac7d13ccade1fb14397a0c2fe11216859413b3f098f44fa,2024-08-06T12:15:50.440000
CVE-2024-33967,1,1,8ba1a67d6bcb7b88479bbe80f86e3644d2b9d7cb7e0b7d56bd484a3cfab55065,2024-08-06T12:15:50.667000
CVE-2024-33968,1,1,2660cf9965440079050fb15a921d961214a26f55702d2cdc0e8dbeab05f6fa75,2024-08-06T12:15:50.887000
CVE-2024-33969,1,1,70a359893f34beed5cc40710f94e1f36c74431d5f301ccb3324eea061304cd03,2024-08-06T12:15:51.100000
CVE-2024-33970,1,1,08fc32382cf60fe53811f9961b90beb8742a746cd203e002d1fde4f7ed9f5c44,2024-08-06T12:15:51.330000
CVE-2024-33971,1,1,45a43d4e935fb8f26ea153d3830bfbb482c3a2462495da277e1cdd1b01815ce8,2024-08-06T12:15:51.550000
CVE-2024-33972,1,1,3750dc3a6f98d5c2d5be5e290b107afe21a4b146ac56b50fcb02d01ad53bf840,2024-08-06T12:15:51.773000
CVE-2024-33973,1,1,31f4407e21b5d5d826f609599778c0a36b741f9666904a530b26958cc8a9aebd,2024-08-06T12:15:51.993000
CVE-2024-33974,1,1,d25ce0a05e0a6752a4262f16ca72168b217bf65c87bd2e0f11fe6a2f6846f71e,2024-08-06T12:15:52.213000
CVE-2024-33975,0,0,a46b370542e31d699ba01a1fac4d9ed4c848d3b0a25985f5a0ce53b5bcb63a6a,2024-08-06T11:16:05.343000
CVE-2024-33976,0,0,02e20b804a284cea017672c564c762d3fb7d7c9c8cfcb4a61b9fa58410196b8b,2024-08-06T11:16:05.580000
CVE-2024-33977,0,0,2eb5edafc06dded0ff925fe2cae461b6fb7bd8b6a70ba49c1b48907f8554dce2,2024-08-06T11:16:05.793000
CVE-2024-33978,0,0,d464745d4bd7f31f1fc51af542d385e5cae6b8ccd3d85ce164396a41cfda2e8d,2024-08-06T11:16:06.017000
CVE-2024-33979,0,0,b983164577546938ffe33145f2e0f3b698c4bc7ada5e2728f77b5638aeef3640,2024-08-06T11:16:06.223000
CVE-2024-33980,0,0,dee037246a927f3ca3153211de0c62347441b8e779709e076f12ac9e0599f054,2024-08-06T11:16:06.477000
CVE-2024-33981,0,0,e0e57ce80d6753fe0d3c97c236c4bbf725d864b47682f7bd24299ca9dc3d8626,2024-08-06T11:16:06.733000
CVE-2024-33982,1,1,45b26bbc74b7d72080ae88d41fb6f7f413f4d8536ac87fdf45e0b60f93629fb9,2024-08-06T13:15:53.257000
CVE-2024-33983,1,1,cab4d447ce471d1290e90dd5a1e82cc9d5252b784d55444265c55d7965dd63cd,2024-08-06T13:15:53.480000
CVE-2024-33984,1,1,87dd0943d36eb3c143032637ffc496824366110651ae8cab4376bb323bf8ed31,2024-08-06T13:15:53.693000
CVE-2024-33985,1,1,ef0f29bb6885e74d2e17051eff53879974402a057315b148ebe6c6235cb589c9,2024-08-06T13:15:53.907000
CVE-2024-33986,1,1,53b9aa07d3b5aa856bbae868678e0f79fb4d50a9480eb558800c78c90fd7c811,2024-08-06T13:15:54.123000
CVE-2024-33987,1,1,920aa0d963feab45672016a8cc41edf6f3afe79e7d7167dead3d21fdb4e4d9c7,2024-08-06T13:15:54.327000
CVE-2024-33988,1,1,bdd7b77fbeff0ffc0758ae8b6e499a8a80438127c5c8079afedbe193b0695b10,2024-08-06T13:15:54.547000
CVE-2024-33989,1,1,5b7284697d5328f709a9fd4fb7a2c01b2babcfd13cf9fad3ba146866e13c5d51,2024-08-06T13:15:54.757000
CVE-2024-33990,1,1,f29dd9f16a04affb1b065ba215c8c07f5b4fcef4a165541f34cd29f79dbeffea,2024-08-06T13:15:54.973000
CVE-2024-33991,1,1,e7848b1fbd07dc956434fc6854119e6993adba369708a89e5c7970374000cd12,2024-08-06T13:15:55.250000
