From fa3414e9f099cbb2294fa9265fdf340ea39b7ab4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 28 Jul 2024 20:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-07-28T20:00:16.997964+00:00 --- CVE-2024/CVE-2024-71xx/CVE-2024-7165.json | 137 ++++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7166.json | 137 ++++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7167.json | 137 ++++++++++++++++++++++ CVE-2024/CVE-2024-71xx/CVE-2024-7168.json | 137 ++++++++++++++++++++++ README.md | 14 +-- _state.csv | 12 +- 6 files changed, 563 insertions(+), 11 deletions(-) create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7165.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7166.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7167.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7168.json diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7165.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7165.json new file mode 100644 index 00000000000..6cb33aab0cb --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7165.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7165", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T18:15:02.123", + "lastModified": "2024-07-28T18:15:02.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester School Fees Payment System 1.0 and classified as critical. This issue affects some unknown processing of the file /view_payment.php. The manipulation of the argument ef_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272579." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/efe8fa56e557bf3244909f348d5874f7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272579", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272579", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380179", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7166.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7166.json new file mode 100644 index 00000000000..1b1b88a3de6 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7166.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7166", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T18:15:02.420", + "lastModified": "2024-07-28T18:15:02.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester School Fees Payment System 1.0. It has been classified as critical. Affected is an unknown function of the file /receipt.php. The manipulation of the argument ef_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272580." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/8ab4ff5ffb2a555694931d14329f5a5d", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272580", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272580", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380180", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7167.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7167.json new file mode 100644 index 00000000000..73642070993 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7167.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7167", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T19:15:10.697", + "lastModified": "2024-07-28T19:15:10.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester School Fees Payment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /manage_course.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272581 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/69a797bc0b33fc19144a727a0be31685", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272581", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272581", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380181", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7168.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7168.json new file mode 100644 index 00000000000..99f7208cc0a --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7168.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7168", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-28T19:15:11.007", + "lastModified": "2024-07-28T19:15:11.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester School Fees Payment System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-272582 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/topsky979/14187eec46d6bc04772eadae7ac4e930", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.272582", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272582", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.380184", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b6637a11ed8..6d8c659352b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-28T18:00:17.198521+00:00 +2024-07-28T20:00:16.997964+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-28T17:15:10.057000+00:00 +2024-07-28T19:15:11.007000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258105 +258109 ``` ### CVEs added in the last Commit Recently added CVEs: `4` -- [CVE-2024-7161](CVE-2024/CVE-2024-71xx/CVE-2024-7161.json) (`2024-07-28T16:15:02.047`) -- [CVE-2024-7162](CVE-2024/CVE-2024-71xx/CVE-2024-7162.json) (`2024-07-28T16:15:02.347`) -- [CVE-2024-7163](CVE-2024/CVE-2024-71xx/CVE-2024-7163.json) (`2024-07-28T17:15:09.797`) -- [CVE-2024-7164](CVE-2024/CVE-2024-71xx/CVE-2024-7164.json) (`2024-07-28T17:15:10.057`) +- [CVE-2024-7165](CVE-2024/CVE-2024-71xx/CVE-2024-7165.json) (`2024-07-28T18:15:02.123`) +- [CVE-2024-7166](CVE-2024/CVE-2024-71xx/CVE-2024-7166.json) (`2024-07-28T18:15:02.420`) +- [CVE-2024-7167](CVE-2024/CVE-2024-71xx/CVE-2024-7167.json) (`2024-07-28T19:15:10.697`) +- [CVE-2024-7168](CVE-2024/CVE-2024-71xx/CVE-2024-7168.json) (`2024-07-28T19:15:11.007`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index ed4370d44bb..3c234bd071c 100644 --- a/_state.csv +++ b/_state.csv @@ -258100,7 +258100,11 @@ CVE-2024-7157,0,0,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd08 CVE-2024-7158,0,0,8b4598ff93542df87dc175453c9bd95fdcaeec8b3f59030fa45c1c99578e1b2d,2024-07-28T14:15:11.303000 CVE-2024-7159,0,0,aa09cdc774bb904f7578dd0ed9d500a7cba38cf5f5fa8676610887cb373b3a30,2024-07-28T15:15:09.897000 CVE-2024-7160,0,0,bd957275ec2f0f7bf2b2b785f1d1add29975b97e07067566cb44747fa4fcc461,2024-07-28T15:15:10.163000 -CVE-2024-7161,1,1,48dccc008eb3fd3321c03cc8f39414564a6e7517c5328a48d623edbeb7dc27b0,2024-07-28T16:15:02.047000 -CVE-2024-7162,1,1,e0a0f66b0fb0446ebcd55f1f10f62ebc696e4dc21ba0bd0598d435533b778fb8,2024-07-28T16:15:02.347000 -CVE-2024-7163,1,1,614624da553eca694932fb6bd646443cabbc72205fe1db7ecb192b2c04a1c276,2024-07-28T17:15:09.797000 -CVE-2024-7164,1,1,81f225beef0a6515bde342fba0486c4aa02307f078d1a28a867adf06cc3997f9,2024-07-28T17:15:10.057000 +CVE-2024-7161,0,0,48dccc008eb3fd3321c03cc8f39414564a6e7517c5328a48d623edbeb7dc27b0,2024-07-28T16:15:02.047000 +CVE-2024-7162,0,0,e0a0f66b0fb0446ebcd55f1f10f62ebc696e4dc21ba0bd0598d435533b778fb8,2024-07-28T16:15:02.347000 +CVE-2024-7163,0,0,614624da553eca694932fb6bd646443cabbc72205fe1db7ecb192b2c04a1c276,2024-07-28T17:15:09.797000 +CVE-2024-7164,0,0,81f225beef0a6515bde342fba0486c4aa02307f078d1a28a867adf06cc3997f9,2024-07-28T17:15:10.057000 +CVE-2024-7165,1,1,8b0a6c114d77f4576b0459a5fb00e79e42379194940b483d01e5c1b1e30ef7e6,2024-07-28T18:15:02.123000 +CVE-2024-7166,1,1,214c1cb988bb77b97e34dbab593e349f82d85e02eb1319554a3cfe91290aec7b,2024-07-28T18:15:02.420000 +CVE-2024-7167,1,1,414df381b84603a8a6e855d293659c9444b1bf41e89dddb552f745827b1f27ce,2024-07-28T19:15:10.697000 +CVE-2024-7168,1,1,12f38d99b2927640de4a3421acd94ba64943387e05be840f669c87a0aea2a562,2024-07-28T19:15:11.007000