Auto-Update: 2024-08-08T22:00:17.982700+00:00

This commit is contained in:
cad-safe-bot 2024-08-08 22:03:14 +00:00
parent bf4cccd2b1
commit 069f56edff
48 changed files with 2366 additions and 314 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28074",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-31T08:15:02.243",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T21:14:12.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndIncluding": "4.1.5",
"matchCriteriaId": "016B6D4C-062E-4D93-B3EA-CF5FFCB34ED4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.6.2",
"matchCriteriaId": "C631A71E-7BA9-4375-ADA3-6AB91A737A30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21C6A56D-8CAF-45D5-A1E1-FE70F2584DF5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28865",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:09.533",
"lastModified": "2024-08-08T18:55:19.180",
"lastModified": "2024-08-08T20:35:00.890",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR15, 4.0.0 SR05, 4.1.0 SR03, and 4.2.0 SR02 fails to validate the directory contents of certain directories (e.g., ensuring the expected hash sum) during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-353"
}
]
}
],
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49548",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T00:15:52.203",
"lastModified": "2024-03-05T13:41:01.900",
"lastModified": "2024-08-08T20:35:02.323",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Customer Support System v1 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro apellido en /customer_support/ajax.php?action=save_user."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/geraldoalcantara/CVE-2023-49548",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0365",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-03-18T19:15:06.253",
"lastModified": "2024-03-18T19:40:00.173",
"lastModified": "2024-08-08T21:35:01.163",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Fancy Product Designer de WordPress anterior a 6.1.5 no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por los administradores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0855",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-27T09:15:37.497",
"lastModified": "2024-02-27T14:20:06.637",
"lastModified": "2024-08-08T21:35:01.813",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Spiffy Calendar de WordPress anterior a 4.9.9 no verifica el par\u00e1metro event_author y permite a cualquier usuario modificarlo al crear un evento, lo que lleva a enga\u00f1ar a los usuarios/administradores de que una p\u00e1gina fue creada por un Contributor+."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1936",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-04T22:15:46.733",
"lastModified": "2024-03-23T12:15:08.453",
"lastModified": "2024-08-08T21:35:03.480",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El asunto cifrado de un mensaje de correo electr\u00f3nico podr\u00eda asignarse de forma incorrecta y permanente a otro mensaje de correo electr\u00f3nico arbitrario en la cach\u00e9 local de Thunderbird. En consecuencia, al responder al mensaje de correo electr\u00f3nico contaminado, el usuario podr\u00eda filtrar accidentalmente el asunto confidencial a un tercero. Si bien esta actualizaci\u00f3n corrige el error y evita la contaminaci\u00f3n futura de mensajes, no repara autom\u00e1ticamente las contaminaciones existentes. Se recomienda a los usuarios que utilicen la funci\u00f3n de reparaci\u00f3n de carpetas, que est\u00e1 disponible en el men\u00fa contextual de las carpetas de correo electr\u00f3nico, que borrar\u00e1 las asignaciones de asuntos incorrectas. Esta vulnerabilidad afecta a Thunderbird < 115.8.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860977",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2176",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-06T19:15:09.090",
"lastModified": "2024-03-23T03:15:12.287",
"lastModified": "2024-08-08T21:35:08.447",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Use after free en FedCM en Google Chrome anterior a 122.0.6261.111 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24098",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T16:15:49.290",
"lastModified": "2024-03-05T18:50:18.333",
"lastModified": "2024-08-08T21:35:04.617",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Code-projects Scholars Tracking System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de News Feed."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/scholars-tracking-system-in-php-with-source-code/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2444",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-06T05:15:07.500",
"lastModified": "2024-04-08T18:49:25.863",
"lastModified": "2024-08-08T21:35:09.480",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Related Posts de WordPress en l\u00ednea anterior a 3.5.0 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de cross-site scripting incluso cuando unfiltered_html no est\u00e1 permitido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25817",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-06T00:15:52.703",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-08-08T21:35:05.550",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en eza anterior a la versi\u00f3n 0.18.2, permite a atacantes locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de los componentes .git/HEAD, .git/refs y .git/objects."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-3qx3-6hxr-j2ch",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25846",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-27T17:15:12.287",
"lastModified": "2024-02-28T14:06:45.783",
"lastModified": "2024-08-08T20:35:05.147",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el m\u00f3dulo \"Importaci\u00f3n de cat\u00e1logo de productos (CSV, Excel)\" (simpleimportproduct) <= 6.7.0 de MyPrestaModules para PrestaShop, un invitado puede cargar archivos con extensiones .php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://addons.prestashop.com/fr/import-export-de-donnees/19091-catalogue-de-produits-csv-excel-dimportation.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2627",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-20T17:15:07.527",
"lastModified": "2024-04-01T15:22:56.233",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-08T21:35:10.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27689",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T17:15:07.573",
"lastModified": "2024-03-01T22:22:25.913",
"lastModified": "2024-08-08T21:35:06.920",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Stupid Simple CMS v1.2.4 conten\u00eda un Cross-Site Request Forgery (CSRF) a trav\u00e9s de /update-article.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/Xin246/cms/blob/main/2.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28099",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-15T11:15:08.397",
"lastModified": "2024-04-15T13:15:31.997",
"lastModified": "2024-08-08T20:35:06.277",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "VT STUDIO Ver.8.32 y anteriores contienen un problema con la ruta de b\u00fasqueda de DLL, lo que puede provocar que se carguen bibliotecas de v\u00ednculos din\u00e1micos de forma insegura. Como resultado, se puede ejecutar c\u00f3digo arbitrario con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU92825069/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30163",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-07T17:15:50.267",
"lastModified": "2024-06-07T19:24:09.243",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T21:25:19.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,77 @@
"value": "Invision Community antes de 4.7.16 permite la inyecci\u00f3n de SQL a trav\u00e9s del m\u00e9todo apps/nexus/modules/front/store/store.php IPS\\nexus\\modules\\front\\store\\_store::_categoryView(), donde la entrada del usuario pasaba a trav\u00e9s de la solicitud de filtro el par\u00e1metro no se sanitiza adecuadamente antes de usarse para ejecutar consultas SQL. Esto puede ser aprovechado por atacantes no autenticados para llevar a cabo ataques de inyecci\u00f3n SQL ciega."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.7.16",
"matchCriteriaId": "F612BBD3-CA37-4707-B0B0-E25CF25694FE"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Apr/20",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://invisioncommunity.com/release-notes/4716-r128/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31585",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:08.007",
"lastModified": "2024-06-10T18:15:31.457",
"lastModified": "2024-08-08T21:35:12.477",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que FFmpeg versi\u00f3n n5.1 a n6.1 conten\u00eda una vulnerabilidad de error uno por uno en libavfilter/avf_showspectrum.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-193"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/1047524396/dc2c64ffe0c3934a6176bcd2c5cf5656",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32317",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T16:15:09.073",
"lastModified": "2024-04-17T16:51:07.347",
"lastModified": "2024-08-08T21:35:13.350",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El firmware Tenda AC10 v4.0 V16.03.10.13 y V16.03.10.20 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro adslPwd en la funci\u00f3n formWanParameterSetting."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32857",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-31T09:15:03.297",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T21:10:04.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:peripheral_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.6",
"matchCriteriaId": "99B6BBE4-2845-44DA-BC9D-C80FB9537457"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-33959",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:05.133",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T21:02:25.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'categ' in '/admin/mod_reports/printreport.php' parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en PayPal, Credit Card and Debit Card Payment que afecta a la versi\u00f3n 1.0. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una consulta especialmente manipulada al servidor y recuperando toda la informaci\u00f3n almacenada en \u00e9l a trav\u00e9s del siguiente 'categ' en el par\u00e1metro '/admin/mod_reports/printreport.php'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -47,10 +71,50 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34219",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:35.857",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-08T21:35:14.163",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que TOTOLINK CP450 V4.1.0cu.747_B20191224 contiene una vulnerabilidad en la funci\u00f3n SetTelnetCfg, que permite a los atacantes iniciar sesi\u00f3n a trav\u00e9s de telnet."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36130",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-08-07T04:17:17.967",
"lastModified": "2024-08-07T15:17:46.717",
"lastModified": "2024-08-08T21:35:14.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-19T21:15:57.363",
"lastModified": "2024-07-03T02:03:29.450",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:59:28.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:promokit:pk_themesettings:*:*:*:*:*:prestashop:*:*",
"versionEndIncluding": "1.8.8",
"matchCriteriaId": "CF2EF7AB-7378-44D0-A485-274204C39D1A"
}
]
}
]
}
],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37142",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-31T09:15:04.700",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T21:17:18.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:peripheral_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.6",
"matchCriteriaId": "99B6BBE4-2845-44DA-BC9D-C80FB9537457"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37382",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-08T18:15:10.317",
"lastModified": "2024-08-08T18:55:19.180",