CVE-2024-33992,1,1,9b158ff86a5fea9c0143a3a28a09a3d005a2bc3a66e820f27ff31f312fed7ae4,2024-08-06T13:15:55.487000
CVE-2024-33993,1,1,87d3be91dbfa8958a7521feb77979831ff28d2f8a3f9fb1ddb40d835def70e58,2024-08-06T13:15:55.693000
CVE-2024-33994,1,1,2e73c4da04fec625761166167f68c922b34ac4635cfbd0439df4319cf1dc7526,2024-08-06T13:15:55.897000
CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000
CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f911,2024-06-03T14:46:24.250000
CVE-2024-33998,0,0,9e3de27d8bf76d6956fcf84fb478824118f2a7a5526fa450d9858736f7cac784,2024-06-03T14:46:24.250000
@ -254372,11 +254400,11 @@ CVE-2024-37333,0,0,ca6a17cc22b1d717772d796bf0aa2546b83275671146f095987901bb082c3
CVE-2024-37334,0,0,3931d383be66577632f115e0c9d908ee2bcb3dc588be0b175f4163124a70c529,2024-07-09T18:18:38.713000
CVE-2024-37336,0,0,90e602973017f76462997dc997dd1aa43f526ec48ab9dba1852b6ff97aa50fb9,2024-07-09T18:18:38.713000
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
CVE-2024-37343,0,0,d5d5e2a1392f5d57021e524a562ea50a5a47222525d94aabe2d57813ad1cbe7a,2024-06-21T11:22:01.687000
CVE-2024-37344,0,0,ea2bc9fc8fb7df1e245c6aae13803dab2723fd58e7dce1039730ea28c975b1a0,2024-06-21T11:22:01.687000
CVE-2024-37345,0,0,fe95cad1fe407877b8df4d99c703d2baebe348e9e687e293000ef03d5bed212d,2024-06-21T11:22:01.687000
CVE-2024-37343,0,1,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
CVE-2024-37344,0,1,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
CVE-2024-37345,0,1,095e9fcf2729a229a6d30770c6328e028d13c3564257fe3ca6a02856acea31d8,2024-08-06T13:49:26.063000
CVE-2024-37346,0,0,2db4948f8270427d7ba2d74594c1333081073368dc8627246d0b026677177be1,2024-06-21T11:22:01.687000
CVE-2024-37347,0,0,54b001786471676843893d801bfb43f9bd3fba3053d7f310b4329fbd325dc220,2024-06-21T11:22:01.687000
CVE-2024-37347,0,1,4655db1f78f90a4e012a32cf405d62b010ea59a2a5d18c6dccc795a7aa708830,2024-08-06T13:50:02.077000
CVE-2024-37348,0,0,dc48fa9974ed21f9f4246b3dd80406f069a0cd0f6f5793a9ce9659a6a27d7dd1,2024-06-21T11:22:01.687000
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
@ -255230,7 +255258,7 @@ CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fc
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,0,96f3eab0325d4dafca2c5fb76f31da6a75109ecdc24758ba3e68ea536696c99c,2024-08-05T12:41:45.957000
CVE-2024-38856,0,1,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
@ -256132,7 +256160,7 @@ CVE-2024-40948,0,0,dc9a62e9b912dabd72d9488c7b256cd8ebcc0e72fd137118119d1730a13f8
CVE-2024-40949,0,0,791b23d5aa5b8f2913b54416c907a4bc6a3427cfe143f82f7d7f99adf28299c3,2024-07-12T16:34:58.687000
CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e8184,2024-06-17T12:42:04.623000
CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000
CVE-2024-40951,0,0,e3c8093d4ec9e1a8983f44c0df966a958d151fd1f3bebdd3c080d25fb2fb6ff5,2024-07-12T16:34:58.687000
