Auto-Update: 2024-08-29T18:00:17.979389+00:00

This commit is contained in:
cad-safe-bot 2024-08-29 18:03:15 +00:00
parent f4d5c1a5d9
commit 08c253cb5a
66 changed files with 3781 additions and 347 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34636",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-08-07T02:15:40.780",
"lastModified": "2024-08-07T15:17:46.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:47:17.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samsung:email:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.94.2",
"matchCriteriaId": "BFD9299D-7B4F-4375-B4C5-52D9929FC5A4"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=08",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-35118",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-29T16:15:08.613",
"lastModified": "2024-08-29T16:15:08.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM MaaS360 for Android 6.31 through 8.60 is using hard coded credentials that can be obtained by a user with physical access to the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/290341",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7166750",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-35133",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-29T17:15:07.250",
"lastModified": "2024-08-29T17:15:07.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7166712",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35697",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:52.837",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:13:49.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:eduma:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.4.8",
"matchCriteriaId": "F3616F96-75BE-44F4-89A1-870D9CC90120"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/eduma/wordpress-eduma-theme-5-4-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35698",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:53.043",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:11:36.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yithemes:yith_woocommerce_tab_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.35.1",
"matchCriteriaId": "1236E5CB-8770-4718-A968-F8DA7F27FC34"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yith-woocommerce-tab-manager/wordpress-yith-woocommerce-tab-manager-plugin-1-35-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35699",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:53.253",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:09:55.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hasthemes:ht_feed:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.9",
"matchCriteriaId": "466E8201-D76F-45A7-89E0-F41A866BC26C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ht-instagram/wordpress-ht-feed-plugin-1-2-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35701",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:53.460",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:09:25.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.14",
"matchCriteriaId": "69E09F7E-4C58-4023-93CA-F30967747DEE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35702",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:53.680",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:08:38.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.6.1",
"matchCriteriaId": "475B234F-6D81-4BEC-AAB7-61C68ABAF55F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-for-elementor-plugin-2-0-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35703",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:53.893",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:08:03.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.5.4",
"matchCriteriaId": "D609FDF8-D41B-42A2-9898-B343BE8405AB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sina-extension-for-elementor/wordpress-sina-extension-for-elementor-plugin-3-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35704",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:54.110",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:02:43.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpblockart:blockart_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.6",
"matchCriteriaId": "DBCD5BF2-F569-4FC2-AFBA-8C53C50E9940"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/blockart-blocks/wordpress-blockart-blocks-plugin-2-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35705",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:54.327",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:01:16.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getbutterfly:block_for_font_awesome:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.5",
"matchCriteriaId": "62F6B831-D71B-42A7-BE77-C6BE3886247C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/block-for-font-awesome/wordpress-block-for-font-awesome-plugin-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35706",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:54.540",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T16:59:18.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heateor:social_login:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.33",
"matchCriteriaId": "CB553D5A-C7D3-4ABF-B31B-41D6A270B613"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/heateor-social-login/wordpress-heateor-social-login-wordpress-plugin-1-1-32-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35895",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T09:15:10.477",
"lastModified": "2024-06-25T22:15:32.367",
"lastModified": "2024-08-29T17:15:07.480",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -25,6 +25,10 @@
"url": "https://git.kernel.org/stable/c/6af057ccdd8e7619960aca1f0428339f213b31cd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/913c30f827e17d8cda1da6eeb990f350d36cb69b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a44770fed86515eedb5a7c00b787f847ebb134a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -44,10 +48,6 @@
{
"url": "https://git.kernel.org/stable/c/ff91059932401894e6c86341915615c5eb0eca48",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35937",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T11:15:49.553",
"lastModified": "2024-05-20T13:00:04.957",
"lastModified": "2024-08-29T17:15:07.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -28,6 +28,10 @@
{
"url": "https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9eb3bc0973d084423a6df21cf2c74692ff05647e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35966",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-20T10:15:11.580",
"lastModified": "2024-08-19T05:15:06.383",
"lastModified": "2024-08-29T17:15:07.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -28,6 +28,10 @@
{
"url": "https://git.kernel.org/stable/c/c3f787a3eafe519c93df9abbb0ca5145861c8d0f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eea40d33bf936a5c7fb03c190e61e0cfee00e872",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37462",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-09T11:15:15.337",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T16:05:11.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.3",