"lastModified": "2024-08-08T20:35:08.353",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue discovered in import host feature in Ab Initio Metadata Hub and Authorization Gateway before 4.3.1.1 allows attackers to run arbitrary code via crafted modification of server configuration."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.abinitio.com/en/security-advisories/ab-2024-003/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41237",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T19:15:48.033",
"lastModified": "2024-08-08T14:35:07.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:53:45.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02775C53-3AA5-4707-A166-D1FE5B1288EF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Teacher.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41250",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T17:15:51.837",
"lastModified": "2024-08-08T15:21:18.130",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-08T21:35:16.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41251",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T16:15:45.850",
"lastModified": "2024-08-08T15:05:36.537",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-08T20:35:09.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41702",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-07-30T10:15:02.550",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:31:10.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siberiancms:siberiancms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.11",
"matchCriteriaId": "6F353DA4-956C-408C-8B64-95E3BFB2FDC0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-41989",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T15:15:56.030",
"lastModified": "2024-08-07T20:50:04.107",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-08T20:35:11.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. El filtro de plantilla de formato flotante est\u00e1 sujeto a un consumo de memoria significativo cuando se le proporciona una representaci\u00f3n de cadena de un n\u00famero en notaci\u00f3n cient\u00edfica con un exponente grande."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,28 +2,102 @@
"id": "CVE-2024-42248",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-07T16:15:47.440",
"lastModified": "2024-08-07T19:09:46.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:55:35.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: ma35d1: Add a NULL check for of_node\n\nThe pdev->dev.of_node can be NULL if the \"serial\" node is absent.\nAdd a NULL check to return an error in such cases."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: serial: ma35d1: agregue una verificaci\u00f3n NULL para of_node El pdev->dev.of_node puede ser NULL si el nodo \"serial\" est\u00e1 ausente. Agregue una verificaci\u00f3n NULL para devolver un error en tales casos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "F8F0E46F-AE23-4E3C-94C2-982292314C2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0e0e15ab2d3a094a38525d23c03d78ec7d14a40e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/23efa74cfe6eb923abb5b9bc51b2a04879013c67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/acd09ac253b5de8fd79fc61a482ee19154914c7a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,24 +2,88 @@
"id": "CVE-2024-42249",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-07T16:15:47.510",
"lastModified": "2024-08-07T19:09:46.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:55:25.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: don't unoptimize message in spi_async()\n\nCalling spi_maybe_unoptimize_message() in spi_async() is wrong because\nthe message is likely to be in the queue and not transferred yet. This\ncan corrupt the message while it is being used by the controller driver.\n\nspi_maybe_unoptimize_message() is already called in the correct place\nin spi_finalize_current_message() to balance the call to\nspi_maybe_optimize_message() in spi_async()."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spi: no desoptimizar el mensaje en spi_async() Llamar a spi_maybe_unoptimize_message() en spi_async() es incorrecto porque es probable que el mensaje est\u00e9 en la cola y a\u00fan no se haya transferido. Esto puede da\u00f1ar el mensaje mientras lo utiliza el controlador del controlador. spi_maybe_unoptimize_message() ya se llama en el lugar correcto en spi_finalize_current_message() para equilibrar la llamada a spi_maybe_optimize_message() en spi_async()."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "0F5C3789-472B-40EC-9D2A-48169EDB592B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/8b9af6d67517ce4a0015928b3cf35bfd2b1bc1c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c86a918b1bdba78fb155184f8d88dfba1e63335d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,32 +2,102 @@
"id": "CVE-2024-42250",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-07T16:15:47.567",
"lastModified": "2024-08-07T19:09:46.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:55:19.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: add missing lock protection when polling\n\nAdd missing lock protection in poll routine when iterating xarray,\notherwise:\n\nEven with RCU read lock held, only the slot of the radix tree is\nensured to be pinned there, while the data structure (e.g. struct\ncachefiles_req) stored in the slot has no such guarantee. The poll\nroutine will iterate the radix tree and dereference cachefiles_req\naccordingly. Thus RCU read lock is not adequate in this case and\nspinlock is needed here."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: archivos de cach\u00e9: agregue protecci\u00f3n de bloqueo faltante al sondear. Agregue protecci\u00f3n de bloqueo faltante en la rutina de sondeo al iterar xarray; de lo contrario: incluso con el bloqueo de lectura de RCU mantenido, solo se garantiza que la ranura del \u00e1rbol de base ser anclado all\u00ed, mientras que la estructura de datos (por ejemplo, struct cachefiles_req) almacenada en la ranura no tiene tal garant\u00eda. La rutina de sondeo iterar\u00e1 el \u00e1rbol de base y eliminar\u00e1 la referencia a cachefiles_req en consecuencia. Por lo tanto, el bloqueo de lectura de la RCU no es adecuado en este caso y aqu\u00ed se necesita el bloqueo de giro."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "6FAC1A24-181A-4DB7-801D-4BDF1B4E4116"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/6bb6bd3dd6f382dfd36220d4b210a0c77c066651",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8eadcab7f3dd809edbe5ae20533ff843dfea3a07",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/97cfd5e20ddc2e33e16ce369626ce76c9a475fd7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cf5bb09e742a9cf6349127e868329a8f69b7a014",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6124",
"sourceIdentifier": "security@m-files.com",
"published": "2024-07-29T13:15:10.810",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:24:32.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@m-files.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:m-files:hubshare:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.6.0",
"matchCriteriaId": "CF69DBD6-AB20-497F-AA46-9881B022C0EE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-6124/",
"source": "security@m-files.com"
"source": "security@m-files.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6707",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2024-08-07T23:15:41.457",
"lastModified": "2024-08-08T14:35:14.743",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:55:55.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"type": "Secondary",
@ -55,10 +85,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openwebui:open_webui:0.1.105:*:*:*:*:*:*:*",
"matchCriteriaId": "33127669-DDB0-4B45-9D9D-D3B85CEC7180"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
{
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-006.txt",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6881",
"sourceIdentifier": "security@m-files.com",
"published": "2024-07-29T13:15:10.990",
"lastModified": "2024-07-29T14:12:08.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:24:41.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@m-files.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:m-files:hubshare:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.6.0",
"matchCriteriaId": "CF69DBD6-AB20-497F-AA46-9881B022C0EE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-6881/",
"source": "security@m-files.com"
"source": "security@m-files.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6890",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2024-08-07T23:15:41.543",
"lastModified": "2024-08-08T14:35:15.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:53:15.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
},
{
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"type": "Secondary",
@ -59,10 +89,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*",
"matchCriteriaId": "16D9FF52-C135-4C0E-B182-65D575879BEA"
}
]
}
]
}
],
"references": [
{
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6891",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2024-08-08T00:15:40.603",
"lastModified": "2024-08-08T14:35:15.340",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:53:26.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"type": "Secondary",
@ -55,10 +85,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*",
"matchCriteriaId": "16D9FF52-C135-4C0E-B182-65D575879BEA"
}
]
}
]
}
],
"references": [
{
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6893",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2024-08-08T00:15:40.793",
"lastModified": "2024-08-08T14:35:15.587",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:53:37.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
},
{
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*",
"matchCriteriaId": "16D9FF52-C135-4C0E-B182-65D575879BEA"
}
]
}
]
}
],
"references": [
{
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6896",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-24T11:15:11.653",
"lastModified": "2024-07-24T12:55:13.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:06:25.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,22 +81,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampforwp:accelerated_mobile_pages:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.97",
"matchCriteriaId": "5A2D023D-F0C4-4D95-93D1-E26AC9F3FE60"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/accelerated-mobile-pages/tags/1.0.96.1/templates/features.php#L7159",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3123278/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/accelerated-mobile-pages/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0a5fdb9-4e36-43ce-88ce-cd75bb1d1e25?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6930",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-24T08:15:03.477",
"lastModified": "2024-07-24T12:55:13.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-08T20:06:49.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,22 +81,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "10.2.2",
"matchCriteriaId": "F1BC7743-3A60-4983-9221-37B9176C03CB"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/booking/trunk/core/lib/wpdev-booking-class.php#L849",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3123628/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/booking/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaca776-03ce-43bb-9553-f455f57124a3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T23:15:03.573",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:25:32.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98B59A1A-0B87-48CC-9623-3B2F9836C217"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-4.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description"
]
},
{
"url": "https://vuldb.com/?ctiid.273145",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.273145",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.381094",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T00:15:01.730",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:07:38.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98B59A1A-0B87-48CC-9623-3B2F9836C217"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-5.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description"