CVE-2024-40951,0,1,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
CVE-2024-40952,0,0,284e20d0c02a4a07f0a633613bf6da63afc1e1864146bd195b56e5c256be8437,2024-07-12T16:34:58.687000
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000
@ -256459,9 +256487,9 @@ CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
CVE-2024-41684,0,0,c04c7a72cb63ae7eeb8584b102c76882304d9bf5cb81d153e75d8ddb331bc6dc,2024-08-01T08:15:03.390000
CVE-2024-41685,0,0,93eaff307f4f8791a8e8ff304ad0c9cc6b3c2580cc14efd1e8266bfdcba69042,2024-08-01T08:15:03.547000
CVE-2024-41686,0,0,0d750b3e1e6c898024728468d3ecdbea6b50cb803a8aba6286daab29ba27ba2d,2024-08-01T08:15:03.640000
CVE-2024-41684,0,1,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
CVE-2024-41685,0,1,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
CVE-2024-41686,0,1,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
CVE-2024-41687,0,0,199fb127145ac44260897a6bcf0117750aa11faaae311cd3b70466837d9741d9,2024-08-05T21:05:30.230000
CVE-2024-41688,0,0,e43bf0a8b23358e8a5a87799b640ea50b62cd618df1c5997479a0ac424fb65f0,2024-08-05T21:05:46.433000
CVE-2024-41689,0,0,b6e829b3ccc25fd5870e6f72327a9c949de2035a3da497da461ad4ee01aed9c6,2024-08-05T21:05:55.990000
@ -256796,6 +256824,7 @@ CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d839
CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000
CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000
CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000
CVE-2024-43114,1,1,0a5da770a0fd17923a50b31df2b87b93a494d344d1174c6f2510e7a063c78459,2024-08-06T13:15:56.130000
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
@ -257548,7 +257577,7 @@ CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da64
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000
CVE-2024-5179,0,0,4b8a5f7d1197f9c7140ee23a6f965e791ff3ed670dac09bff5868dc7e3aaa999,2024-06-06T14:17:35.017000
CVE-2024-5179,0,1,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
CVE-2024-5182,0,0,11a8026128789bf16c353b6d9ea399398a270fcab4b8a2257261feecaeaad7ff,2024-06-20T12:43:25.663000
CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000
@ -258461,6 +258490,9 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000
CVE-2024-6357,1,1,7f0a44c49954c810a6542a3e9df960774f17b65963c507c1c78b7fdf4d31fac0,2024-08-06T13:15:56.333000
CVE-2024-6358,1,1,03220ab1396339fe8dcd8d6790f519f6f3b95c0d6eb1899b445620248f6862fe,2024-08-06T13:15:56.547000
CVE-2024-6359,1,1,e777f6a5c45409a56001ec9fd2341a39f1706acccf77083aafe7f4bee9d73ced,2024-08-06T13:15:56.757000
CVE-2024-6361,0,0,36217d2b7a7c7daf2929ff08b5f573bdc0840f10e6c13048ffc771df1bf8fbc1,2024-08-05T19:15:38.333000
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
@ -258677,10 +258709,10 @@ CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f0
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