"matchCriteriaId": "8335538D-07A7-4494-8B3F-7CA3D7473BAF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-bootstrap-elements-for-elementor/wordpress-ultimate-bootstrap-elements-for-elementor-plugin-1-4-2-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39677",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T15:15:22.450",
"lastModified": "2024-07-08T15:49:22.437",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:29:55.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,26 +81,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nhibernate:nhibernate-core:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.9",
"matchCriteriaId": "23371DC1-350D-459D-AB4F-1E251FC87BB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nhibernate:nhibernate-core:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.5.2",
"matchCriteriaId": "09A1DB68-907D-4000-8F0C-8C2E8C699E7C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/nhibernate/nhibernate-core/issues/3516",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/nhibernate/nhibernate-core/pull/3517",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/nhibernate/nhibernate-core/pull/3547",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/nhibernate/nhibernate-core/security/advisories/GHSA-fg4q-ccq8-3r5q",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39751",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-06T16:15:48.930",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:56:32.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297429",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7160580",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39880",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-07-09T22:15:02.740",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:38:18.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -85,8 +105,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +125,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39881",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-07-09T22:15:02.893",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:37:05.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39882",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-07-09T22:15:03.013",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:34:50.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39883",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-07-09T22:15:03.133",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:33:42.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,44 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40101",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-06T14:16:04.117",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:57:16.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,82 @@
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) reflejado en '/search' en microweber 2.0.15 y anteriores, que permite a atacantes remotos no autenticados inyectar scripts web o HTML arbitrarios a trav\u00e9s del par\u00e1metro 'palabras clave'."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.15",
"matchCriteriaId": "FD28663A-01D3-4043-A5CD-4086DCE81E0C"
}
]
}
]
}
],
"references": [
{
"url": "http://microweber.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/microweber/microweber/commit/0dede6886c6df3d1f31c4f4e3ba1ab4a336fbf79",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://seclists.org/fulldisclosure/2024/Aug/1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40972",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.820",
"lastModified": "2024-08-19T05:15:06.657",
"lastModified": "2024-08-29T17:15:07.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0752e7fb549d90c33b4d4186f11cfd25a556d1dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0a46ef234756dca04623b7591e8ebb3440622f0b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41024",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:11.270",
"lastModified": "2024-07-29T16:21:52.517",
"lastModified": "2024-08-29T17:15:07.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2eb973ee4770a26d9b5e292b58ad29822d321c7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5e305b5986dc52122a9368a1461f0c13e1de3fd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -28,6 +32,10 @@
{
"url": "https://git.kernel.org/stable/c/c69fd8afacebfdf2f8a1ee1ea7e0723786529874",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ea13bd807f1cef1af375d999980a9b9794c789b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-41964",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T17:15:07.980",
"lastModified": "2024-08-29T17:15:07.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kirby is a CMS targeting designers and editors. Kirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions. Permissions for creating and deleting languages have already existed and could be configured, but were not enforced by Kirby's frontend or backend code. A permission for updating existing languages has not existed before the patched versions. So disabling the languages.* wildcard permission for a role could not have prohibited updates to existing language definitions. The missing permission checks allowed attackers with Panel access to manipulate the language definitions. The problem has been patched in Kirby 3.6.6.6, Kirby 3.7.5.5, Kirby 3.8.4.4, Kirby 3.9.8.2, Kirby 3.10.1.1, and Kirby 4.3.1. Please update to one of these or a later version to fix the vulnerability. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42222",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-07T08:16:12.473",
"lastModified": "2024-08-07T15:17:46.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:43:59.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,44 @@
"value": "En Apache CloudStack 4.19.1.0, una regresi\u00f3n en la API de listado de redes permite el acceso no autorizado a la lista de detalles de la red para el administrador del dominio y las cuentas de usuario normales. Esta vulnerabilidad compromete el aislamiento de los inquilinos, lo que podr\u00eda provocar un acceso no autorizado a los detalles, las configuraciones y los datos de la red. Se recomienda a los usuarios afectados que actualicen a la versi\u00f3n 4.19.1.1 para solucionar este problema. Los usuarios de versiones anteriores de CloudStack que est\u00e9n considerando actualizar, pueden omitir 4.19.1.0 y actualizar directamente a 4.19.1.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -28,22 +61,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C1387-130B-4479-BE47-3CEBC3E92C5B"
}
]
}
]
}
],
"references": [
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/apache/cloudstack/issues/9456",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wlj",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42467",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-12T13:38:34.740",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:26:43.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openhab:openhab_web_interface:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.1",
"matchCriteriaId": "CD354FE1-98C9-493C-BCF6-4DAFC179459E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/backend/rest/ProxyResource.java#L83",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-v7gr-mqpj-wwh3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43111",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T16:15:49.370",