]
},
{
"url": "https://vuldb.com/?ctiid.273146",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.273146",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.381095",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T01:15:10.130",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:07:50.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98B59A1A-0B87-48CC-9623-3B2F9836C217"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-6.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description"
]
},
{
"url": "https://vuldb.com/?ctiid.273147",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.273147",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.381096",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7535",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-06T21:16:04.140",
"lastModified": "2024-08-07T15:17:46.717",
"lastModified": "2024-08-08T20:35:12.890",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La implementaci\u00f3n inadecuada en V8 en Google Chrome anterior a 127.0.6533.99 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7582",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-07T16:15:47.873",
"lastModified": "2024-08-07T19:09:46.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:55:07.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda i22 1.0.0.3(4687). This vulnerability affects the function formApPortalAccessCodeAuth of the file /goform/apPortalAccessCodeAuth. The manipulation of the argument accessCode/data/acceInfo leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tenda i22 1.0.0.3(4687) y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formApPortalAccessCodeAuth del archivo /goform/apPortalAccessCodeAuth. La manipulaci\u00f3n del argumento c\u00f3digo de acceso/datos/acceInfo provoca un desbordamiento del b\u00fafer. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -105,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +150,67 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:i22_firmware:1.0.0.3\\(4687\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F879BB6-4F6E-4E81-A24A-3037DBD1A5B2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52D94207-DFC8-478C-BA6B-F0A64BBB3E67"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/i22/ApPortalAccessCodeAuth",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273862",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273862",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.382834",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7583",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-07T16:15:48.273",
"lastModified": "2024-08-07T19:09:46.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-08T20:54:35.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda i22 1.0.0.3(4687). This issue affects the function formApPortalOneKeyAuth of the file /goform/apPortalOneKeyAuth. The manipulation of the argument data leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tenda i22 1.0.0.3(4687) y clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formApPortalOneKeyAuth del archivo /goform/apPortalOneKeyAuth. La manipulaci\u00f3n de los datos del argumento provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -116,22 +150,67 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:i22_firmware:1.0.0.3\\(4687\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F879BB6-4F6E-4E81-A24A-3037DBD1A5B2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52D94207-DFC8-478C-BA6B-F0A64BBB3E67"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/i22/ApPortalOneKeyAuth",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273863",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273863",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.382835",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-08T20:00:17.133533+00:00
2024-08-08T22:00:17.982700+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-08T19:35:22.760000+00:00
2024-08-08T21:35:16.680000+00:00
```
### Last Data Feed Release
@ -38,51 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `0`
- [CVE-2023-24062](CVE-2023/CVE-2023-240xx/CVE-2023-24062.json) (`2024-08-08T18:15:09.317`)
- [CVE-2023-24063](CVE-2023/CVE-2023-240xx/CVE-2023-24063.json) (`2024-08-08T18:15:09.410`)
- [CVE-2023-24064](CVE-2023/CVE-2023-240xx/CVE-2023-24064.json) (`2024-08-08T18:15:09.467`)
- [CVE-2023-28865](CVE-2023/CVE-2023-288xx/CVE-2023-28865.json) (`2024-08-08T18:15:09.533`)
- [CVE-2023-33206](CVE-2023/CVE-2023-332xx/CVE-2023-33206.json) (`2024-08-08T18:15:09.597`)
- [CVE-2023-40261](CVE-2023/CVE-2023-402xx/CVE-2023-40261.json) (`2024-08-08T18:15:09.670`)
- [CVE-2024-0104](CVE-2024/CVE-2024-01xx/CVE-2024-0104.json) (`2024-08-08T18:15:09.800`)
- [CVE-2024-37382](CVE-2024/CVE-2024-373xx/CVE-2024-37382.json) (`2024-08-08T18:15:10.317`)
- [CVE-2024-39287](CVE-2024/CVE-2024-392xx/CVE-2024-39287.json) (`2024-08-08T18:15:10.380`)
- [CVE-2024-41161](CVE-2024/CVE-2024-411xx/CVE-2024-41161.json) (`2024-08-08T18:15:10.640`)
- [CVE-2024-42408](CVE-2024/CVE-2024-424xx/CVE-2024-42408.json) (`2024-08-08T18:15:10.953`)
- [CVE-2024-42493](CVE-2024/CVE-2024-424xx/CVE-2024-42493.json) (`2024-08-08T18:15:11.207`)
### CVEs modified in the last Commit
Recently modified CVEs: `65`
Recently modified CVEs: `46`
- [CVE-2024-38087](CVE-2024/CVE-2024-380xx/CVE-2024-38087.json) (`2024-08-08T18:45:56.203`)
- [CVE-2024-38088](CVE-2024/CVE-2024-380xx/CVE-2024-38088.json) (`2024-08-08T18:31:54.827`)
- [CVE-2024-41238](CVE-2024/CVE-2024-412xx/CVE-2024-41238.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-41239](CVE-2024/CVE-2024-412xx/CVE-2024-41239.json) (`2024-08-08T19:04:43.380`)
- [CVE-2024-41910](CVE-2024/CVE-2024-419xx/CVE-2024-41910.json) (`2024-08-08T18:15:10.897`)
- [CVE-2024-41942](CVE-2024/CVE-2024-419xx/CVE-2024-41942.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42354](CVE-2024/CVE-2024-423xx/CVE-2024-42354.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42355](CVE-2024/CVE-2024-423xx/CVE-2024-42355.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42356](CVE-2024/CVE-2024-423xx/CVE-2024-42356.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42357](CVE-2024/CVE-2024-423xx/CVE-2024-42357.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-42365](CVE-2024/CVE-2024-423xx/CVE-2024-42365.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-6706](CVE-2024/CVE-2024-67xx/CVE-2024-6706.json) (`2024-08-08T19:05:03.057`)
- [CVE-2024-6884](CVE-2024/CVE-2024-68xx/CVE-2024-6884.json) (`2024-08-08T19:35:22.760`)
- [CVE-2024-7115](CVE-2024/CVE-2024-71xx/CVE-2024-7115.json) (`2024-08-08T19:06:00.017`)
- [CVE-2024-7116](CVE-2024/CVE-2024-71xx/CVE-2024-7116.json) (`2024-08-08T19:08:18.813`)
- [CVE-2024-7117](CVE-2024/CVE-2024-71xx/CVE-2024-7117.json) (`2024-08-08T19:11:30.467`)
- [CVE-2024-7118](CVE-2024/CVE-2024-71xx/CVE-2024-7118.json) (`2024-08-08T19:02:12.083`)
- [CVE-2024-7119](CVE-2024/CVE-2024-71xx/CVE-2024-7119.json) (`2024-08-08T19:01:17.340`)
- [CVE-2024-7348](CVE-2024/CVE-2024-73xx/CVE-2024-7348.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-7394](CVE-2024/CVE-2024-73xx/CVE-2024-7394.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-08-08T18:55:19.180`)
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T18:55:28.493`)
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-08T18:35:06.897`)
- [CVE-2024-36678](CVE-2024/CVE-2024-366xx/CVE-2024-36678.json) (`2024-08-08T20:59:28.103`)
- [CVE-2024-37142](CVE-2024/CVE-2024-371xx/CVE-2024-37142.json) (`2024-08-08T21:17:18.647`)
- [CVE-2024-37382](CVE-2024/CVE-2024-373xx/CVE-2024-37382.json) (`2024-08-08T20:35:08.353`)
- [CVE-2024-41237](CVE-2024/CVE-2024-412xx/CVE-2024-41237.json) (`2024-08-08T20:53:45.827`)
- [CVE-2024-41250](CVE-2024/CVE-2024-412xx/CVE-2024-41250.json) (`2024-08-08T21:35:16.680`)
- [CVE-2024-41251](CVE-2024/CVE-2024-412xx/CVE-2024-41251.json) (`2024-08-08T20:35:09.980`)
- [CVE-2024-41702](CVE-2024/CVE-2024-417xx/CVE-2024-41702.json) (`2024-08-08T20:31:10.510`)
- [CVE-2024-41989](CVE-2024/CVE-2024-419xx/CVE-2024-41989.json) (`2024-08-08T20:35:11.140`)
- [CVE-2024-42248](CVE-2024/CVE-2024-422xx/CVE-2024-42248.json) (`2024-08-08T20:55:35.180`)
- [CVE-2024-42249](CVE-2024/CVE-2024-422xx/CVE-2024-42249.json) (`2024-08-08T20:55:25.943`)
- [CVE-2024-42250](CVE-2024/CVE-2024-422xx/CVE-2024-42250.json) (`2024-08-08T20:55:19.780`)
- [CVE-2024-6124](CVE-2024/CVE-2024-61xx/CVE-2024-6124.json) (`2024-08-08T20:24:32.483`)
- [CVE-2024-6707](CVE-2024/CVE-2024-67xx/CVE-2024-6707.json) (`2024-08-08T20:55:55.453`)
- [CVE-2024-6881](CVE-2024/CVE-2024-68xx/CVE-2024-6881.json) (`2024-08-08T20:24:41.957`)
- [CVE-2024-6890](CVE-2024/CVE-2024-68xx/CVE-2024-6890.json) (`2024-08-08T20:53:15.917`)
- [CVE-2024-6891](CVE-2024/CVE-2024-68xx/CVE-2024-6891.json) (`2024-08-08T20:53:26.090`)
- [CVE-2024-6893](CVE-2024/CVE-2024-68xx/CVE-2024-6893.json) (`2024-08-08T20:53:37.443`)
- [CVE-2024-6896](CVE-2024/CVE-2024-68xx/CVE-2024-6896.json) (`2024-08-08T20:06:25.957`)
- [CVE-2024-6930](CVE-2024/CVE-2024-69xx/CVE-2024-6930.json) (`2024-08-08T20:06:49.207`)
- [CVE-2024-7276](CVE-2024/CVE-2024-72xx/CVE-2024-7276.json) (`2024-08-08T20:25:32.643`)
- [CVE-2024-7277](CVE-2024/CVE-2024-72xx/CVE-2024-7277.json) (`2024-08-08T20:07:38.717`)
- [CVE-2024-7278](CVE-2024/CVE-2024-72xx/CVE-2024-7278.json) (`2024-08-08T20:07:50.303`)
- [CVE-2024-7535](CVE-2024/CVE-2024-75xx/CVE-2024-7535.json) (`2024-08-08T20:35:12.890`)
- [CVE-2024-7582](CVE-2024/CVE-2024-75xx/CVE-2024-7582.json) (`2024-08-08T20:55:07.530`)
- [CVE-2024-7583](CVE-2024/CVE-2024-75xx/CVE-2024-7583.json) (`2024-08-08T20:54:35.117`)
## Download and Usage

View File

@ -102522,7 +102522,7 @@ CVE-2017-20187,0,0,439daba23cb231bf9a3a05cf84608ee08920e004d7fa3d5d3a05b0063643f
CVE-2017-20188,0,0,329272b92a1630954b6e2d9259a2b0f82ef555ab5ce6524e8e685ef56f14514b,2024-05-17T01:17:26.920000
CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4dbdb,2024-01-30T23:01:53.763000
CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000
CVE-2017-20190,0,1,ab9ad5d427f26f97e2dff21ada3d7b6e713ef510acb60c8447bdbfe0a1feac80,2024-08-08T19:35:01.580000
CVE-2017-20190,0,0,ab9ad5d427f26f97e2dff21ada3d7b6e713ef510acb60c8447bdbfe0a1feac80,2024-08-08T19:35:01.580000
CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
@ -137362,7 +137362,7 @@ CVE-2019-20467,0,0,a262a0da4323f751e5d424d90d285d640c26baf67cd9492208f20dcec2dfc
CVE-2019-20468,0,0,81a3f4066c0e84ff04bb0b3f5d44c494876099fcd7f5f9297dd99b26595d1c66,2024-07-30T01:15:11.007000
CVE-2019-2047,0,0,39d6e243b2ff476db07be9e4ffba0368a9d218b4b325be13c9a06ebb9014f3f9,2021-07-21T11:39:23.747000
CVE-2019-20470,0,0,2ad6e14fc14d0d07898b470e5757da49945753375935430bd6841ab8e0d5cf44,2024-08-01T13:41:55.777000
CVE-2019-20471,0,1,fde34218ba841754bf23da4de58005edc9af4877a76211d340d30c961207f95e,2024-08-08T18:35:00.500000
CVE-2019-20471,0,0,fde34218ba841754bf23da4de58005edc9af4877a76211d340d30c961207f95e,2024-08-08T18:35:00.500000
CVE-2019-20473,0,0,e481ac0c66e05ab3e1b4fe31fd83e18f1a11bac975a85144bc7bb11874c7bc9c,2024-08-01T13:41:56.617000
CVE-2019-20474,0,0,57e2b48ce5d539e18ac2d72bce93e92561ab9a40d2accc1b68949e376410c01b,2022-01-01T19:54:56.077000
CVE-2019-20477,0,0,980075eba63e1b6dba87305a73c4446e3d265aa1cc0ce387abc09a4c8d026438,2023-11-07T03:09:10.187000
@ -217762,9 +217762,9 @@ CVE-2023-24058,0,0,16a1b8d2c8f6e9521afc5ad7d9e751bc2a2f51cc265db69a156ca23c3660b
CVE-2023-24059,0,0,85c8b3c7e51d4493812abc1130db36e5e554ca89f20febe06dc7c3c22cd7b3bb,2023-02-07T14:19:00.787000
CVE-2023-2406,0,0,93360eeb7d23c99f5e3d8592b06b8d380a992d1764480465d68abc46a85ae39a,2023-11-07T04:12:36.890000
CVE-2023-24060,0,0,237020e686b9d1fc77a983ae9b232c7b16e133620015d99d897981c2e94f39f4,2023-02-07T19:13:09.287000
CVE-2023-24062,1,1,b16090863b472492372cda3ae7019b52dfc5904f2b44c6c14a1599575befa353,2024-08-08T18:55:19.180000
CVE-2023-24063,1,1,4986cda0d209054631e4bccd3328891392bae09870f133621a7fd030be12ff42,2024-08-08T18:55:19.180000
CVE-2023-24064,1,1,4b8ebaa7b5be0eaddc0d5fd65ac0188284654ea2367d024767f3154a9f52f1dd,2024-08-08T18:55:19.180000
CVE-2023-24062,0,0,b16090863b472492372cda3ae7019b52dfc5904f2b44c6c14a1599575befa353,2024-08-08T18:55:19.180000
CVE-2023-24063,0,0,4986cda0d209054631e4bccd3328891392bae09870f133621a7fd030be12ff42,2024-08-08T18:55:19.180000
CVE-2023-24064,0,0,4b8ebaa7b5be0eaddc0d5fd65ac0188284654ea2367d024767f3154a9f52f1dd,2024-08-08T18:55:19.180000
CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000
CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000
CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000
@ -220903,7 +220903,7 @@ CVE-2023-28070,0,0,6b06dac3e6645bdcdf2daa8669376f0eb71633f1db849c20838f9de3974a9
CVE-2023-28071,0,0,ac8ad066b4568a2740ef70c8b83380502d2da7385bb0318b9932a819e6b4c283,2023-06-30T21:17:54.033000
CVE-2023-28072,0,0,890c8c3e435d94e75601ba5f3f01cc951f80d11c3fba8ba23584cdbf9590ee73,2023-09-08T13:58:40.990000
CVE-2023-28073,0,0,c0805fe755dae08afe34203444849dc743ef82b285490ed67a8b997664d73c67,2023-06-30T21:17:26.547000
CVE-2023-28074,0,0,d519b22ca8dce85f07cae30100aef96e070a92674e934608d318c9f5a4496762,2024-07-31T12:57:02.300000
CVE-2023-28074,0,1,fb916d5c720bb63452b933abdb318f183ce9654f08dc928dceaa476158bdcf30,2024-08-08T21:14:12.313000
CVE-2023-28075,0,0,263fb4056eae49bf0d178dd7eda3048b6eedb73f77bd02c9854e350cf9c199f0,2023-08-22T22:11:00.903000
CVE-2023-28076,0,0,49f73a0b782d30b42b8832cdfd6102bec5b80abbc6c6645b8949d1e69a2e7e37,2023-05-25T18:55:37.740000
CVE-2023-28077,0,0,864f1d99379daf3c5d006eb293792bffe251fd714ed14e7eec5fb2504cc09dd7,2024-02-15T18:40:41.303000
@ -221671,7 +221671,7 @@ CVE-2023-2886,0,0,477489445a6f471cd3651b117fbf09416c16a3d7a4e7e46e8dd7486e10c87d
CVE-2023-28862,0,0,1af0d4a2a1f54e0c65748ae11dcf6c8d306e7ce5050f714cb8bd21304ffd2ff4,2023-07-14T13:15:09.167000
CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000
CVE-2023-28864,0,0,324e76b8a1dbbfe673722acba31555a0a11e3e449df86950e1771c91d26b1827,2023-07-27T03:47:50.647000
CVE-2023-28865,1,1,a690f96d4d055e488f88d43d5f0e459124e94286062b0ad973c4e339764814fa,2024-08-08T18:55:19.180000
CVE-2023-28865,0,1,443490698e50f8055a614407ce75b775567b108409a252296d899886b81d1390,2024-08-08T20:35:00.890000
CVE-2023-28866,0,0,943391c7b240adde0202bacb48afef5edfa2b7d2d32f1761a9ddbf651b944ce4,2023-11-07T04:10:55.740000
CVE-2023-28867,0,0,318a66eaa8452f89942f53703d11d40849d2cc65087bebb0348dcf4f3572c7cb,2023-04-03T14:01:07.433000
CVE-2023-28868,0,0,e275a03d8640a97b2d96fd845bc40f2c87b07888c0c512aa8d3aec81f7c1a577,2023-12-12T22:35:26.717000
@ -224966,7 +224966,7 @@ CVE-2023-33201,0,0,2597fe221e1f761d6b3e6cbfd030eadf4704e1547f552dc061c463420a08a
CVE-2023-33202,0,0,e7e7f7c9ba650dcbf0171405662b00bcdfd5e41c4d322835f858a2d745b8a7ec,2024-01-25T14:15:25.783000
CVE-2023-33203,0,0,cf97be42175c0d354e6941d64dd260b17cae783a76d09f7b56e470976d97a999,2023-05-26T16:52:01.157000
CVE-2023-33204,0,0,6e4260f72baf73d6ea1ccb7950395df7ee85b3280176ec814ba5c18c1ed8d5f6,2023-11-07T04:14:46.243000
CVE-2023-33206,1,1,8012d772113aa4efeb69b677c5c4507cd8b12aafc03328abda41a85d63486c43,2024-08-08T18:55:19.180000
CVE-2023-33206,0,0,8012d772113aa4efeb69b677c5c4507cd8b12aafc03328abda41a85d63486c43,2024-08-08T18:55:19.180000
CVE-2023-33207,0,0,db833585ca058f88a52ecdd20945cb37b2537bb7bd89e56de798e340453ba00b,2023-11-16T23:42:11.750000
CVE-2023-33208,0,0,452d00abc7c8385efc2c332f0818f4d3115f3a0e717b56374cce97c1d1eaf069,2023-08-31T18:40:52.317000
CVE-2023-33209,0,0,d8369996175c8373d5bfa6cb0ed4b69f08c78793d48f6b2cda42411d5f915879,2023-12-26T21:36:15.107000
@ -230179,7 +230179,7 @@ CVE-2023-40254,0,0,27efb0368168d79caa00b4133031d8fb68b34ecfd132b042a5961f412575e
CVE-2023-40256,0,0,b582804fa33a295156ceb4267c834e483bb86e84c99d0ec7c8c39444912512fe,2023-08-18T18:40:02.253000
CVE-2023-4026,0,0,3212945c551dc5c1719d7d6137de0348751110a933425a5bf5f780d8b6cb15ce,2023-11-07T04:22:03.850000
CVE-2023-40260,0,0,05bb0576fb08380ea903522d60f06a904bc360b72ae4772cbb05cfc33464fa32,2023-09-20T21:15:11.697000
CVE-2023-40261,1,1,d8ec471e8c2b753f37616258061af933cdc1f0280e07e09bd8a2fae39bb2c84d,2024-08-08T18:55:19.180000
CVE-2023-40261,0,0,d8ec471e8c2b753f37616258061af933cdc1f0280e07e09bd8a2fae39bb2c84d,2024-08-08T18:55:19.180000
CVE-2023-40262,0,0,d58d63bce35087dda362e1111aeac9b1b75c4bd8ea1442d999e9a4301c6860b7,2024-02-15T04:33:52.467000
CVE-2023-40263,0,0,5624dd31a999eb07813388b5a3ed101dece0ae7506f50c2ff15d5500eaaece55,2024-02-15T04:33:23.013000
CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6af0,2024-02-16T20:56:44.780000
@ -236327,7 +236327,7 @@ CVE-2023-48893,0,0,5043ec8dc2f1768fadeb39d099a00fdee7291c475c685e34a7d4cf80fe0e4
CVE-2023-48894,0,0,a8ac6b0e77117c087418b4211860ce42b56dfbcebdd512bfef2c5168662c0ee4,2023-12-06T18:48:22.700000
CVE-2023-4890,0,0,a20402f4d56a9a3e121227aa9e4a1781edc3cee12ae92ab661db6592110635ab,2023-11-07T04:23:08.510000
CVE-2023-48901,0,0,531f6d3614843d157a3c9dc6e101bfcf96a5f8efa37d961dda35dcbf99be2006,2024-08-06T17:35:02.180000
CVE-2023-48902,0,1,e66dc38bb79946c160d1da0897afd2ba808308e6cfda5fb4cfee782308be2c46,2024-08-08T19:35:03.727000
CVE-2023-48902,0,0,e66dc38bb79946c160d1da0897afd2ba808308e6cfda5fb4cfee782308be2c46,2024-08-08T19:35:03.727000
CVE-2023-48903,0,0,c36eea55d7ebb58b6550658aa069864d729af997931b2f0f1cd8f0bd7c2c2e23,2024-08-05T14:35:02.280000
CVE-2023-48906,0,0,dcf61e4baeea39a70a46cf16ef25f7d94c12ff2d2949997b5a61f61056a26263,2024-04-02T12:50:42.233000
CVE-2023-48909,0,0,6e26fded8220754411f0b0c0969e60ad89d13528c1e447cb4c30f373b2f2fd1f,2024-01-22T16:33:28.663000
@ -236743,7 +236743,7 @@ CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39
CVE-2023-49545,0,0,2026852fe298b5835ad85e1eea0f18e4689a742c4986c111d1c98765d7287b86,2024-03-01T22:22:25.913000
CVE-2023-49546,0,0,42c4c73e286dbbc54bb4d1edee710426f74da9660183ef38c8db0ddb322c4c0d,2024-03-05T13:41:01.900000
CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000
CVE-2023-49548,0,0,a5babf6cfe0f4495a0403c5e873aa9de10bd174fa5a7dce561b73f9ae2fa5fce,2024-03-05T13:41:01.900000
CVE-2023-49548,0,1,34b77376d27ee723d3ac14898631fa76b657dfe4cf5b3276c3299d37e41dd1fc,2024-08-08T20:35:02.323000
CVE-2023-49549,0,0,2421b127f456be0fc67abfad0a3b1f8926786d5d65fc8c1f3d22621b1f55fe3e,2024-01-09T16:18:48.520000
CVE-2023-49550,0,0,7ae937633cac81d402082fd3accd1e23add1012de733df462c7764bee6d5f1af,2024-01-05T23:53:00.187000
CVE-2023-49551,0,0,c39928dbbcafcc495be1d779471454ab022468143dcd2570ffe92db6608ec687,2024-01-05T23:53:48.113000
@ -240971,12 +240971,12 @@ CVE-2024-0097,0,0,828e0d6edaac74d80e85e7cd248c4487f7d9ed2e02d8d361934a62f860a855
CVE-2024-0098,0,0,069a5c23019341513ba5e45eb7cd80085fa3c5305327bc38e3233b2410f520d3,2024-05-14T16:13:02.773000
CVE-2024-0099,0,0,a353a072382bc9c8f100deeb43f065f1ec38735a442f0652f39ff4a5b9a341a3,2024-06-17T12:43:31.090000
CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fdca,2024-05-14T16:13:02.773000
CVE-2024-0101,0,1,e05385cc33ee9826ecfb9b850d6c047d48e9cbc40731cddfee9987a45953dd02,2024-08-08T18:55:19.180000
CVE-2024-0102,0,1,9281c0dd21fa4a6ba10451d2ce8db4dc465e5b0d2d5ede46729e28d1c30e2d60,2024-08-08T18:55:19.180000
CVE-2024-0101,0,0,e05385cc33ee9826ecfb9b850d6c047d48e9cbc40731cddfee9987a45953dd02,2024-08-08T18:55:19.180000
CVE-2024-0102,0,0,9281c0dd21fa4a6ba10451d2ce8db4dc465e5b0d2d5ede46729e28d1c30e2d60,2024-08-08T18:55:19.180000
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
CVE-2024-0104,1,1,d8bcd6e809d941165bede9e7513dc9cd703b11fdc2885a0daf273de4ae59c1c4,2024-08-08T18:55:19.180000
CVE-2024-0107,0,1,04e059eed29d1073bf6cbd89ce6e56260688f648aed9825b306f4fe58b9fe238,2024-08-08T18:55:19.180000
CVE-2024-0108,0,1,cca1e739954a9a1fd809df6166e99578c9bee5616f50180f0b07bead1a8c898a,2024-08-08T18:55:19.180000
CVE-2024-0104,0,0,d8bcd6e809d941165bede9e7513dc9cd703b11fdc2885a0daf273de4ae59c1c4,2024-08-08T18:55:19.180000
CVE-2024-0107,0,0,04e059eed29d1073bf6cbd89ce6e56260688f648aed9825b306f4fe58b9fe238,2024-08-08T18:55:19.180000
CVE-2024-0108,0,0,cca1e739954a9a1fd809df6166e99578c9bee5616f50180f0b07bead1a8c898a,2024-08-08T18:55:19.180000
CVE-2024-0151,0,0,76f8e609c18c3e1a4007c23b03249fd06e27f5de1d5adec60540b40f497459b7,2024-04-25T08:15:07.420000
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
@ -241168,7 +241168,7 @@ CVE-2024-0361,0,0,099f63dfe6ef6f045795d1c1f261ce3442f12eb2a9bc4fc8d1a0c0a4910340
CVE-2024-0362,0,0,b4244f5075182d36857a3d31f46901793e11476ad07b4e06f8aa7550902287ca,2024-05-17T02:34:34.077000
CVE-2024-0363,0,0,dc140b84d2b93f6d9fdb2135224ba7c6f1b0866e706ccd94a1520e115fe4f69e,2024-05-17T02:34:34.177000
CVE-2024-0364,0,0,89e81c51b97b3fa4977f0ceaa750e44461eb89bdab95c05a0962bfc35bfa9a80,2024-05-17T02:34:34.293000
CVE-2024-0365,0,0,be5db27a60990b71ca41a71ffa3ace09ff439529674023f370d970a475bf4320,2024-03-18T19:40:00.173000
CVE-2024-0365,0,1,90be84835231633c01fdbdc876383664ba6ce46c7c856e07d298328ab29391a3,2024-08-08T21:35:01.163000
CVE-2024-0366,0,0,9291345e89d8d8b05bbeff5e5d3ebc279878f08bb5528e59c3e3169a28037632,2024-02-13T17:05:59.177000
CVE-2024-0367,0,0,072086e2f5c88d722f88e09d99efa680e87c902d14e82a03ad0dc0bb1177679a,2024-04-01T01:12:59.077000
CVE-2024-0368,0,0,7857fb18cfdffa3549d28d2c09e616003fba3c5a7bd3e57424dbda35ce87f07d,2024-03-13T18:16:18.563000
@ -241629,7 +241629,7 @@ CVE-2024-0849,0,0,ce52f8a887fecf568efe799909be263408438f15742acffd08ea3233d3bef3
CVE-2024-0851,0,0,f71017226a428253d7e6f7557fb0ae0457b9beec038f9e66758c71c8032e7938,2024-05-28T12:39:28.377000
CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b72,2024-05-03T13:15:21.320000
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
CVE-2024-0855,0,0,d6a852138d81a2f1a5b951678ed9f076f0450cdd1094ad4d8554eefd8ccce592,2024-02-27T14:20:06.637000
CVE-2024-0855,0,1,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
CVE-2024-0856,0,0,57dcbb77f49261c559595393dec7218c8ffe17fa18f8a7a2f49fba5a38e340b4,2024-08-05T19:35:01.477000
CVE-2024-0857,0,0,eb17afdc7dc1bf92b321f990519fddd6b2895b42e203d3876b1bb54222e90b64,2024-07-22T09:15:04.457000
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
@ -242631,7 +242631,7 @@ CVE-2024-1932,0,0,2d36cde105fc296303955f0190d0c15735ef44ac96e1b6b85b1708703d6ff7
CVE-2024-1933,0,0,7fbc0f24622f50a410caa37f8d4d0022d31f3ba694aaa208855480ee88f0fabb,2024-03-26T17:09:53.043000
CVE-2024-1934,0,0,df6bc0820efaa227ff0593f2f377a2941dbe3870867c525b59689743a10c0b3a,2024-04-10T13:23:38.787000
CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da56b,2024-03-13T18:15:58.530000
CVE-2024-1936,0,0,b663fea20770354eab8754ae6925549962e39174687f5155b204d5fec65f6ae3,2024-03-23T12:15:08.453000
CVE-2024-1936,0,1,3c4877f8a7a72f4b22538c5fabddaf31798256327c12415bddcc418bc5a6e33c,2024-08-08T21:35:03.480000
CVE-2024-1937,0,0,7a30bc166390d821e1f1e23579a9b82c6e7a58933428574c00dfd39409fe3c39,2024-07-16T13:43:58.773000
CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000
CVE-2024-1939,0,0,bb8e8d14c3c98da37e63f3c0963deaed3de9feadfccc15528efb01aca2c53754,2024-03-07T23:15:07.250000
@ -242991,7 +242991,7 @@ CVE-2024-20698,0,0,a60010c037f6b47d92f2aa100f7d8a53d79be2eb5769a2c8e9d02ceb6254a
CVE-2024-20699,0,0,bbde4aa236aa5bd1aaf9161e47fb1a1aee0558a0b300c08e5e21499a50eacae3,2024-06-11T15:15:58.073000
CVE-2024-2070,0,0,5d32ea05e6f2f66047d01700931546aa730f575dbd8fb6cf9e3d97d558acf9d7,2024-05-17T02:38:01.770000
CVE-2024-20700,0,0,48c4885aac74f6e4a736d19a626247228a5eb1d7955c526892b2cec51e0346df,2024-05-29T00:15:16.493000
CVE-2024-20701,0,1,80320ca61fab502542e730745151e818c2a19100ed46caffbb8a3cda6ff93522,2024-08-08T18:50:27.110000
CVE-2024-20701,0,0,80320ca61fab502542e730745151e818c2a19100ed46caffbb8a3cda6ff93522,2024-08-08T18:50:27.110000
CVE-2024-20709,0,0,cfe59cb3498fcb40cb3ff855c0f48bc1a0141b54054cb56a4ea6efd6294dc34c,2024-01-23T19:28:38.997000
CVE-2024-2071,0,0,694e18ae25b2b51379d53ff5f9db1f2ed56a6e502a066bf83b179959b5ef82d4,2024-05-17T02:38:01.863000
CVE-2024-20710,0,0,a31e0c272fde0903cb50f7f7397256d7cb7e241ae25eb1c9f7898bc928ac22b9,2024-01-12T19:14:08.107000
@ -243662,7 +243662,7 @@ CVE-2024-21445,0,0,1e9644529a4c09a7e7b867fd24131ae695337874b20e05fc2c8f29a74f020
CVE-2024-21446,0,0,d91af89ff77312fee55a3cb5f9839f37302d10ad728d89077b6cfd938f9718c3,2024-04-11T20:15:32.857000
CVE-2024-21447,0,0,bcb33d59d4cc54b7944f70b43838b78d2de28c13052766332282f9f8eec5b1e5,2024-04-10T13:24:00.070000
CVE-2024-21448,0,0,40142b83431d484ca38acbb788d7523f2721d5755a5a237be8e19334b7e92f0f,2024-05-29T00:15:36.470000
CVE-2024-21449,0,1,fff61c3bafc8b68912dea981e752397a37789f3c781b7739d1962849387eb766,2024-08-08T18:50:39.357000
CVE-2024-21449,0,0,fff61c3bafc8b68912dea981e752397a37789f3c781b7739d1962849387eb766,2024-08-08T18:50:39.357000
CVE-2024-2145,0,0,827ab96169cf8c47e9ce401a991ae891b3ddee0c4e3c5089f0bba0550e86a7e8,2024-05-17T02:38:04.100000
CVE-2024-21450,0,0,25401a86ed4cf6aee58f7dc7ff8bede6f2584b071ad1edcb27bf966a0a91c76a,2024-04-11T20:15:33.050000
CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e67982f,2024-04-11T20:15:33.143000
@ -243886,7 +243886,7 @@ CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fc
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
CVE-2024-21759,0,0,6a61d7cb7523f60aeda71efe4ce4dc64f1500a7a1399f02108eff6d901e5e1da,2024-07-09T18:18:38.713000
CVE-2024-2176,0,0,80131f1514b7a218cc14dd21be1865574c1fb2c805a5c149607a3b649fcc6e78,2024-03-23T03:15:12.287000
CVE-2024-2176,0,1,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000
CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000
CVE-2024-21762,0,0,84db6239690371b7c5c10ef720dbcf2d622d5440e87b70d1c21a79a857f8ea72,2024-02-13T18:21:14.607000
CVE-2024-21763,0,0,d8d7d7a6603289e83c84acd8db83028421c70629bc8061b793ed05808f5d1ea3,2024-02-14T18:04:45.380000
@ -245427,7 +245427,7 @@ CVE-2024-24093,0,0,14e5230c16c4af460c68647fa9203bde6e56c21bc1a3208cb017e8bb36864
CVE-2024-24095,0,0,a293063a01db5092273515cc6c1fbe86e89299406200e6a2f03c1a4a2a21fbc6,2024-02-27T14:20:06.637000
CVE-2024-24096,0,0,be98bfd34c594b5bc2f148848abf51a12eec4301e64123b58bf793ff254827e3,2024-02-27T14:20:06.637000
CVE-2024-24097,0,0,fac0898f527625e2c3336ba1bc4bf6bd2a8e244bb9d5499d446769299fde892b,2024-03-13T12:33:51.697000
CVE-2024-24098,0,0,36510a74f62db63a0ffc70ed1efd3598f57e18ba47f3733d4bd46b587c041333,2024-03-05T18:50:18.333000
CVE-2024-24098,0,1,e685e688e8d421091dd6b9de1a2931d14c9c45e1d20db0290f58fd035af8ce09,2024-08-08T21:35:04.617000
CVE-2024-24099,0,0,106424d5dd252a8067092f196ee1623013d2ca7ff4d8cbd94321c3cf9db85cbc,2024-02-27T14:20:06.637000
CVE-2024-2410,0,0,83127872af9993e0cf76f9668e41f5f9f61d019a9eb5dfde8649175f2ae3af10,2024-05-03T14:17:53.690000
CVE-2024-24100,0,0,dd6222af6668a38ef11cef8691c924d234988a8adb5d83e51c4cd77b6952005e,2024-02-27T14:20:06.637000
@ -245517,7 +245517,7 @@ CVE-2024-24301,0,0,09fef4ec6b3f7e08d0238c798debb077539e76e61034c99c0f3a3241209eb
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
CVE-2024-24303,0,0,1b8ff87407101e3ade8b623ffad8ec7905f9dec8c0366ab6b55ba0460b0fea60,2024-02-14T19:38:18.727000
CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000
CVE-2024-24307,0,1,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000
CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000
CVE-2024-24308,0,0,1c7b217f4d07f1cef0d4c8802d8e004cd219229214920fa463f6f25f09db8557,2024-02-15T19:34:49.943000
CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000
CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000
@ -245569,7 +245569,7 @@ CVE-2024-24407,0,0,544874ccd7bf190605b1eed09e8dcc374c7eae5526ea68f4038bca85f79c4
CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000
CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000
CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000
CVE-2024-2444,0,0,e31eeadc09066c1dc3e9c8bff5535c580671ecbf75102f0d9cdc50af45578df2,2024-04-08T18:49:25.863000
CVE-2024-2444,0,1,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000
CVE-2024-2446,0,0,ef51f957632ec98e360c50fa0db196c0f3cfe0183f1093005f40b796022ec810,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c74ac,2024-02-07T22:03:09.897000
@ -246432,7 +246432,7 @@ CVE-2024-25807,0,0,842f9a5e9e10408e46e0a439e695cbb579bc0c4b444593c08bc5ab70315f1
CVE-2024-25808,0,0,56823cb1538bf83b266e824a90333c1b7a15dc68defca54aafe7f2be4923b4ee,2024-03-22T12:45:36.130000
CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000
CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000
CVE-2024-25817,0,0,9751936b38e23682bc0a4e2248c7e3d318b471c4b00ba97b7b3e641f5178af1a,2024-03-06T15:18:08.093000
CVE-2024-25817,0,1,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000
CVE-2024-25828,0,0,b9208d07acefc5f8bb86b1c0a1d3e2fb74dd5ed4c91b559369b12aa7bea3504d,2024-02-22T19:07:27.197000
CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000
CVE-2024-25830,0,0,bac0044490e1e709c15b4ae97f78c483fec5c64b2ded09434a42484853de56a5,2024-02-29T13:49:29.390000
@ -246447,7 +246447,7 @@ CVE-2024-25842,0,0,736e250418b11146265cf45361dced64a8491e4f350e928a460a06d6e9546
CVE-2024-25843,0,0,b7ce35c602cb66544422a9541b1ca352e3e23db5766bb19933b8ddd232d2536b,2024-02-28T14:06:45.783000
CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c127b,2024-03-04T13:58:23.447000
CVE-2024-25845,0,0,951e74ea3ea891e8023acd490009fca43f510ba7102419911edb4e33d96aa8f4,2024-03-08T14:02:57.420000
CVE-2024-25846,0,0,f1629990334a4370d4e99576c944221d6f6d0ee63890f8ef9c099f5169b53262,2024-02-28T14:06:45.783000
CVE-2024-25846,0,1,1b01ded1319f85d0e1b31b4bad3147fa711a456779b7a8a2cc484b2fe23c37c9,2024-08-08T20:35:05.147000
CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
@ -246849,7 +246849,7 @@ CVE-2024-26266,0,0,cd4c3538fa5abe1895c4c4433d10b2216b10f5bef416f2e6936da725b6d98
CVE-2024-26267,0,0,526b093bece853e53698efa67210e9eb2a6f80299ca5ca39b60b96f837bf6a69,2024-02-20T19:50:53.960000
CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93cc1f,2024-02-20T19:50:53.960000
CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000
CVE-2024-2627,0,0,b690bc68352335233b064e5aa3eff2ebfe4278b3ba8da6585574ab5de091cbd9,2024-04-01T15:22:56.233000
CVE-2024-2627,0,1,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000
CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000
CVE-2024-26275,0,0,21e67c06e24d408ad1a549f766b54f5dfd1b4842df576d827b739e2a28d49505,2024-06-11T12:15:14.017000
CVE-2024-26276,0,0,7406f6551c3634363606a828a01f36a4203616ca4676532db244783183501388,2024-06-11T12:15:14.153000
@ -247275,7 +247275,7 @@ CVE-2024-26849,0,0,25376421f8e268085706cb9a45ce988a2ed5db66e27372f0da148d22949e9
CVE-2024-2685,0,0,f0d9422c947d37e56aa28ba2337c0cc54722ca03a7f38746070a195f54e41bf1,2024-05-17T02:38:25.380000
CVE-2024-26850,0,0,00873ff9f8e756bee297702b0ccb8c4cb86947a18a9f440307dec32d2671e27c,2024-04-17T12:48:07.510000
CVE-2024-26851,0,0,db15a16c2aaa5df1966c0d1fc1201f533eed60aedce750b1fd551ab9bdc5ed3e,2024-06-27T13:15:56.800000
CVE-2024-26852,0,1,f16b4b6a26c173280cdf4127a7f9df17c3c84e7730b4a7576c1fcabfce595e92,2024-08-08T19:35:11.773000
CVE-2024-26852,0,0,f16b4b6a26c173280cdf4127a7f9df17c3c84e7730b4a7576c1fcabfce595e92,2024-08-08T19:35:11.773000
CVE-2024-26853,0,0,827c2cb8caefeecde1c32072d63c4255951fe7e076c638214179f90ffb2959fb,2024-04-17T12:48:07.510000
CVE-2024-26854,0,0,71382c729dcbfb61122fea21c2172ded949fa87a0f12accbe08dbcfd7b75a577,2024-07-03T01:49:55.907000
CVE-2024-26855,0,0,e888087f68858cd8e18a3fb9ad8ef9b69bd71878372dd5f633aa7569383e87f8,2024-06-25T22:15:24.110000
@ -247300,7 +247300,7 @@ CVE-2024-26871,0,0,163b20ef3bcb237a106dee1f35f93c51d1f8bd86dcab5270708465faef3c0
CVE-2024-26872,0,0,e1be30e0f1b63fecb16069be5a8c042987bcba62c1848ca23e7ab104e4ef6a99,2024-06-25T22:15:24.450000
CVE-2024-26873,0,0,3a3877364dd5fcf82056d7626734c3d2cb4100f26dd0fb338b1cc2ce0a4b26cc,2024-04-17T12:48:07.510000
CVE-2024-26874,0,0,d4a2e66139b6c5571ffb5ddc01a62942368f4cbaf11ad33866910988dca15e98,2024-06-27T13:15:56.957000
CVE-2024-26875,0,1,776f032242ac1e7add152fd2be17e01c5c12995fa4d824d950364492e82d131a,2024-08-08T19:35:13.037000
CVE-2024-26875,0,0,776f032242ac1e7add152fd2be17e01c5c12995fa4d824d950364492e82d131a,2024-08-08T19:35:13.037000
CVE-2024-26876,0,0,87a49be69760f9088fe2bba4db9cde6d323af69b323688fc0bb6fc1e935e16b5,2024-04-17T12:48:07.510000
CVE-2024-26877,0,0,7b5237ee65908468f328c7475b98e7a4207eb826410a8157a34c13278e5cb653,2024-06-25T23:15:26.897000
CVE-2024-26878,0,0,138eb74473aa6d1d3b5705c5c5f6c3f05d9798e9a389f668cd4f717014b9b6e0,2024-06-27T12:15:21.783000
@ -247335,7 +247335,7 @@ CVE-2024-26903,0,0,02f8db8e283ea09bbfc4f021b4a46017f09af264e6504d48377e1408e0255
CVE-2024-26904,0,0,465375d12896d369ba32f0f5a9c1b1a82fd461e229bd66d68713d6d3b21eb08e,2024-05-21T07:15:08.260000
CVE-2024-26905,0,0,3a7eec9b90564e2a68e23468690a383dcd20d922935be237a30b806b26ccb711,2024-07-29T13:15:10.593000
CVE-2024-26906,0,0,42532862975f8bdf6c218bb08e8c76f0bdeb5f292a8c20c2de1b8755512c9a2b,2024-06-25T22:15:25.877000
CVE-2024-26907,0,1,446b7fe6bd3521bdad8e0df3b9aa51c6dd91773148f15c64fb12a798e319ec1b,2024-08-08T18:35:02.500000
CVE-2024-26907,0,0,446b7fe6bd3521bdad8e0df3b9aa51c6dd91773148f15c64fb12a798e319ec1b,2024-08-08T18:35:02.500000
CVE-2024-26908,0,0,5ecc683879bcc08f4a65e6b0675afebd2da7cfed4f9fada740f88a540c7f8b1e,2024-04-30T08:15:17.140000
CVE-2024-26909,0,0,e3d7941f07403bc0745f4894278d17e22a07c87692715dac5395fbc71a84fef3,2024-04-29T19:45:21.680000
CVE-2024-2691,0,0,1606e90bf9d34cf5f4f3495983392fa55577ead311870fa1dbee6afe3a0927f6,2024-08-07T22:20:28.833000
@ -247959,7 +247959,7 @@ CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6a
CVE-2024-27680,0,0,7dbacde6159cf116347148af7decce95acf3333fb08b589a9a3c4e3e2bf44c68,2024-03-04T15:35:25.673000
CVE-2024-27683,0,0,6945b3b4a0f16e3d60bedd1efd7fcebd9cc07ccdf5e7c69a6139d72e53300ecb,2024-04-11T12:47:44.137000
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
CVE-2024-27689,0,0,11845b441e345ffe2a02d29a5898e538521f40614419a365535fc9204302e936,2024-03-01T22:22:25.913000
CVE-2024-27689,0,1,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
CVE-2024-2769,0,0,4ce409110b7519da5af6e8ebe0cc3e53d83319a867f728e76ce04b1f4c62c385,2024-05-17T02:38:29.300000
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7df4,2024-08-01T13:48:43.923000
@ -248285,7 +248285,7 @@ CVE-2024-28095,0,0,1b7acaa11106b6d74288d818dfca388e6351fd1c0dbffb28e0398973e1fb6
CVE-2024-28096,0,0,679332b852b198a191524d7939debd10043967e93fcdf797223e7b95817f3c6f,2024-03-07T13:52:27.110000
CVE-2024-28097,0,0,1e714ff081f75be1b3ee22b5d36486d5d25c1e1c2a12f4c3670fc60e11795587,2024-03-07T13:52:27.110000
CVE-2024-28098,0,0,a3390b45f79ac863f2a20b2c3ada499f63a8ad935bf5543c4181b41c5c888248,2024-05-01T17:15:30.747000
CVE-2024-28099,0,0,2eeb676082f4a3c3e95bcb4d3b30606433f80b064cf3a29df975f2b8d61d4757,2024-04-15T13:15:31.997000
CVE-2024-28099,0,1,8f1689aeaa10ea090718a334cb7e59baeb2881501c10cf07896051b5dcb601cc,2024-08-08T20:35:06.277000
CVE-2024-2810,0,0,a6138bc48d0ad782bdb60e8557544808b5ef91a2fc4ce0cda3b3c53204635cd7,2024-05-17T02:38:31.447000
CVE-2024-28101,0,0,a1f8d89ff6e2fe4f9ee7b88d676867a71496a3d21b3393b755ab9f1348fee98d,2024-03-21T12:58:51.093000
CVE-2024-28102,0,0,2e25e475353b428725cda7fe0e916bc49ec4c129ea0b8f2f75fa8309f53bf0d3,2024-03-21T12:58:51.093000
@ -249585,7 +249585,7 @@ CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f
CVE-2024-3016,0,0,de2146827057d4173ad33d38353b5e127fb8228c688e81e98737f0f3b35e8a6f,2024-05-14T16:11:39.510000
CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000
CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000
CVE-2024-30163,0,0,39ca1a6132e6e2f204e77b2ff440d28a7ab8af49f5189024790e4d8e4bf99e0f,2024-06-07T19:24:09.243000
CVE-2024-30163,0,1,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000
CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a216,2024-07-03T01:53:52.840000
CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000
CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000
@ -250648,7 +250648,7 @@ CVE-2024-31581,0,0,a8f654e30b255f2c44b72bd4501be7afaa5ed440cafc9227701cc50788da1
CVE-2024-31582,0,0,fdfb7c4e9d820ba8ae8e65d5d2f5939d0226d0aa41883a69840636f401c88641,2024-08-01T13:50:58.913000
CVE-2024-31583,0,0,5718d662ef0fc7a2030b838f396484569e04f36192be74d5dc7dbf12e0d69994,2024-07-03T01:55:12.663000
CVE-2024-31584,0,0,b7635e33f3da4b67c08efe7ab25558c0ee24a2c8974cfc1133472b04b1184049,2024-07-03T01:55:13.417000
CVE-2024-31585,0,0,6cb0e410fe678bb190acc80b7af7851c70055ef5ae189fefbfb679e0627f584d,2024-06-10T18:15:31.457000
CVE-2024-31585,0,1,5643161144c73906727e2ac1f83070a25ed3d1bad45a88038a67c323fd906e8f,2024-08-08T21:35:12.477000
CVE-2024-31586,0,0,cc046b8727829f9f83874539c422d0e794e65c7e2b07e31c08215bcda9684cd0,2024-07-03T01:55:14.213000
CVE-2024-31587,0,0,e3e3d5f1d6645953ce4a8fb52a078b6a9a5bbeded18553c7535d616e20fdfaf1,2024-08-01T13:50:59.700000
CVE-2024-3159,0,0,735e10f02a072f5f58961d071d622cba36c3062fe253c73fecebdca829a10483,2024-04-26T15:59:59.020000
@ -250678,7 +250678,7 @@ CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
CVE-2024-3164,0,0,38bea5ea29fb4ffa7766bbe0beb8807abf0c8d405294ac50c0e82ba1bd904579,2024-07-26T14:15:02.560000
CVE-2024-31648,0,1,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000
CVE-2024-31648,0,0,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000
CVE-2024-31649,0,0,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ecbcc,2024-08-01T13:51:03.573000