CVE-2024-6729,0,0,b413856446136980bf68a32632989cec2f558712dbc6c4470999a635b3ec5394,2024-07-21T06:15:02.240000
CVE-2024-6729,0,1,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
CVE-2024-6731,0,1,3927dffd3359d95ae39e41949bb1bae29552ebee68f43b9bd3d899c53faf9d10,2024-08-06T11:16:07.010000
CVE-2024-6732,0,1,debc28863268db45526dba3eb35b771205aaa0b4cc3cc7364610e353457afa91,2024-08-06T11:16:07.173000
CVE-2024-6731,0,0,3927dffd3359d95ae39e41949bb1bae29552ebee68f43b9bd3d899c53faf9d10,2024-08-06T11:16:07.010000
CVE-2024-6732,0,0,debc28863268db45526dba3eb35b771205aaa0b4cc3cc7364610e353457afa91,2024-08-06T11:16:07.173000
CVE-2024-6733,0,0,1b04f2a709cdab12e496472fe8c4597be3b3870fbebfd571deb5174547921171,2024-07-15T13:00:34.853000
CVE-2024-6734,0,0,0a4d5157f965a1beb7690dae2ab7ddd7e581de25c672768a22ec0cb6f90751f1,2024-07-15T13:00:34.853000
CVE-2024-6735,0,0,059e185c563aef15f572ef487105ca72ddd015a4f1b263acddae12242bbda14e,2024-07-15T13:00:34.853000
@ -258724,11 +258756,11 @@ CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b14
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
CVE-2024-6802,0,1,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000
CVE-2024-6802,0,0,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000
CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d9704,2024-07-24T12:55:13.223000
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
CVE-2024-6807,0,1,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
@ -258872,12 +258904,12 @@ CVE-2024-7168,0,0,910224f79b3b67b053997cba38db0b80d710f3c8549be559cd68336fed4d28
CVE-2024-7169,0,0,f5980a4e5d2ccbce4c06d69d429b6969821394672e47084769e90ea39f080d62,2024-07-29T14:12:08.783000
CVE-2024-7170,0,0,c911de3ed6eb8f888dabc0e3c5c43c4020953d0677c78f27e334ac1aaf9f28b3,2024-07-29T14:12:08.783000
CVE-2024-7171,0,0,f9af9fb0c23fb7b822f7b4be7ea437b892bcf51d425201c5590fc38d73eb9531,2024-07-29T14:12:08.783000
CVE-2024-7172,0,0,48098f2f8b9e9c93b1a36d2a3706aa815a76b5f3bfc9549c1d0a9bf89fd6f736,2024-07-29T14:12:08.783000
CVE-2024-7173,0,0,9c8ef6624b932caeb4662918a0a810616d2ba8f9906f81dcebfdec59369b0574,2024-07-29T14:12:08.783000
CVE-2024-7174,0,0,f1781e199cf66c66c4adc46ab76c589281b54a81300f6b034e26a8b728475a75,2024-07-29T14:12:08.783000
CVE-2024-7175,0,0,5d4eeb7489132ec6e77d74f58648a42d6a5be9593c8b5cc1f115573e2980a84a,2024-07-29T14:12:08.783000
CVE-2024-7176,0,0,87bd822da2f12dde6101b55907e007b11fb359e449d64ec7b52cb66f9d43adf6,2024-07-29T14:12:08.783000
CVE-2024-7177,0,0,9b8744673605b28dba8faef7865b0aaa6e010d681eb7e62063dcb56018b8bdec,2024-07-29T14:12:08.783000
CVE-2024-7172,0,1,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
CVE-2024-7173,0,1,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
CVE-2024-7174,0,1,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
CVE-2024-7175,0,1,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca7828052c,2024-08-06T12:57:14.623000