"lastModified": "2024-08-07T15:35:08.127",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:53:16.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "129",
"matchCriteriaId": "AB839932-DBCE-4AAF-BA54-2A226D535616"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874907",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-36/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43112",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T16:15:49.437",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:51:55.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "Mantener presionado un enlace de descarga podr\u00eda proporcionar un medio para ejecutar Cross-Site Scripting. Esta vulnerabilidad afecta a Firefox para iOS < 129."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "129",
"matchCriteriaId": "AB839932-DBCE-4AAF-BA54-2A226D535616"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874910",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-36/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43113",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T16:15:49.493",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T16:51:33.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "El men\u00fa contextual de los enlaces podr\u00eda brindar una oportunidad para ataques de Cross-Site Scripting. Esta vulnerabilidad afecta a Firefox para iOS < 129."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "129",
"matchCriteriaId": "AB839932-DBCE-4AAF-BA54-2A226D535616"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874964",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-36/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43140",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-13T12:15:06.887",
"lastModified": "2024-08-13T12:58:25.437",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T16:04:30.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.5",
"matchCriteriaId": "93ECC3F5-0C5F-4366-8911-CC260DA4DBFB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-bootstrap-elements-for-elementor/wordpress-ultimate-bootstrap-elements-for-elementor-plugin-1-4-4-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43804",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T17:15:08.193",
"lastModified": "2024-08-29T17:15:08.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. An OS Command Injection vulnerability allows any authenticated user on the application to execute arbitrary code on the web application server via port scanning functionality. User-supplied input is used without validation when constructing and executing an OS command. User supplied JSON POST data is parsed and if \"id\" JSON key does not exist, JSON value supplied via \"ip\" JSON key is assigned to the \"ip\" variable. Later on, \"ip\" variable which can be controlled by the attacker is used when constructing the cmd and cmd1 strings without any extra validation. Then, server_mod.subprocess_execute function is called on both cmd1 and cmd2. When the definition of the server_mod.subprocess_execute() function is analyzed, it can be seen that subprocess.Popen() is called on the input parameter with shell=True which results in OS Command Injection. This issue has not yet been patched. Users are advised to contact the Roxy-WI to coordinate a fix."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43845",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:09.837",
"lastModified": "2024-08-19T12:59:59.177",
"lastModified": "2024-08-29T17:15:08.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -25,6 +25,10 @@
"url": "https://git.kernel.org/stable/c/40d7b3ed52449d36143bab8d3e70926aa61a60f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c996b570305e7a6910c2ce4cdcd4c22757ffe241",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43884",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T08:15:03.827",
"lastModified": "2024-08-27T14:37:20.410",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-29T17:15:08.457",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -91,12 +91,24 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-43897",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T11:15:04.437",
"lastModified": "2024-08-26T12:47:20.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:15:08.533",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: drop bad gso csum_start and offset in virtio_net_hdr\n\nTighten csum_start and csum_offset checks in virtio_net_hdr_to_skb\nfor GSO packets.\n\nThe function already checks that a checksum requested with\nVIRTIO_NET_HDR_F_NEEDS_CSUM is in skb linear. But for GSO packets\nthis might not hold for segs after segmentation.\n\nSyzkaller demonstrated to reach this warning in skb_checksum_help\n\n\toffset = skb_checksum_start_offset(skb);\n\tret = -EINVAL;\n\tif (WARN_ON_ONCE(offset >= skb_headlen(skb)))\n\nBy injecting a TSO packet:\n\nWARNING: CPU: 1 PID: 3539 at net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0\n ip_do_fragment+0x209/0x1b20 net/ipv4/ip_output.c:774\n ip_finish_output_gso net/ipv4/ip_output.c:279 [inline]\n __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301\n iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82\n ip_tunnel_xmit+0x2296/0x2c70 net/ipv4/ip_tunnel.c:813\n __gre_xmit net/ipv4/ip_gre.c:469 [inline]\n ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661\n __netdev_start_xmit include/linux/netdevice.h:4850 [inline]\n netdev_start_xmit include/linux/netdevice.h:4864 [inline]\n xmit_one net/core/dev.c:3595 [inline]\n dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611\n __dev_queue_xmit+0x1b97/0x3c90 net/core/dev.c:4261\n packet_snd net/packet/af_packet.c:3073 [inline]\n\nThe geometry of the bad input packet at tcp_gso_segment:\n\n[ 52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0\n[ 52.003050][ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244\n[ 52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(size=1552 type=3 segs=0))\n[ 52.003050][ T8403] csum(0x60000c7 start=199 offset=1536\nip_summed=3 complete_sw=0 valid=0 level=0)\n\nMitigate with stricter input validation.\n\ncsum_offset: for GSO packets, deduce the correct value from gso_type.\nThis is already done for USO. Extend it to TSO. Let UFO be:\nudp[46]_ufo_fragment ignores these fields and always computes the\nchecksum in software.\n\ncsum_start: finding the real offset requires parsing to the transport\nheader. Do not add a parser, use existing segmentation parsing. Thanks\nto SKB_GSO_DODGY, that also catches bad packets that are hw offloaded.\nAgain test both TSO and USO. Do not test UFO for the above reason, and\ndo not test UDP tunnel offload.\n\nGSO packet are almost always CHECKSUM_PARTIAL. USO packets may be\nCHECKSUM_NONE since commit 10154dbded6d6 (\"udp: Allow GSO transmit\nfrom devices with no checksum offload\"), but then still these fields\nare initialized correctly in udp4_hwcsum/udp6_hwcsum_outgoing. So no\nneed to test for ip_summed == CHECKSUM_PARTIAL first.\n\nThis revises an existing fix mentioned in the Fixes tag, which broke\nsmall packets with GSO offload, as detected by kselftests."