CVE-2024-3165,0,0,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab4e,2024-07-26T14:15:02.690000
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
@ -251066,7 +251066,7 @@ CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b844
CVE-2024-32314,0,0,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000
CVE-2024-32315,0,0,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000
CVE-2024-32316,0,0,ffea206eb35e029317458be59cb44b8fa7a1becdd91322b99748836c3f7db1d0,2024-04-17T16:51:07.347000
CVE-2024-32317,0,0,e88627744c10e0bd88f2e1a9f6219d66fa8db0e356bff9f0744b0ba14323e05f,2024-04-17T16:51:07.347000
CVE-2024-32317,0,1,650aa34fc080388d8f2bd6a4a88b6775736a0002394db3f799d9283eb4ac353f,2024-08-08T21:35:13.350000
CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000
CVE-2024-3232,0,0,c59a906ca6c3b26e020d4b33cc77d57f43a342f5b3c4ac255f8439d838cfaba1,2024-07-16T18:00:02.110000
CVE-2024-32320,0,0,ff00070c0799b87b8918f3636a7d891bdc3943256f60475437c9b0e24ed27cf0,2024-07-03T01:56:10.160000
@ -251317,7 +251317,7 @@ CVE-2024-32620,0,0,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9
CVE-2024-32621,0,0,806b79c7ca5f50b9fa1d18f42f83a60186d0b7d94afcd8c845a9bca37bec5584,2024-05-14T16:12:23.490000
CVE-2024-32622,0,0,cf9770a1b9df9f6f1a800e40872a5efcbb4c06250c59cadaf82c9c48d2e3b950,2024-05-14T16:12:23.490000
CVE-2024-32623,0,0,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000
CVE-2024-32624,0,1,86e096c2049d0b80094b488954ab97fce68d8a6249b2af872f018934e88b002d,2024-08-08T18:35:04.250000
CVE-2024-32624,0,0,86e096c2049d0b80094b488954ab97fce68d8a6249b2af872f018934e88b002d,2024-08-08T18:35:04.250000
CVE-2024-32625,0,0,3133aab50841c8a349d70e4488dcb72f990b76173b72979ba8d18b0c9cc689ee,2024-04-16T13:24:07.103000
CVE-2024-3263,0,0,1b4809d44673553ac5c413954bed873a76fa136867c6a54bcec9930ce55e0758,2024-05-14T16:11:39.510000
CVE-2024-32631,0,0,976960b3233145908ee4314174d96ae9dd1a5e40ad826957114103ac5674a3f1,2024-04-16T13:24:07.103000
@ -251525,7 +251525,7 @@ CVE-2024-32853,0,0,a1dca3d4bd42a909fb90bb63c4311872870004374a80c3f2c77a99712953a
CVE-2024-32854,0,0,ca09015aea734c79d590c062091997f16b37e268e9b438da15806fb6d9439330,2024-07-03T17:59:14.203000
CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a10592cf,2024-06-25T12:24:17.873000
CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000
CVE-2024-32857,0,0,ed20271e55d433e86f607295e906a40f62fa167b1723ca128ef11690482d7b99,2024-07-31T12:57:02.300000
CVE-2024-32857,0,1,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196183,2024-08-08T21:10:04.773000
CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000
CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
@ -252059,7 +252059,7 @@ CVE-2024-33766,0,0,e85f175409d802a24c53d0d157ca20d583441fadf5b5134f3403f5dd4531c
CVE-2024-33767,0,0,ff2f0e72bb758b0e28266cb8827bda2c95a9e95708f40257e627c79bc2afc50b,2024-05-01T13:02:20.750000
CVE-2024-33768,0,0,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472142,2024-07-03T01:58:42.057000
CVE-2024-3377,0,0,1510516d64045a935995422c6fdaee7a2e23965b26ec5e4515131d4dcc176720,2024-05-17T02:39:53.543000
CVE-2024-33771,0,1,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000
CVE-2024-33771,0,0,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000
CVE-2024-33772,0,0,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000
CVE-2024-33773,0,0,c7722b551c6505584361864d25c2fc2534d918de5122176041a5bccbc9806e89,2024-05-14T16:12:23.490000
CVE-2024-33774,0,0,22679a5bc336af838f53ff0ea5722076310c1b6e9ebc2465523e59c3ae5cee65,2024-05-14T16:12:23.490000
@ -252199,7 +252199,7 @@ CVE-2024-33955,0,0,74cb745cdb62a336c3f876a0fd00b4b23bbd1044d9dae83da460a24660cf3
CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc712f,2024-05-14T16:12:23.490000
CVE-2024-33957,0,0,09bedb02c8e3dd520e4eb895fb68ee9645dd7844e1b831a24ad6b897c0a3bec8,2024-08-06T16:30:24.547000
CVE-2024-33958,0,0,7a7168ec64302facb7ecafd694509fffebdd99590b2e576ad77919591906e0e2,2024-08-06T16:30:24.547000
CVE-2024-33959,0,0,be6fd7f670b1328bdfc37564b1ac34c10351de104e6269aff09617e3efa74d30,2024-08-06T16:30:24.547000
CVE-2024-33959,0,1,7c0cd3b349dca2c5025b80d137d364d4b069eb5d0a51d215a853a38c247c583c,2024-08-08T21:02:25.943000
CVE-2024-33960,0,0,d17745e604717d53f9bd9a9910346900a87259f527ec070325bfb24c71beb81b,2024-08-06T16:30:24.547000
CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
@ -252386,9 +252386,9 @@ CVE-2024-34211,0,0,a5192c74d8099f66009f8c235170ce7402607dfeb9a20ecc84a2abd2966f6
CVE-2024-34212,0,0,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000
CVE-2024-34213,0,0,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000
CVE-2024-34215,0,0,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000
CVE-2024-34217,0,1,cfbe2d9832ba74b5e1d2777893445ff1d8f4c83519f8611daa643bf8cd2ff987,2024-08-08T19:35:20.870000
CVE-2024-34217,0,0,cfbe2d9832ba74b5e1d2777893445ff1d8f4c83519f8611daa643bf8cd2ff987,2024-08-08T19:35:20.870000
CVE-2024-34218,0,0,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5c0d,2024-07-03T01:59:39.750000
CVE-2024-34219,0,0,ea2eed625c87236c7b8d1af86ba0c138ca23a455600b33f7e7239f3921492efd,2024-05-14T16:12:23.490000
CVE-2024-34219,0,1,e4a328632092998fdaa790d0453e25d1d23aa6d18db916c9ed2e43dfb23e65b7,2024-08-08T21:35:14.163000
CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c2e,2024-05-17T02:39:54.907000
CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000
CVE-2024-34221,0,0,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000
@ -252639,7 +252639,7 @@ CVE-2024-34573,0,0,82ca0b9b260238fc8193bf82f5bea85dcdeb8c8fd722769c69f6849636d7f
CVE-2024-34574,0,0,3e74c1beadff3fd890d2b5da4de2565dbad760d56326afd390946b5e96fda210,2024-05-08T13:15:00.690000
CVE-2024-34575,0,0,393b99ab99d08853751fd9680d36e14a49cd8e34f0aeacbb783a82d97ec9bda1,2024-05-17T18:36:05.263000
CVE-2024-3458,0,0,87e528d305caa39d9a35bfd4c8efb11949cfac496f77400f61f34f91d68ca048,2024-05-17T02:39:57.243000
CVE-2024-34580,0,1,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
CVE-2024-34580,0,0,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
CVE-2024-34582,0,0,3575cd86cb0cd0d60c587b3ff4f175ef56fea26df4e10b66896d0161802b3d28,2024-07-03T02:00:41.190000
CVE-2024-34583,0,0,99a59b61cd99e09dc04b437be3f2aa32c4c55f1e65c2d9d3fcc5d15f08b7b745,2024-07-05T17:12:21.677000
@ -253029,7 +253029,7 @@ CVE-2024-35252,0,0,abc4118fdb4313c77e0013cc66829f0782a05e427a95a903d7de17d02f4f0
CVE-2024-35253,0,0,4860462cf567d507b35b85f1b338fbe5c52fffbd9f14118ce4fe8c63db46011a,2024-06-20T17:13:17.437000
CVE-2024-35254,0,0,45ef78e7aab61785b60639ab749398d66c1fb5a7b87988e5d821011437a5eefa,2024-06-20T16:16:47.070000
CVE-2024-35255,0,0,dd2820217033d300b334ae05889b3c3f413c0da4e96707fa039fcafe96b24ff2,2024-06-20T16:31:46.127000
CVE-2024-35256,0,1,d5a6ae58fc78f0ff4992cb812a54fe658aa14b0129af650e09b305e064058e54,2024-08-08T18:50:56.197000
CVE-2024-35256,0,0,d5a6ae58fc78f0ff4992cb812a54fe658aa14b0129af650e09b305e064058e54,2024-08-08T18:50:56.197000
CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a875,2024-05-17T02:39:59.067000
CVE-2024-35260,0,0,ade48aea1e03059f4c6e4bf7d0aa3b52cede73bf846ea05896b4e57d53575ded,2024-08-02T03:15:50.793000
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
@ -253039,8 +253039,8 @@ CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a6
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
CVE-2024-35271,0,1,cdbfc4395a8e92fe3a40b1fd22607b93e804de72bc708206a369eda6febd9bdc,2024-08-08T18:51:09.090000
CVE-2024-35272,0,1,21cbcac35a76cf2546e4b5eabe4cf122629a8c90c7e6d4aea0ac66e3d7194dea,2024-08-08T18:33:14.440000
CVE-2024-35271,0,0,cdbfc4395a8e92fe3a40b1fd22607b93e804de72bc708206a369eda6febd9bdc,2024-08-08T18:51:09.090000
CVE-2024-35272,0,0,21cbcac35a76cf2546e4b5eabe4cf122629a8c90c7e6d4aea0ac66e3d7194dea,2024-08-08T18:33:14.440000
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
@ -253690,7 +253690,7 @@ CVE-2024-36127,0,0,f67ed99c9205750d87408264109b0b2da12607ef1d07ca1d5849393d1955e
CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5007,2024-06-03T19:23:17.807000
CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000
CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000
CVE-2024-36130,0,0,cec210c004cf679cee4b0e6d9b1e0dcb013d95f34b445ff9ceb4c89ae0c1a99a,2024-08-07T15:17:46.717000
CVE-2024-36130,0,1,5daafc9b00fcf3187b969d628b25e46bf723690d823cf338032886578aaf0fe7,2024-08-08T21:35:14.980000
CVE-2024-36131,0,0,7cbae0360b3625678d44e0c6f79a930cd4bdf2f15198db73385be60dd97ec04f,2024-08-07T15:17:46.717000
CVE-2024-36132,0,0,9fe921c383acfb5b9af18eb69a64ef9c79510768f7b6e88506065e82747a5fdc,2024-08-07T15:17:46.717000
CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000
@ -253997,7 +253997,7 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a
CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000
CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000
CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000
CVE-2024-3659,0,1,2ed718ae28ceb8e4f7d52b0a060fbe45e212746a041da98ae407c89904905fc5,2024-08-08T18:55:28.493000
CVE-2024-3659,0,0,2ed718ae28ceb8e4f7d52b0a060fbe45e212746a041da98ae407c89904905fc5,2024-08-08T18:55:28.493000
CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
@ -254023,7 +254023,7 @@ CVE-2024-36674,0,0,596db0f4764134086c028a91606ddd737131283bc4cd84cec3a5aabc9728f
CVE-2024-36675,0,0,0db5fa1ab82b2e97328c6f2032396d4de5a6bce3bed4d1bccdefe8e0a70ae3fb,2024-06-11T16:49:10.457000
CVE-2024-36676,0,0,a6f2730c67158cf77e7177475d528da2c111a9270c55f8edde3fbb0f8476e94d,2024-07-11T15:05:49.017000
CVE-2024-36677,0,0,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000
CVE-2024-36678,0,0,c0825943f1d5219c9624193357755cc06a7e20f8bcb4f135a8b3456b8cac03b6,2024-07-03T02:03:29.450000
CVE-2024-36678,0,1,3c00488a43e07b1b9b55530969e379e8c0bdd1c8ec7a2e239ab88f3e29b8f83f,2024-08-08T20:59:28.103000
CVE-2024-36679,0,0,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0c1d,2024-07-03T02:03:30.273000
CVE-2024-3668,0,0,760723957a03bd3e6e8f8da9bf14a37cb962a55f21654d65bee4d6a13a6bb613,2024-07-23T19:39:25.253000
CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f28d2,2024-07-03T02:03:31.083000
@ -254320,7 +254320,7 @@ CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12
CVE-2024-3714,0,0,4bcb0bea6568f5dfd8667c7519e5c32cf286da2de79c4bdf6bef9437b54c8d03,2024-05-20T13:00:34.807000
CVE-2024-37140,0,0,c0e59e0c3820f0b4a910e5eed0fb2eac2eba5c793659c906795da47f31c33278,2024-06-26T12:44:29.693000
CVE-2024-37141,0,0,4138154ff13405362c4f0fa9b34cca08a172e0f83625a1ab272957b9a58f67e5,2024-06-26T12:44:29.693000
CVE-2024-37142,0,0,47d31bb71216f43e1772f3350bb70569945e37eca3562554c3b5cc26beccac57,2024-07-31T12:57:02.300000
CVE-2024-37142,0,1,91ad6786bfe324031c2c492b047239c16136d081e58dc0c4b209abb161c2ca89,2024-08-08T21:17:18.647000
CVE-2024-37145,0,0,1222762eaa12a0e0a49c86b792d6f13bb19acede2c9bc472eb8e6da85dd8abda,2024-07-02T12:09:16.907000
CVE-2024-37146,0,0,c0ed63c770ec79d5a3ba66c3386d10a89c2cf22e01c61def1bf7a85931426fdf,2024-07-02T12:09:16.907000
CVE-2024-37147,0,0,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000
@ -254453,26 +254453,26 @@ CVE-2024-37314,0,0,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefc
CVE-2024-37315,0,0,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000
CVE-2024-37316,0,0,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000
CVE-2024-37317,0,0,39b0b4317a6651cb59a140f8d7c551e6209dd76ddab831aefab29483d97c356d,2024-06-17T12:42:04.623000
CVE-2024-37318,0,1,82690cfe11e6e50a30476df05f4f79df9c950fc779c797746222a6d5488f788f,2024-08-08T18:36:54.347000
CVE-2024-37319,0,1,3686b9b3e7ab1d2d1ae743a102fa0469b7c5ebec5d9019efe44c141c29c0c334,2024-08-08T18:39:41.537000
CVE-2024-37318,0,0,82690cfe11e6e50a30476df05f4f79df9c950fc779c797746222a6d5488f788f,2024-08-08T18:36:54.347000
CVE-2024-37319,0,0,3686b9b3e7ab1d2d1ae743a102fa0469b7c5ebec5d9019efe44c141c29c0c334,2024-08-08T18:39:41.537000
CVE-2024-3732,0,0,1e5e3029c64a5f725486d32a5d97f2bbd597392012dab477d1543e258f8bb4ef,2024-04-23T12:52:09.397000
CVE-2024-37320,0,1,52cd5355310316c3c1d8ff3bfc1866f0c347a376cdcf040d922cb358cfc3c899,2024-08-08T18:40:08.887000
CVE-2024-37321,0,1,3a191e9479e5b6b71ab06432cc1bba0fed6c761564675196ff63873f3627dcd5,2024-08-08T18:40:27.350000
CVE-2024-37322,0,1,7890c12be3fc7ae6a0de8c762fd62014d3b44321fc99235fe85b2912fa1528d3,2024-08-08T18:41:20.253000
CVE-2024-37323,0,1,3d88d918c2c47bc73a6a00947073f9fb66d566f56aa316d54e38c00b62ca69fc,2024-08-08T18:41:44.730000