CVE-2024-7176,0,1,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000
CVE-2024-7177,0,1,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000
CVE-2024-7178,0,0,52ae2b809c77291d60a9036321df7d8e5ce81e3908bf9bb5c27800ec4dcd8e64,2024-07-29T14:12:08.783000
CVE-2024-7179,0,0,65e0f2454d780ae3c2ff2d614aa12167e348369191f0ac2bf926afbe4156da4a,2024-07-29T14:12:08.783000
CVE-2024-7180,0,0,04e3dd812b22b1656218c3dd237532ed09069916c415498e7f349131a50802ae,2024-07-29T14:12:08.783000
@ -258913,7 +258945,7 @@ CVE-2024-7213,0,0,f43e3a4d574beb5f0357466024a5b7d0acc9d943f364ba7f1706d9b4e0614f
CVE-2024-7214,0,0,cf0ff9b3c048cd8fe1cbe27d866836b45cf6f395e7f604068bddd4880fe6e623,2024-07-30T13:32:45.943000
CVE-2024-7215,0,0,19cb74dd169a2c0adddcb9f3b1359dd5ec8b4cb73285f81c84c895b0918569f3,2024-07-30T13:32:45.943000
CVE-2024-7216,0,0,06cb7fdb9eba9a4918c738c6ef004796ad0e05a3d2a825c6eaa07e4a67d42660,2024-07-30T13:32:45.943000
CVE-2024-7217,0,0,0ed3879ead1919503d898348b2756de9d3825fdc7f91b91789dd95f7bd091466,2024-07-30T13:32:45.943000
CVE-2024-7217,0,1,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000
CVE-2024-7218,0,0,5d0054c3fdbf03d2b2f068cbdbe6251db2dbd2a118324c2439603e07b3cc1979,2024-07-30T13:32:45.943000
CVE-2024-7219,0,0,7e68d9931944536c53759c49211464ac06490e908e53e029d7404aa622e5549d,2024-07-30T13:32:45.943000
CVE-2024-7220,0,0,5720c21291c5d0d772a794164cf0868f04ecdd497da40613327c3e7f8460872e,2024-07-30T13:32:45.943000
@ -258923,7 +258955,7 @@ CVE-2024-7223,0,0,fb4ad2671317976e5224b8b90488cd911f8b35bdfcac7bcf593fd9864e14b3
CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e85,2024-07-30T13:32:45.943000
CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000
CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000
CVE-2024-7246,1,1,91ba6db7737318d04508a866c4f4e7d5eba565c81ad3d61374c0e871821dff35,2024-08-06T11:16:07.587000
CVE-2024-7246,0,0,91ba6db7737318d04508a866c4f4e7d5eba565c81ad3d61374c0e871821dff35,2024-08-06T11:16:07.587000
CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000
CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
@ -258964,7 +258996,7 @@ CVE-2024-7309,0,0,50c4489d6857d7bbf17b62e0c8837ee7d19caf578c8d1125be603576151212
CVE-2024-7310,0,0,f41dfd90546a9735111808103c67b19c822dfd89b37a542d36f1a7128ca8fa3b,2024-07-31T12:57:02.300000
CVE-2024-7311,0,0,992c6b7ceb1c9a4d719c68d0c71706858cdee857ab750e2dc0c4b13c55655029,2024-07-31T12:57:02.300000
CVE-2024-7314,0,0,c9ee4785c806eb18fb598dea248a158e00bf7a5180769429ec31516f460a25c7,2024-08-05T12:41:45.957000
CVE-2024-7317,1,1,46e574e44cab99720890fa4ace2297e1c3497f5fae8e52b7567df1e1a00d3acf,2024-08-06T11:16:07.800000
CVE-2024-7317,0,0,46e574e44cab99720890fa4ace2297e1c3497f5fae8e52b7567df1e1a00d3acf,2024-08-06T11:16:07.800000
CVE-2024-7319,0,0,7ca9259384bd06123de1b88320526aa0c7c8a8fa4a2474109218c804a0ab7d99,2024-08-05T12:41:45.957000