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: elimine gso csum_start incorrecto y offset en virtio_net_hdr. Apriete las comprobaciones de csum_start y csum_offset en virtio_net_hdr_to_skb para paquetes GSO. La funci\u00f3n ya comprueba que una suma de comprobaci\u00f3n solicitada con VIRTIO_NET_HDR_F_NEEDS_CSUM est\u00e9 en skb lineal. Pero para los paquetes OSG esto podr\u00eda no ser v\u00e1lido para los segmentos posteriores a la segmentaci\u00f3n. Syzkaller demostr\u00f3 alcanzar esta advertencia en skb_checksum_help offset = skb_checksum_start_offset(skb); ret = -EINVAL; if (WARN_ON_ONCE(offset >= skb_headlen(skb))) Al inyectar un paquete TSO: ADVERTENCIA: CPU: 1 PID: 3539 en net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0 ip_do_fragment+0x209/0x1b20 net/ipv4 /ip_output.c:774 ip_finish_output_gso net/ipv4/ip_output.c:279 [en l\u00ednea] __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82 +0x2296 /0x2c70 net/ipv4/ip_tunnel.c:813 __gre_xmit net/ipv4/ip_gre.c:469 [en l\u00ednea] ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661 __netdev_start_xmit include/linux/netdevice.h:4850 [en l\u00ednea ] netdev_start_xmit include/linux/netdevice.h:4864 [en l\u00ednea] xmit_one net/core/dev.c:3595 [en l\u00ednea] dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611 __dev_queue_xmit+0x1b97/0x3c90 net/core/ dev.c:4261 paquete_snd net/packet/af_packet.c:3073 [en l\u00ednea] La geometr\u00eda del paquete de entrada incorrecto en tcp_gso_segment: [ 52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0 [ 52.003050] [ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244 [ 52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(tama\u00f1o=1552 tipo=3 segs=0)) [ 52.003050][ T8403] csum(0x60000c7 start=199 offset=1536 ip_summed=3 complete_sw=0 valid=0 nivel=0) Mitigar con una validaci\u00f3n de entrada m\u00e1s estricta. csum_offset: para paquetes GSO, deduzca el valor correcto de gso_type. Esto ya est\u00e1 hecho para la OSU. Ampliarlo a TSO. Sea UFO: udp[46]_ufo_fragment ignora estos campos y siempre calcula la suma de comprobaci\u00f3n en el software. csum_start: encontrar el desplazamiento real requiere analizar el encabezado de transporte. No agregue un analizador, utilice el an\u00e1lisis de segmentaci\u00f3n existente. Gracias a SKB_GSO_DODGY, eso tambi\u00e9n detecta paquetes defectuosos que se descargan correctamente. Nuevamente pruebe tanto TSO como USO. No pruebe UFO por el motivo anterior y no pruebe la descarga del t\u00fanel UDP. Los paquetes OSG casi siempre son CHECKSUM_PARTIAL. Los paquetes USO pueden ser CHECKSUM_NONE desde el commit 10154dbded6d6 (\"udp: Permitir transmisi\u00f3n GSO desde dispositivos sin descarga de suma de verificaci\u00f3n\"), pero a\u00fan as\u00ed estos campos se inicializan correctamente en udp4_hwcsum/udp6_hwcsum_outgoing. Por lo tanto, no es necesario probar primero ip_summed == CHECKSUM_PARTIAL. Esto revisa una soluci\u00f3n existente mencionada en la etiqueta Correcciones, que romp\u00eda paquetes peque\u00f1os con la descarga GSO, seg\u00fan lo detectado por kselftests."
}
],
"metrics": {},
@ -24,6 +28,10 @@
{
"url": "https://git.kernel.org/stable/c/89add40066f9ed9abe5f7f886fe5789ff7e0c50e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f01c5e335fbb7fb612d40f14a3c02e2612a43d3b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43943",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.013",
"lastModified": "2024-08-29T16:15:09.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wpsoul Greenshift Woocommerce Addon allows SQL Injection.This issue affects Greenshift Woocommerce Addon: from n/a before 1.9.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/greenshiftwoo/wordpress-greenshift-woocommerce-addon-plugin-1-9-8-subscriber-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43944",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.197",
"lastModified": "2024-08-29T16:15:09.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in Yassine Idrissi Maintenance & Coming Soon Redirect Animation allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance & Coming Soon Redirect Animation: from n/a through 2.1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/maintenance-coming-soon-redirect-animation/wordpress-maintenance-coming-soon-redirect-animation-plugin-2-1-3-ip-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43954",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.383",
"lastModified": "2024-08-29T16:15:09.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in Themeum Droip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Droip: from n/a through 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-subscriber-settings-change-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43955",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.570",
"lastModified": "2024-08-29T16:15:09.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themeum Droip allows File Manipulation.This issue affects Droip: from n/a through 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-unauthenticated-arbitrary-file-download-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43957",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.757",
"lastModified": "2024-08-29T16:15:09.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sk. Abul Hasan Animated Number Counters allows PHP Local File Inclusion.This issue affects Animated Number Counters: from n/a through 1.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/animated-number-counters/wordpress-animated-number-counters-plugin-1-9-editor-limited-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43965",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.947",
"lastModified": "2024-08-29T16:15:09.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smackcoders SendGrid for WordPress allows SQL Injection.This issue affects SendGrid for WordPress: from n/a through 1.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-sendgrid-mailer/wordpress-sendgrid-for-wordpress-plugin-1-4-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44919",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T17:15:08.670",
"lastModified": "2024-08-29T17:15:08.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component admin_ads.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ad description parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44938",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T12:15:05.960",
"lastModified": "2024-08-26T12:47:20.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:15:08.753",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix shift-out-of-bounds in dbDiscardAG\n\nWhen searching for the next smaller log2 block, BLKSTOL2() returned 0,\ncausing shift exponent -1 to be negative.\n\nThis patch fixes the issue by exiting the loop directly when negative\nshift is found."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: jfs: corrigi\u00f3 el desplazamiento fuera de los l\u00edmites en dbDiscardAG Al buscar el siguiente bloque log2 m\u00e1s peque\u00f1o, BLKSTOL2() devolvi\u00f3 0, lo que provoc\u00f3 que el exponente de desplazamiento -1 fuera negativo. Este parche soluciona el problema saliendo del bucle directamente cuando se encuentra un cambio negativo."