CVE-2024-37324,0,1,308640419ddff319167bcd6bae859950697f66511d4cb578be7f78476e67f053,2024-08-08T18:42:10.850000
CVE-2024-37320,0,0,52cd5355310316c3c1d8ff3bfc1866f0c347a376cdcf040d922cb358cfc3c899,2024-08-08T18:40:08.887000
CVE-2024-37321,0,0,3a191e9479e5b6b71ab06432cc1bba0fed6c761564675196ff63873f3627dcd5,2024-08-08T18:40:27.350000
CVE-2024-37322,0,0,7890c12be3fc7ae6a0de8c762fd62014d3b44321fc99235fe85b2912fa1528d3,2024-08-08T18:41:20.253000
CVE-2024-37323,0,0,3d88d918c2c47bc73a6a00947073f9fb66d566f56aa316d54e38c00b62ca69fc,2024-08-08T18:41:44.730000
CVE-2024-37324,0,0,308640419ddff319167bcd6bae859950697f66511d4cb578be7f78476e67f053,2024-08-08T18:42:10.850000
CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000
CVE-2024-37326,0,1,9773c953cba0c27a0b048f1b26ec2c714fe23b316770567e128d392682f706a8,2024-08-08T18:42:31.443000
CVE-2024-37327,0,1,4e41c0148a719afc92c9ab685c007c508f37245b341e1c36c572de2d60cfe4ff,2024-08-08T18:42:50.373000
CVE-2024-37328,0,1,66b0ddf99d4267d2ddf5b3d9432cf694c4efbd6ffd867ca686aa9fee93d4f03d,2024-08-08T18:43:07.557000
CVE-2024-37329,0,1,da1d1e1082bcbf5e1b9ff358dc5e13de5addd1dfba2a9ae1e82a265419b97fc9,2024-08-08T18:43:34.633000
CVE-2024-37326,0,0,9773c953cba0c27a0b048f1b26ec2c714fe23b316770567e128d392682f706a8,2024-08-08T18:42:31.443000
CVE-2024-37327,0,0,4e41c0148a719afc92c9ab685c007c508f37245b341e1c36c572de2d60cfe4ff,2024-08-08T18:42:50.373000
CVE-2024-37328,0,0,66b0ddf99d4267d2ddf5b3d9432cf694c4efbd6ffd867ca686aa9fee93d4f03d,2024-08-08T18:43:07.557000
CVE-2024-37329,0,0,da1d1e1082bcbf5e1b9ff358dc5e13de5addd1dfba2a9ae1e82a265419b97fc9,2024-08-08T18:43:34.633000
CVE-2024-3733,0,0,f46a385e0f079b92b4bf82f6537b2845f94de0d4fb1f51bc91c30d173674e880,2024-04-25T13:18:13.537000
CVE-2024-37330,0,1,43ad8b020e1e2e7b836653135e5107ad1d0f4a4422f58044f21423488370fde0,2024-08-08T18:43:52.897000
CVE-2024-37331,0,1,9acb6285e6150f47119d04fb2b425d99c3b0a44d48638f0dc5531dfd938d127c,2024-08-08T18:44:18.053000
CVE-2024-37332,0,1,dfaca3f139be3bf36b4d761904308c7fabbd1ce73099f361a0efe436652e8d13,2024-08-08T18:44:37.320000
CVE-2024-37333,0,1,709816ae2e1d3bfc31eeaf82e258fdd783bc74b18447a1f705ce3e32db349c74,2024-08-08T18:44:55.343000
CVE-2024-37334,0,1,563aef6e59d9745d29b9695dc6399e28c0dd7d331b805dd1482225a5b250d3ef,2024-08-08T18:51:42.747000
CVE-2024-37336,0,1,410dea8adcf769dbf6c99783ee79e4122996ff2be4f030bf685fe648f50e8121,2024-08-08T18:45:37.537000
CVE-2024-37330,0,0,43ad8b020e1e2e7b836653135e5107ad1d0f4a4422f58044f21423488370fde0,2024-08-08T18:43:52.897000
CVE-2024-37331,0,0,9acb6285e6150f47119d04fb2b425d99c3b0a44d48638f0dc5531dfd938d127c,2024-08-08T18:44:18.053000
CVE-2024-37332,0,0,dfaca3f139be3bf36b4d761904308c7fabbd1ce73099f361a0efe436652e8d13,2024-08-08T18:44:37.320000
CVE-2024-37333,0,0,709816ae2e1d3bfc31eeaf82e258fdd783bc74b18447a1f705ce3e32db349c74,2024-08-08T18:44:55.343000
CVE-2024-37334,0,0,563aef6e59d9745d29b9695dc6399e28c0dd7d331b805dd1482225a5b250d3ef,2024-08-08T18:51:42.747000
CVE-2024-37336,0,0,410dea8adcf769dbf6c99783ee79e4122996ff2be4f030bf685fe648f50e8121,2024-08-08T18:45:37.537000
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
CVE-2024-37343,0,0,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
CVE-2024-37344,0,0,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
@ -254499,7 +254499,7 @@ CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000
CVE-2024-37382,1,1,4fb35da60d5c84677f2ea0ba29f938ae1e309782d7366c3b4fe2f8096dd387ae,2024-08-08T18:55:19.180000
CVE-2024-37382,0,1,6a2a13134b448ae91abd9e9ff5ba85547b30e77ee93bc2eef8a89467e8827b8d,2024-08-08T20:35:08.353000
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000
@ -254759,7 +254759,7 @@ CVE-2024-37884,0,0,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eec
CVE-2024-37885,0,0,17f5559a85e6e9db6ebd185b566af3c7ce60a0f396cf403a1166b89dd6d49182,2024-06-17T12:42:04.623000
CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000
CVE-2024-37887,0,0,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000
CVE-2024-37888,0,1,85802cd547dfbbe611f91638c3cc445da6232c116464d4f183fc32c96cfddf76,2024-08-08T18:01:19.233000
CVE-2024-37888,0,0,85802cd547dfbbe611f91638c3cc445da6232c116464d4f183fc32c96cfddf76,2024-08-08T18:01:19.233000
CVE-2024-37889,0,0,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f99848d,2024-05-14T16:11:39.510000
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
@ -254908,8 +254908,8 @@ CVE-2024-38082,0,0,23c6f123e64a1a12cf5b02d5d58cddce4aac695b84d4f46ea5b094849b0d1
CVE-2024-38083,0,0,3c2469ed2c873a64c64841f8f046f5b40612bd2c08b8213d90aa91d1b11e6c5b,2024-08-07T16:39:28.940000
CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000
CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000
CVE-2024-38087,0,1,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000
CVE-2024-38088,0,1,75112efcb71a9f477730c0c9a37a767c54ff44dcc9d07440920c4abad9f3faa6,2024-08-08T18:31:54.827000
CVE-2024-38087,0,0,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000
CVE-2024-38088,0,0,75112efcb71a9f477730c0c9a37a767c54ff44dcc9d07440920c4abad9f3faa6,2024-08-08T18:31:54.827000
CVE-2024-38089,0,0,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb49660e2,2024-07-12T15:42:39.127000
CVE-2024-3809,0,0,e9699ccf97d1a77cdd5a51c26652206ae829b76e33be88373519642da681c26d,2024-05-14T16:11:39.510000
CVE-2024-38091,0,0,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000
@ -255511,7 +255511,7 @@ CVE-2024-39274,0,0,e6293a55fc2e07d4badaf0b6ab097c48e8ef50320910d51d55d3f365db2ff
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
CVE-2024-39277,0,0,da44e9f6b14f33e5d22339f98a1af8621d431ecd39b0e0bcdb259c56dded4baa,2024-06-24T19:17:48.380000
CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000
CVE-2024-39287,1,1,5f35ee0c388ca5e0e49a970ea379523932f8098bd51482abd25c3f315609fea4,2024-08-08T18:55:19.180000
CVE-2024-39287,0,0,5f35ee0c388ca5e0e49a970ea379523932f8098bd51482abd25c3f315609fea4,2024-08-08T18:55:19.180000
CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000
CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000
CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32cc4,2024-07-15T07:15:14.940000
@ -256444,7 +256444,7 @@ CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a
CVE-2024-41144,0,0,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
CVE-2024-41161,1,1,d93295a8e71669d3253a3da3085d39953cfdb029c39c49fe6d49270829646664,2024-08-08T18:55:19.180000
CVE-2024-41161,0,0,d93295a8e71669d3253a3da3085d39953cfdb029c39c49fe6d49270829646664,2024-08-08T18:55:19.180000
CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000
@ -256458,9 +256458,9 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,0,0,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-41237,0,0,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
CVE-2024-41238,0,1,68ce49440a6a78d81a154e0f36122f89b41ebddb213355e43d24480236625afc,2024-08-08T18:55:28.493000
CVE-2024-41239,0,1,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
CVE-2024-41237,0,1,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
CVE-2024-41238,0,0,68ce49440a6a78d81a154e0f36122f89b41ebddb213355e43d24480236625afc,2024-08-08T18:55:28.493000
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
@ -256473,8 +256473,8 @@ CVE-2024-41247,0,0,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1
CVE-2024-41248,0,0,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
CVE-2024-41249,0,0,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
CVE-2024-41250,0,0,bc95c78a7efc0365fead4119be635c241b3ddedc1c42b75d136374203f86efd4,2024-08-08T15:21:18.130000
CVE-2024-41251,0,0,5ba1e81e82ce502a72a5f7e5c5f8e1fac5b8153b5b88fdafbb8f664b9b159757,2024-08-08T15:05:36.537000
CVE-2024-41250,0,1,ed2ec7774a8ec7b69d0fb8bbb5a6282e439116063707acc8ce2b97cfaf8b3d0e,2024-08-08T21:35:16.680000
CVE-2024-41251,0,1,da008bc6dc7814b48f867f21af4633a6806e17edefa70e303dbf35845dd6cab0,2024-08-08T20:35:09.980000
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
CVE-2024-41254,0,0,27d7c2f374106e64ca875d8bdf9e26785b8da013fe899595d0b402d9e5d8a252,2024-08-01T12:42:36.933000
@ -256617,7 +256617,7 @@ CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfc
CVE-2024-41696,0,0,35f7b98c6839466c4d2a4eebac08206f0700aa8aa3101c5b590c4468fe7a3828,2024-07-30T13:32:45.943000
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000
CVE-2024-41702,0,0,cdaf376956d976cad8d3300425370c07ba735cd90e9544051b990f59715bdf4d,2024-07-30T13:32:45.943000
CVE-2024-41702,0,1,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000
CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000
CVE-2024-41704,0,0,859a0932f984f671cffc12a925924b508ad9d462f16bdea412375c597ddcb036,2024-08-01T13:59:06.900000
CVE-2024-41705,0,0,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000
@ -256674,7 +256674,7 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
CVE-2024-41910,0,1,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000
CVE-2024-41910,0,0,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000
CVE-2024-41911,0,0,ea799ed6f6f9ce65028cdbe045f892be03084ec1245d47535ccbe7b5bf6048c3,2024-08-06T16:30:24.547000
CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
CVE-2024-41913,0,0,c5a05750f27b10355d3f766241d60c814ca86a61249995cbd8064da18910e8f7,2024-08-06T16:30:24.547000
@ -256686,7 +256686,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
CVE-2024-41942,0,1,8ed58986637e5db506e212c5a75f4c8c5072af189b8a9bd438a4287ea1fa84e4,2024-08-08T18:55:28.493000
CVE-2024-41942,0,0,8ed58986637e5db506e212c5a75f4c8c5072af189b8a9bd438a4287ea1fa84e4,2024-08-08T18:55:28.493000
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
@ -256712,7 +256712,7 @@ CVE-2024-41962,0,0,a42e5c6a5a1b3aff5b6cba30b7dbafa96411265920aa021d515ff4195ac31
CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936838,2024-08-02T12:59:43.990000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
CVE-2024-41989,0,0,e3d9366e4944ee70a1f644e0f033f90114030bc238c696989145584abb2fcfe0,2024-08-07T20:50:04.107000
CVE-2024-41989,0,1,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
CVE-2024-41990,0,0,b1b4d08b70c5ed0ddf71c17c3d353aa9b03b8bfde25019ce9872a054dc1a3d07,2024-08-07T20:49:50.480000
CVE-2024-41991,0,0,23cc70ebabb699bae580234461359f8b2840f2b3097752fd221a0b6184a1fd49,2024-08-07T20:48:22.403000
@ -256891,10 +256891,10 @@ CVE-2024-42244,0,0,64f9bf8b856af87969559561804111262192afa37aa42ad347e05b54753c2
CVE-2024-42245,0,0,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000
CVE-2024-42246,0,0,da0158313668d0853864dbfeb7b41dd897a00dbf2d1500f2de975e9a95c1bed0,2024-08-08T14:52:35.353000
CVE-2024-42247,0,0,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000
CVE-2024-42248,0,0,9daba88013a62f39f5836d2ca2738ebe99311dc207e5be6d1a23f2affcf30263,2024-08-07T19:09:46.290000
CVE-2024-42249,0,0,bf365edc2c96a4876083f80ea351bf6e74bd1f39215b48e95af26a5324f39b9e,2024-08-07T19:09:46.290000
CVE-2024-42248,0,1,a4c871a843ec4ebaf7266331bbf45bb853808d9d58017b146752d4bde19f2c1f,2024-08-08T20:55:35.180000
CVE-2024-42249,0,1,273d2e61a1b49951ffbd8c20389c9c76559ac159ab90b5fda4da3c7651f4a6a8,2024-08-08T20:55:25.943000
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
CVE-2024-42250,0,0,dfd6a9d9259f9bcb46737f53714c27140f6ba7141f4054a83b1176fd288dd5ec,2024-08-07T19:09:46.290000
CVE-2024-42250,0,1,7d78385b950f6f638c0eea124fbfec17d170acdf08ae1ee68e3b5c1e1327945f,2024-08-08T20:55:19.780000
CVE-2024-42251,0,0,9b1443129a58369f223ce9211fcacb89bca25929ae14228a775106359b13b990,2024-08-08T13:04:18.753000
CVE-2024-42252,0,0,b821d07b5bf5bee048c28561a74457d556fd9d0ceebeb99bfd9b5a58471abeef,2024-08-08T13:04:18.753000
CVE-2024-42253,0,0,acfac192925c972e021028901ef1846e104d7f7f457e000983c2cb6592d3dfe9,2024-08-08T13:04:18.753000
@ -256914,14 +256914,14 @@ CVE-2024-42349,0,0,d97bc517c9e69f035ec995db0492468328dd387e0dc6614b4ad8bd471c06d
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
CVE-2024-42354,0,1,3f1bfba047fb141567757046bdb6192ec422b00b04118c65ab3125dd3402be23,2024-08-08T18:55:28.493000
CVE-2024-42355,0,1,d5381f7fc2dc7c5986b9752ad69f035ea726ee2baf03e319c68a54f11a9d63ce,2024-08-08T18:55:28.493000
CVE-2024-42356,0,1,c2e242be1d6748bf4f15cbfb551102f73c9cacaee1889c01c74d636ae8073ac7,2024-08-08T18:55:28.493000
CVE-2024-42357,0,1,44c59f521ab962bdb1c0d177d9946b9376c594c5c4074d3cc84883e0698a3e7e,2024-08-08T18:55:28.493000
CVE-2024-42354,0,0,3f1bfba047fb141567757046bdb6192ec422b00b04118c65ab3125dd3402be23,2024-08-08T18:55:28.493000