CVE-2024-7320,0,0,33e9dcaae6c93434ade67bd8a073d2b7f1fbc81482e595b40c21856a0fa46ae6,2024-07-31T12:57:02.300000
CVE-2024-7321,0,0,7c3abae321c1c206df72b5645aa4b7f08ab908ecabfe1d2acbc6472a1b295bbf,2024-07-31T12:57:02.300000
@ -259059,6 +259091,20 @@ CVE-2024-7499,0,0,fa466cc6c096c43b53afcea4eeed2aa00cfe03fa9d1fcaf27af1880791fed5
CVE-2024-7500,0,0,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
CVE-2024-7505,0,0,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
CVE-2024-7506,0,0,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
CVE-2024-7518,1,1,94be60491c9746dbdb16571786c4349fc86267ca1462229f1300916f0483107a,2024-08-06T13:15:56.970000
CVE-2024-7519,1,1,e88f3f8a85d9ae2553126e26bb669bef93c95a3eedec840af737c3d1134edac1,2024-08-06T13:15:57.040000
CVE-2024-7520,1,1,6680739995f7d2a3f78deabfb204791061ee70cbfe60d502f5317460e630fde2,2024-08-06T13:15:57.107000
CVE-2024-7521,1,1,b84dee931c60a9429ca02e821575a4be568b84ccc15abd6f3440cdcded827a8c,2024-08-06T13:15:57.167000
CVE-2024-7522,1,1,7320e110232d4204cf160c1a74f2837aaf54c219edc44766282941c0fabadd0f,2024-08-06T13:15:57.237000
CVE-2024-7523,1,1,7a415d7b8bcc7ced5780da1a0c42d5a7d33035b6df26177c67f8ff68390c7520,2024-08-06T13:15:57.297000
CVE-2024-7524,1,1,bc6ee61d57e85a8865199dd95a6dcba05f760025fc7f1efa03f773069af10cf2,2024-08-06T13:15:57.357000
CVE-2024-7525,1,1,58ceb789cf8f9603674d6deb5b00a1918f90bfe7801a82b16ccf5221dde19622,2024-08-06T13:15:57.420000
CVE-2024-7526,1,1,2945e010b9d3fc561759077d77bf0778898bb54ef7c04098460b61baf34cbc57,2024-08-06T13:15:57.483000
CVE-2024-7527,1,1,635d9a4e465d05d55df4c38de27a7811daf4626d41281cb4b9bbb450ff39853d,2024-08-06T13:15:57.543000
CVE-2024-7528,1,1,39373d362f5e4f545251a1de7a3b3494efbb84d183a6e2fa4edeaa4da34cbc78,2024-08-06T13:15:57.600000
CVE-2024-7529,1,1,eac83591a5cf68566fdc662230f0eef4ad40e402a7fee7bd8b8c7955eee32ab1,2024-08-06T13:15:57.657000
CVE-2024-7530,1,1,23ed4db63a2a8ef5b15c39a1b54b35b4be482b2a9c778fefa1675c316a52cd60,2024-08-06T13:15:57.723000
CVE-2024-7531,1,1,023a8288dcdad02eeaa1918d46f22f961613e847da9fd0fc169deb0fa3e444fc,2024-08-06T13:15:57.787000
CVE-2024-7537,0,0,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
CVE-2024-7538,0,0,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
CVE-2024-7539,0,0,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000
@ -259070,3 +259116,4 @@ CVE-2024-7544,0,0,080b0de39e8c8f2e6af2eaa3b14006dc3040de641ae6c032803cbfcd66ecd2
CVE-2024-7545,0,0,573a5b23c77789a8b3edf118a7d564b619d6c9f61267341b46eaf87deada162c,2024-08-06T00:15:36.247000
CVE-2024-7546,0,0,07ae86c51ff9b6287b4773e81c46673e6fef7a1f35d7346bf06ddaef956f485d,2024-08-06T00:15:36.450000
CVE-2024-7547,0,0,b727ccd37ef13a960fd8492a150c0deba10508cd85a9c0f2241c9f7ddc1a02e9,2024-08-06T00:15:36.637000
CVE-2024-7551,1,1,91e8e42faad68d533415ce39135290191a39b000131091c58c5bab8d2477b228,2024-08-06T13:15:57.850000

Can't render this file because it is too large.