}
],
"metrics": {},
@ -21,6 +25,10 @@
"url": "https://git.kernel.org/stable/c/7063b80268e2593e58bee8a8d709c2f3ff93e2f2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bd04a149e3a29e7f71b7956ed41dba34e42d539e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f650148b43949ca9e37e820804bb6026fff404f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,17 +2,25 @@
"id": "CVE-2024-44939",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T12:15:06.007",
"lastModified": "2024-08-26T12:47:20.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:15:08.837",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix null ptr deref in dtInsertEntry\n\n[syzbot reported]\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 0 PID: 5061 Comm: syz-executor404 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nRIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713\n...\n[Analyze]\nIn dtInsertEntry(), when the pointer h has the same value as p, after writing\nname in UniStrncpy_to_le(), p->header.flag will be cleared. This will cause the\npreviously true judgment \"p->header.flag & BT-LEAF\" to change to no after writing\nthe name operation, this leads to entering an incorrect branch and accessing the\nuninitialized object ih when judging this condition for the second time.\n\n[Fix]\nAfter got the page, check freelist first, if freelist == 0 then exit dtInsert()\nand return -EINVAL."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: corrige null ptr deref en dtInsertEntry [syzbot inform\u00f3] falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr -deref en rango [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 5061 Comm: syz-executor404 No contaminado 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 03 /27 /2024 RIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713 ... [Analizar] En dtInsertEntry(), cuando el puntero h tiene el mismo valor que p, despu\u00e9s de escribir el nombre en UniStrncpy_to_le(), Se borrar\u00e1 p->header.flag. Esto har\u00e1 que el juicio previamente verdadero \"p->header.flag & BT-LEAF\" cambie a no despu\u00e9s de escribir la operaci\u00f3n de nombre, esto lleva a ingresar una rama incorrecta y acceder al objeto no inicializado ih al juzgar esta condici\u00f3n por segunda vez. [Soluci\u00f3n] Despu\u00e9s de obtener la p\u00e1gina, verifique primero la lista libre, si lista libre == 0, salga de dtInsert() y devuelva -EINVAL."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/53023ab11836ac56fd75f7a71ec1356e50920fa9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6ea10dbb1e6c58384136e9adfd75f81951e423f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44940",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-26T12:15:06.053",
"lastModified": "2024-08-26T12:47:20.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:15:08.903",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: remove warn in gue_gro_receive on unsupported protocol\n\nDrop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is\nnot known or does not have a GRO handler.\n\nSuch a packet is easily constructed. Syzbot generates them and sets\noff this warning.\n\nRemove the warning as it is expected and not actionable.\n\nThe warning was previously reduced from WARN_ON to WARN_ON_ONCE in\ncommit 270136613bf7 (\"fou: Do WARN_ON_ONCE in gue_gro_receive for bad\nproto callbacks\")."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fou: elimine la advertencia en gue_gro_receive en un protocolo no compatible. Descarte WARN_ON_ONCE en gue_gro_receive si el tipo encapsulado no se conoce o no tiene un controlador GRO. Un paquete de este tipo se construye f\u00e1cilmente. Syzbot los genera y activa esta advertencia. Elimine la advertencia como se esperaba y no es procesable. La advertencia se redujo previamente de WARN_ON a WARN_ON_ONCE en el commit 270136613bf7 (\"fou: Haga WARN_ON_ONCE en gue_gro_receive para devoluciones de llamadas de proto incorrectas\")."
}
],
"metrics": {},
@ -21,6 +25,10 @@
"url": "https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45045",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T17:15:08.977",
"lastModified": "2024-08-29T17:15:08.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. In the mobile (Android/iOS) device variants of Collabora Online it was possible to inject JavaScript via url encoded values in links contained in documents. Since the Android JavaScript interface allows access to internal functions, the likelihood that the app could be compromised via this vulnerability is considered high. Non-mobile variants are not affected. Mobile variants should update to the latest version provided by the platform appstore. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"references": [
{
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-78cg-rg4q-26qv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45056",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-29T17:15:09.173",
"lastModified": "2024-08-29T17:15:09.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "zksolc is a Solidity compiler for ZKsync. All LLVM versions since 2015 fold `(xor (shl 1, x), -1)` to `(rotl ~1, x)` if run with optimizations enabled. Here `~1` is generated as an unsigned 64 bits number (`2^64-1`). This number is zero-extended to 256 bits on EraVM target while it should have been sign-extended. Thus instead of producing `roti 2^256 - 1, x` the compiler produces `rotl 2^64 - 1, x`. Analysis has shown that no contracts were affected by the date of publishing this advisory. This issue has been addressed in version 1.5.3. Users are advised to upgrade and redeploy all contracts. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-682"
}
]
}
],
"references": [
{
"url": "https://github.com/llvm/llvm-project/commit/e48237df95b49a36b8ffceb78c8a58f4be1b4344",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/matter-labs/era-compiler-solidity/security/advisories/GHSA-fpx7-8vc6-frjj",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6200",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.030",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:53:40.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.143.61",