CVE-2024-42355,0,0,d5381f7fc2dc7c5986b9752ad69f035ea726ee2baf03e319c68a54f11a9d63ce,2024-08-08T18:55:28.493000
CVE-2024-42356,0,0,c2e242be1d6748bf4f15cbfb551102f73c9cacaee1889c01c74d636ae8073ac7,2024-08-08T18:55:28.493000
CVE-2024-42357,0,0,44c59f521ab962bdb1c0d177d9946b9376c594c5c4074d3cc84883e0698a3e7e,2024-08-08T18:55:28.493000
CVE-2024-42358,0,0,bfdfea3765abe743074eccf4e4988e900f51d95c87e996dc4c204d5e5db7c300,2024-08-07T15:17:46.717000
CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000
CVE-2024-42365,0,1,2e54df0fe9685a274eda5184f59e86b5df98f2e7c76b4e62d4a2c6ed6be068ba,2024-08-08T18:55:19.180000
CVE-2024-42366,0,1,2466463b7f9cca1a29b76bc206fe3dc33faa11a0127772beee97a730e70608c2,2024-08-08T18:55:19.180000
CVE-2024-42365,0,0,2e54df0fe9685a274eda5184f59e86b5df98f2e7c76b4e62d4a2c6ed6be068ba,2024-08-08T18:55:19.180000
CVE-2024-42366,0,0,2466463b7f9cca1a29b76bc206fe3dc33faa11a0127772beee97a730e70608c2,2024-08-08T18:55:19.180000
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
@ -256935,7 +256935,7 @@ CVE-2024-42398,0,0,1bd47f35d1750f7fdf43bf764c0abf3e2c80a4806a8e0014d8bb69479613f
CVE-2024-42399,0,0,a3b1a8c12625bf78004309ad3c67c4b2399a3faf9af89f47117356fbe01bf659,2024-08-07T15:17:46.717000
CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000
CVE-2024-42400,0,0,92a8d348f7d91e4aa17062b372e7ee2acb9c68b6a9eda447b8043cdc6c95df6b,2024-08-07T15:17:46.717000
CVE-2024-42408,1,1,e5d2c20e9880f479571f79feaba8cbd48087331a874716bf56571e7ba2932fca,2024-08-08T18:55:19.180000
CVE-2024-42408,0,0,e5d2c20e9880f479571f79feaba8cbd48087331a874716bf56571e7ba2932fca,2024-08-08T18:55:19.180000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
@ -256950,7 +256950,7 @@ CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449b
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
CVE-2024-42493,1,1,0b24cb1deed3a57898c8f3524a80c98e86eb3779aa3ca96d4b3513ecdc687514,2024-08-08T18:55:19.180000
CVE-2024-42493,0,0,0b24cb1deed3a57898c8f3524a80c98e86eb3779aa3ca96d4b3513ecdc687514,2024-08-08T18:55:19.180000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
@ -258507,7 +258507,7 @@ CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187
CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000
CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000
CVE-2024-6123,0,0,75695c59d88081a795c134128ddb6cd1415db185318a55dfce97b139d1d4e40d,2024-07-09T18:19:14.047000
CVE-2024-6124,0,0,8d25c090cf235b06f2ec76e8f8f482e95e4fdaaa46ccea623efcb0d2a9b85e78,2024-07-29T14:12:08.783000
CVE-2024-6124,0,1,19e2ca9a37dcb7444fec6fae03733cf2ad39cdd8bf297b38eab9aa9eaf4e1590,2024-08-08T20:24:32.483000
CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000
CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000
CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000
@ -258898,8 +258898,8 @@ CVE-2024-6699,0,0,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fef
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
CVE-2024-6706,0,1,368fe1c3fab739e74a8a813ffbef4887e8ddb48011a739592f2aed7de5e469c4,2024-08-08T19:05:03.057000
CVE-2024-6707,0,0,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
CVE-2024-6706,0,0,368fe1c3fab739e74a8a813ffbef4887e8ddb48011a739592f2aed7de5e469c4,2024-08-08T19:05:03.057000
CVE-2024-6707,0,1,0dfe7a21a9f5f3f2c918856e8a22bd010b2f6875b837d373eb17e1778a3c8459,2024-08-08T20:55:55.453000
CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
@ -258976,16 +258976,16 @@ CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9b
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000
CVE-2024-6884,0,1,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
CVE-2024-6881,0,1,520f7716290babc1617560777d62fc095cd252de40f50f3ed54fb0f967edb111,2024-08-08T20:24:41.957000
CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
CVE-2024-6890,0,0,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
CVE-2024-6891,0,0,4430753a26635e6503a6d16441a998be7c3931a4c0419d868885b0693fc5d654,2024-08-08T14:35:15.340000
CVE-2024-6890,0,1,a4b61d6d84db517405e5620d04c7a39034adaee98aaff7a0c1a327ff7affb43d,2024-08-08T20:53:15.917000
CVE-2024-6891,0,1,0319d5fe5c9f95304d92792a4ec9eb62a36bb2ecf00a0444185d206c61336dba,2024-08-08T20:53:26.090000
CVE-2024-6892,0,0,bc0d9068ca32a5801c1d63fe6f4795dc5c08dc9fc9ea0bef7783b53d20a45087,2024-08-08T13:04:18.753000
CVE-2024-6893,0,0,285cb73a7cc1c1a41688e25537ed90b263914746d47ad30eeac40ecdfa9e70f5,2024-08-08T14:35:15.587000
CVE-2024-6893,0,1,07759fcd96135a135ba512fb22253857e5bc78dc38f1fd228c0dfc24706d33b4,2024-08-08T20:53:37.443000
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
CVE-2024-6896,0,1,5408a7e80aa3e88cd45cfede99bb9ef131493e304d3dbf46fdd9905f82d27439,2024-08-08T20:06:25.957000
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
CVE-2024-6899,0,0,397359020457c655f416abd05bdc982e2cbc9cd703cb46d21be66b71a5df8e91,2024-07-19T13:01:44.567000
@ -259005,7 +259005,7 @@ CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f767
CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000
CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000
CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000
CVE-2024-6930,0,0,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000
CVE-2024-6930,0,1,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
CVE-2024-6934,0,0,2773a2900bf573ac6cdadde3da52af842db87181b62c4a3816dd0aac8b92139a,2024-07-22T13:00:31.330000
@ -259099,11 +259099,11 @@ CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d5
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
CVE-2024-7106,0,0,4f79551bb831c41c367c51b2f81bdf75eb9c94a2549b6a3ae035069141d77523,2024-07-26T12:38:41.683000
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
CVE-2024-7115,0,1,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
CVE-2024-7116,0,1,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
CVE-2024-7117,0,1,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
CVE-2024-7118,0,1,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
CVE-2024-7119,0,1,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
CVE-2024-7116,0,0,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
CVE-2024-7117,0,0,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
CVE-2024-7118,0,0,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
@ -259200,9 +259200,9 @@ CVE-2024-7267,0,0,6e1f5892f7c4e286f75fc26af918a704fab9776a05a707e81dd3145cf47508
CVE-2024-7273,0,0,08b55eeeed04c0bbb7f14e00803b2981c3933c2f80c54832a95f5208a289acec,2024-07-31T12:57:02.300000
CVE-2024-7274,0,0,6788201314420897e4c9c6ba6deacc95e7d9a0fa193d6b8ed0518ed687cbc19f,2024-07-31T12:57:02.300000
CVE-2024-7275,0,0,73b728508a2e1fb139a6a6d96a6d39cb0fa47f6c3f9b9fdd8e3fc0433fa4a3e5,2024-07-31T12:57:02.300000
CVE-2024-7276,0,0,47e0b22a39db4f3b96cb4674341816fecd6f82abeb59da97b1db22588166f635,2024-07-31T12:57:02.300000
CVE-2024-7277,0,0,5e0b2075ce51543b4c24a0811908a6d5869c5676c5475ad8483a70814ea56a50,2024-07-31T12:57:02.300000
CVE-2024-7278,0,0,9b390c5e32596c3a3cae5987d14eb37eb25956fed0fc10ed4854ba30802f1826,2024-07-31T12:57:02.300000
CVE-2024-7276,0,1,a277960bca5d831a928fa683ca27cd5e0f80dfef07b8475eaf01f736e513b6db,2024-08-08T20:25:32.643000
CVE-2024-7277,0,1,d07c1eb268c7c274994ec109c99051eb3a213fccffe945d0053bb23d3584d464,2024-08-08T20:07:38.717000
CVE-2024-7278,0,1,5267f7cc9b490f8ce43fbd3c5c727548e8d87d921907a5839886258517fd2c0e,2024-08-08T20:07:50.303000
CVE-2024-7279,0,0,0669689475561d3aca3e4342518c7c69803b8b0cff0c068ccf405f54015dec07,2024-08-08T13:57:09.313000
CVE-2024-7280,0,0,48c575b4cf6652b58b84c63bbac6d4cc21fdeb7bed014958b4338538c7c0bccc,2024-08-08T13:56:04.987000
CVE-2024-7281,0,0,878e786a4e433c6961a4936be4f0b9e2a9c535f1f3ea5308fabfdd12b567700f,2024-08-08T13:55:33.463000
@ -259252,7 +259252,7 @@ CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000
CVE-2024-7343,0,0,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000
CVE-2024-7348,0,1,5e8f627012fccd63e6afc5ceec0844305a80767b52005b87e6aec1f57eda5a6f,2024-08-08T18:55:28.493000
CVE-2024-7348,0,0,5e8f627012fccd63e6afc5ceec0844305a80767b52005b87e6aec1f57eda5a6f,2024-08-08T18:55:28.493000
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
CVE-2024-7353,0,0,3261e094ba804f70c4c538de9d35bf008a53b0271751e64c6aecf340751dd360,2024-08-07T15:17:46.717000
CVE-2024-7355,0,0,77eb32dc1810199d8dfd56b790a0cc073bb577f44b08cc26474823d677f5cfc6,2024-08-07T15:17:46.717000
@ -259281,7 +259281,7 @@ CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7394,0,1,e251d76b1d6cc83c1cfdea51bdbc268e0da61a740aadd1fc89615c49cceeae2c,2024-08-08T18:55:19.180000
CVE-2024-7394,0,0,e251d76b1d6cc83c1cfdea51bdbc268e0da61a740aadd1fc89615c49cceeae2c,2024-08-08T18:55:19.180000
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
@ -259317,12 +259317,12 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
CVE-2024-7477,0,1,5c2470fac7ebadf2ae3cf56b0fe88a8a814b9834bce7545ba252021bfdc4655d,2024-08-08T18:55:28.493000
CVE-2024-7480,0,1,64d465ba825549caaac1f5f0831794e9226d53a768fa9ec822023f1af28e7934,2024-08-08T18:55:19.180000
CVE-2024-7477,0,0,5c2470fac7ebadf2ae3cf56b0fe88a8a814b9834bce7545ba252021bfdc4655d,2024-08-08T18:55:28.493000
CVE-2024-7480,0,0,64d465ba825549caaac1f5f0831794e9226d53a768fa9ec822023f1af28e7934,2024-08-08T18:55:19.180000
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
CVE-2024-7490,0,1,aa59d4ffe54d5b669323c4183f09d592d26845d8e726a2862796ad13803cf019,2024-08-08T18:55:28.493000
CVE-2024-7490,0,0,aa59d4ffe54d5b669323c4183f09d592d26845d8e726a2862796ad13803cf019,2024-08-08T18:55:28.493000
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000
CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000
@ -259346,12 +259346,12 @@ CVE-2024-7526,0,0,b7dc1769424faeb68068ce309d6d3523a91a1d4fb4a85465f17d0f1c4d8fc8
CVE-2024-7527,0,0,5726c5c54faa1bf1781147fed2e22e549db6ab22b4878ce6040da6bad2504c69,2024-08-06T23:16:00.177000
CVE-2024-7528,0,0,b6e9413f9a86c458f79f2237a9adb5674eec1ad41e68eb793e2d9ec404600ca8,2024-08-06T23:16:00.250000
CVE-2024-7529,0,0,b88dacd4622bcc7a40dd32b4177b18e58f7bcd9368595fc01c5e421f17f8855a,2024-08-06T23:16:00.317000
CVE-2024-7530,0,1,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000
CVE-2024-7530,0,0,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000
CVE-2024-7531,0,0,a6ff05a5a66ff77c501f3337329e6ee8c78879bff77c09716ca0c6a78826c209,2024-08-06T16:30:24.547000
CVE-2024-7532,0,0,e1061fe3725daaf1e213ad4672dbc9d62732c1e415da1ada3444386388111f36,2024-08-07T16:35:22.457000
CVE-2024-7533,0,0,8fd2495ed682530a29e2fedc5921e8f1169344af7cbdf7157b07c88a7eb69c64,2024-08-07T20:35:27.510000
CVE-2024-7534,0,0,4fda5d1222e684ca2e49ae25a0f374e2c205c066e85946c4673aebb5b89307f2,2024-08-07T15:17:46.717000
CVE-2024-7535,0,0,87878000c4ed6f791be8d351206391b96514cac50e852455bc493668d99eb432,2024-08-07T15:17:46.717000
CVE-2024-7535,0,1,2351e7ddc7f13709dab587b8406a687256390bcd7293b813090d4b0443589817,2024-08-08T20:35:12.890000
CVE-2024-7536,0,0,b1e72db76516458b78a23dcc13ae3aa1015ac038b5c21bad5fd095c748a00e4f,2024-08-07T15:17:46.717000
CVE-2024-7537,0,0,cac12a6937ce18481e876031006fbab26ca4b7876c502da0485cb83b4f4bb24d,2024-08-06T16:30:24.547000
CVE-2024-7538,0,0,54464c6cea77354c9f1160315b73ea1ed8ffcd06176d127a8c8becba6ed2b81d,2024-08-06T16:30:24.547000
@ -259377,8 +259377,8 @@ CVE-2024-7578,0,0,b6bbbe6806d90851e9605226b169eb3886b74a9a004ee0ed2d1a7a6c6021a1
CVE-2024-7579,0,0,817d773679e171b3efe6c6fcafc252202771d29e88541ab785b97216648f2295,2024-08-07T15:17:46.717000
CVE-2024-7580,0,0,a04c1980d28f072cd3c5cf5e54bd904877b87e16975e0f75e13ad6ba1d25c144,2024-08-07T20:47:00.277000
CVE-2024-7581,0,0,af990567650f3ec82d6a107cfddeff613ee326cc545e2b210702be1eca876f77,2024-08-07T19:59:00.853000
CVE-2024-7582,0,0,b2d3b66c4626672326cfa5879fd1bb0c567c41ab2acaf7c209fbd5f365a390bb,2024-08-07T19:09:46.290000
CVE-2024-7583,0,0,bc6ffa2c62b37fdf56f2749a782cbb82d0821bb8b7c19b37f044ef4c72e8c76b,2024-08-07T19:09:46.290000
CVE-2024-7582,0,1,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
CVE-2024-7583,0,1,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cda6,2024-08-08T20:54:35.117000
CVE-2024-7584,0,0,4fcdc2a13c9feca59db2e84c5a59d4157b22ea97693367754e992172fea915a0,2024-08-07T19:09:46.290000
CVE-2024-7585,0,0,f430436cbc2d07d02eb06f2560db059a8be4c4fc5fe45b044f21a316cfb5ecfc,2024-08-07T19:09:46.290000
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000

Can't render this file because it is too large.