"matchCriteriaId": "0C394C94-9968-465E-98B9-7BC8429BAD67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.144",
"versionEndExcluding": "2.146.1",
"matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2152",
"source": "vulnerability@ncsc.ch"
"source": "vulnerability@ncsc.ch",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6201",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.283",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:52:07.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -39,10 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.143.21",
"matchCriteriaId": "A015991C-B19E-4216-9EDA-565C39027C93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.144",
"versionEndExcluding": "2.146.1",
"matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2153",
"source": "vulnerability@ncsc.ch"
"source": "vulnerability@ncsc.ch",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6202",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.487",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:48:43.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.143.61",
"matchCriteriaId": "0C394C94-9968-465E-98B9-7BC8429BAD67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.144",
"versionEndExcluding": "2.146.1",
"matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2154",
"source": "vulnerability@ncsc.ch"
"source": "vulnerability@ncsc.ch",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6203",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.727",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:46:28.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
},
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.143.61",
"matchCriteriaId": "0C394C94-9968-465E-98B9-7BC8429BAD67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.144",
"versionEndExcluding": "2.146.1",
"matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2155",
"source": "vulnerability@ncsc.ch"
"source": "vulnerability@ncsc.ch",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7523",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.297",
"lastModified": "2024-08-06T16:30:24.547",
"lastModified": "2024-08-29T17:41:09.627",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,15 +15,75 @@
"value": "Una opci\u00f3n seleccionada podr\u00eda ocultar parcialmente las indicaciones de seguridad. Esto podr\u00eda ser utilizado por un sitio malicioso para enga\u00f1ar a un usuario para que conceda permisos. *Este problema solo afecta a las versiones de Firefox para Android.* Esta vulnerabilidad afecta a Firefox < 129."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*",
"versionEndExcluding": "129",
"matchCriteriaId": "5B4557B2-3B2F-4640-865C-8D61337D5BA0"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908344",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7524",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.357",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:35:34.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "Firefox agrega ajustes de compatibilidad web en lugar de algunos scripts de seguimiento bloqueados por la Protecci\u00f3n de seguimiento mejorada. En un sitio protegido por la Pol\u00edtica de seguridad de contenido en modo \"din\u00e1mico estricto\", un atacante capaz de inyectar un elemento HTML podr\u00eda haber utilizado un ataque DOM Clobbering en algunas de las correcciones y lograr XSS, evitando la protecci\u00f3n din\u00e1mica estricta del CSP. Esta vulnerabilidad afecta a Firefox < 129, Firefox ESR < 115.14 y Firefox ESR < 128.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "129.0",
"matchCriteriaId": "12C9ABF7-3B44-4C24-B152-488DCF9E2D39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.14",
"matchCriteriaId": "77E36842-1F83-4A47-94D2-5D0A9825D3C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "116.0",
"versionEndExcluding": "128.1",
"matchCriteriaId": "38D2AF1C-E314-45EE-A2A9-7B44DA2A4ACF"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7538",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:34.860",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:59:31.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1078/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7539",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.053",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:59:05.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1079/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7540",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.270",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:58:17.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1080/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7541",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.470",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:57:37.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1081/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7542",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:35.663",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:56:54.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1082/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7546",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-06T00:15:36.450",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-29T17:55:47.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ofono_project:ofono:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F3C23EE-8748-4C6E-B445-A9A9A9B3AF85"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1086/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8208",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-27T18:15:15.950",
"lastModified": "2024-08-27T18:33:14.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:27:02.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en nafisulbari/itsourcecode Insurance Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo editClient.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento AGENT ID conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,18 +140,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.275917",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.275917",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.393511",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8209",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-27T18:15:16.617",
"lastModified": "2024-08-27T18:33:14.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T17:23:42.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en nafisulbari/itsourcecode Insurance Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo addClient.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ID DE CLIENTE conduce a cross site scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -105,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,18 +150,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.275918",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.275918",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.393512",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8210",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-27T19:15:18.250",
"lastModified": "2024-08-28T12:57:39.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-29T16:04:45.310",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -68,6 +68,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -117,8 +137,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -127,30 +157,591 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CFCD7B-EFFB-4FAB-9537-46AC7B567126"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03C5CED7-55A7-4026-95CD-A2ADB5853823"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE78C5B-2A98-47EE-BF67-CF58AFE50A37"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C1EF70-AD9B-48D7-8DF6-A6416C517F12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E691E775-382C-4BA9-AA44-FBC3148D3E54"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6DEB-3578-44A5-916F-1628141F0DDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D042C75D-6731-46B2-B11E-A009B9029B3F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CAFE1E3-B705-4CF1-AEB9-A474432B6D34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D08ED7-3E7F-4D30-890E-6535F6C34682"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A74D270-9076-474D-A06F-C915FCEA2164"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75E5010F-21BA-4B6B-B00C-2688268FD67B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12C5E2D7-018E-4ED1-92C7-B5B1D8CC6990"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E56821-7EA0-4CA1-BA17-7FD4ED9F794C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD656642-EDD4-4EB2-81AB-04207BC14196"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F968791D-D3BD-442C-818E-4E878B12776D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39FF9666-8493-4A36-A199-1190AD8FAF3D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "816E5F34-CE76-49E5-91F3-8CC84C561558"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33CB308B-CF82-4E40-B2DC-23EBD48CD130"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "172D5EFF-E0DF-4A99-8499-71450A46A86C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB305B29-7F89-4A52-9ECF-3DB0BDD2350D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5E6F048-D865-4378-87C7-B0E528134276"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26F4F77-A6E3-4D7D-A781-BEB5FF7BC44F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16954393-3449-438A-978C-265EE3A35FF8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "641CB5F1-3DE0-480B-95A4-FC42A8FF3C97"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94ED678A-AB4C-4637-B0D8-C232A0BB5D5F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3AD5EE-8E1E-4336-A1AB-AB028CC71286"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAF62A4-2429-4B89-8FAD-8B23EF15E050"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC28053F-88A9-4CA1-A2A2-CC90FEEA68FC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A278BC9-6197-43D9-93C2-3DF760856FB7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4599D769-0210-4D49-9896-9AD1376A037E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C677E53-6885-4EC4-A7CC-E24E8F445F59"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4452F9A4-3A0A-4773-9818-04C94CF9F8E7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96195649-172A-4C21-AA15-7B05F86C5CEC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07A92F2C-16FD-4A53-8066-83FEC2818DF5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C44BE2C6-BF3E-43C3-B32F-2DCE756F94BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E161E54-2FE9-4359-9B2D-8700D00DE8E7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_3rd_DiskMGR.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.275919",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.275919",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.397274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-8255",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-29T16:15:10.140",
"lastModified": "2024-08-29T16:15:10.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-29T16:00:18.154321+00:00
2024-08-29T18:00:17.979389+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-29T15:55:30.247000+00:00
2024-08-29T17:59:31.983000+00:00
```
### Last Data Feed Release
@ -33,67 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261477
261491
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `14`
- [CVE-2024-1056](CVE-2024/CVE-2024-10xx/CVE-2024-1056.json) (`2024-08-29T14:15:08.270`)
- [CVE-2024-38693](CVE-2024/CVE-2024-386xx/CVE-2024-38693.json) (`2024-08-29T14:15:08.680`)
- [CVE-2024-38793](CVE-2024/CVE-2024-387xx/CVE-2024-38793.json) (`2024-08-29T15:15:26.260`)
- [CVE-2024-38795](CVE-2024/CVE-2024-387xx/CVE-2024-38795.json) (`2024-08-29T15:15:26.460`)
- [CVE-2024-39620](CVE-2024/CVE-2024-396xx/CVE-2024-39620.json) (`2024-08-29T15:15:26.710`)
- [CVE-2024-39622](CVE-2024/CVE-2024-396xx/CVE-2024-39622.json) (`2024-08-29T15:15:26.900`)
- [CVE-2024-39638](CVE-2024/CVE-2024-396xx/CVE-2024-39638.json) (`2024-08-29T15:15:27.093`)
- [CVE-2024-39653](CVE-2024/CVE-2024-396xx/CVE-2024-39653.json) (`2024-08-29T15:15:27.297`)
- [CVE-2024-39658](CVE-2024/CVE-2024-396xx/CVE-2024-39658.json) (`2024-08-29T15:15:27.493`)
- [CVE-2024-43132](CVE-2024/CVE-2024-431xx/CVE-2024-43132.json) (`2024-08-29T15:15:28.327`)
- [CVE-2024-43144](CVE-2024/CVE-2024-431xx/CVE-2024-43144.json) (`2024-08-29T15:15:28.530`)
- [CVE-2024-43917](CVE-2024/CVE-2024-439xx/CVE-2024-43917.json) (`2024-08-29T15:15:28.753`)
- [CVE-2024-43918](CVE-2024/CVE-2024-439xx/CVE-2024-43918.json) (`2024-08-29T15:15:29.010`)
- [CVE-2024-43922](CVE-2024/CVE-2024-439xx/CVE-2024-43922.json) (`2024-08-29T15:15:29.227`)
- [CVE-2024-43931](CVE-2024/CVE-2024-439xx/CVE-2024-43931.json) (`2024-08-29T15:15:29.427`)
- [CVE-2024-43939](CVE-2024/CVE-2024-439xx/CVE-2024-43939.json) (`2024-08-29T15:15:29.633`)
- [CVE-2024-43940](CVE-2024/CVE-2024-439xx/CVE-2024-43940.json) (`2024-08-29T15:15:29.833`)
- [CVE-2024-43941](CVE-2024/CVE-2024-439xx/CVE-2024-43941.json) (`2024-08-29T15:15:30.040`)
- [CVE-2024-43942](CVE-2024/CVE-2024-439xx/CVE-2024-43942.json) (`2024-08-29T15:15:30.247`)
- [CVE-2024-5057](CVE-2024/CVE-2024-50xx/CVE-2024-5057.json) (`2024-08-29T14:15:09.080`)
- [CVE-2024-8302](CVE-2024/CVE-2024-83xx/CVE-2024-8302.json) (`2024-08-29T14:15:09.530`)
- [CVE-2024-8303](CVE-2024/CVE-2024-83xx/CVE-2024-8303.json) (`2024-08-29T15:15:34.783`)
- [CVE-2024-8304](CVE-2024/CVE-2024-83xx/CVE-2024-8304.json) (`2024-08-29T15:15:35.070`)
- [CVE-2024-35118](CVE-2024/CVE-2024-351xx/CVE-2024-35118.json) (`2024-08-29T16:15:08.613`)
- [CVE-2024-35133](CVE-2024/CVE-2024-351xx/CVE-2024-35133.json) (`2024-08-29T17:15:07.250`)
- [CVE-2024-41964](CVE-2024/CVE-2024-419xx/CVE-2024-41964.json) (`2024-08-29T17:15:07.980`)
- [CVE-2024-43804](CVE-2024/CVE-2024-438xx/CVE-2024-43804.json) (`2024-08-29T17:15:08.193`)
- [CVE-2024-43943](CVE-2024/CVE-2024-439xx/CVE-2024-43943.json) (`2024-08-29T16:15:09.013`)
- [CVE-2024-43944](CVE-2024/CVE-2024-439xx/CVE-2024-43944.json) (`2024-08-29T16:15:09.197`)
- [CVE-2024-43954](CVE-2024/CVE-2024-439xx/CVE-2024-43954.json) (`2024-08-29T16:15:09.383`)
- [CVE-2024-43955](CVE-2024/CVE-2024-439xx/CVE-2024-43955.json) (`2024-08-29T16:15:09.570`)
- [CVE-2024-43957](CVE-2024/CVE-2024-439xx/CVE-2024-43957.json) (`2024-08-29T16:15:09.757`)
- [CVE-2024-43965](CVE-2024/CVE-2024-439xx/CVE-2024-43965.json) (`2024-08-29T16:15:09.947`)
- [CVE-2024-44919](CVE-2024/CVE-2024-449xx/CVE-2024-44919.json) (`2024-08-29T17:15:08.670`)
- [CVE-2024-45045](CVE-2024/CVE-2024-450xx/CVE-2024-45045.json) (`2024-08-29T17:15:08.977`)
- [CVE-2024-45056](CVE-2024/CVE-2024-450xx/CVE-2024-45056.json) (`2024-08-29T17:15:09.173`)
- [CVE-2024-8255](CVE-2024/CVE-2024-82xx/CVE-2024-8255.json) (`2024-08-29T16:15:10.140`)
### CVEs modified in the last Commit
Recently modified CVEs: `47`
Recently modified CVEs: `50`
- [CVE-2024-42167](CVE-2024/CVE-2024-421xx/CVE-2024-42167.json) (`2024-08-29T15:24:12.060`)
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-29T14:04:30.733`)
- [CVE-2024-42408](CVE-2024/CVE-2024-424xx/CVE-2024-42408.json) (`2024-08-29T14:22:45.603`)
- [CVE-2024-42493](CVE-2024/CVE-2024-424xx/CVE-2024-42493.json) (`2024-08-29T14:24:14.373`)
- [CVE-2024-4853](CVE-2024/CVE-2024-48xx/CVE-2024-4853.json) (`2024-08-29T15:15:31.687`)
- [CVE-2024-4854](CVE-2024/CVE-2024-48xx/CVE-2024-4854.json) (`2024-08-29T15:15:31.797`)
- [CVE-2024-4855](CVE-2024/CVE-2024-48xx/CVE-2024-4855.json) (`2024-08-29T15:15:31.893`)
- [CVE-2024-5423](CVE-2024/CVE-2024-54xx/CVE-2024-5423.json) (`2024-08-29T15:41:13.247`)
- [CVE-2024-7554](CVE-2024/CVE-2024-75xx/CVE-2024-7554.json) (`2024-08-29T15:42:13.387`)
- [CVE-2024-7610](CVE-2024/CVE-2024-76xx/CVE-2024-7610.json) (`2024-08-29T15:45:27.523`)
- [CVE-2024-7851](CVE-2024/CVE-2024-78xx/CVE-2024-7851.json) (`2024-08-29T15:22:08.227`)
- [CVE-2024-7852](CVE-2024/CVE-2024-78xx/CVE-2024-7852.json) (`2024-08-29T15:23:16.160`)
- [CVE-2024-7853](CVE-2024/CVE-2024-78xx/CVE-2024-7853.json) (`2024-08-29T15:22:52.710`)
- [CVE-2024-8211](CVE-2024/CVE-2024-82xx/CVE-2024-8211.json) (`2024-08-29T15:54:56.390`)
- [CVE-2024-8212](CVE-2024/CVE-2024-82xx/CVE-2024-8212.json) (`2024-08-29T15:53:02.077`)
- [CVE-2024-8213](CVE-2024/CVE-2024-82xx/CVE-2024-8213.json) (`2024-08-29T15:51:33.390`)
- [CVE-2024-8214](CVE-2024/CVE-2024-82xx/CVE-2024-8214.json) (`2024-08-29T15:44:45.280`)
- [CVE-2024-8216](CVE-2024/CVE-2024-82xx/CVE-2024-8216.json) (`2024-08-29T15:41:34.107`)
- [CVE-2024-8217](CVE-2024/CVE-2024-82xx/CVE-2024-8217.json) (`2024-08-29T15:39:43.643`)
- [CVE-2024-8218](CVE-2024/CVE-2024-82xx/CVE-2024-8218.json) (`2024-08-29T15:38:10.610`)
- [CVE-2024-8219](CVE-2024/CVE-2024-82xx/CVE-2024-8219.json) (`2024-08-29T15:35:28.000`)
- [CVE-2024-8220](CVE-2024/CVE-2024-82xx/CVE-2024-8220.json) (`2024-08-29T14:49:54.737`)
- [CVE-2024-8221](CVE-2024/CVE-2024-82xx/CVE-2024-8221.json) (`2024-08-29T15:32:11.397`)
- [CVE-2024-8222](CVE-2024/CVE-2024-82xx/CVE-2024-8222.json) (`2024-08-29T15:13:09.227`)
- [CVE-2024-8223](CVE-2024/CVE-2024-82xx/CVE-2024-8223.json) (`2024-08-29T15:11:36.127`)
- [CVE-2024-43111](CVE-2024/CVE-2024-431xx/CVE-2024-43111.json) (`2024-08-29T16:53:16.233`)
- [CVE-2024-43112](CVE-2024/CVE-2024-431xx/CVE-2024-43112.json) (`2024-08-29T16:51:55.937`)
- [CVE-2024-43113](CVE-2024/CVE-2024-431xx/CVE-2024-43113.json) (`2024-08-29T16:51:33.367`)
- [CVE-2024-43140](CVE-2024/CVE-2024-431xx/CVE-2024-43140.json) (`2024-08-29T16:04:30.370`)
- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2024-08-29T17:15:08.397`)
- [CVE-2024-43884](CVE-2024/CVE-2024-438xx/CVE-2024-43884.json) (`2024-08-29T17:15:08.457`)
- [CVE-2024-43897](CVE-2024/CVE-2024-438xx/CVE-2024-43897.json) (`2024-08-29T17:15:08.533`)
- [CVE-2024-44938](CVE-2024/CVE-2024-449xx/CVE-2024-44938.json) (`2024-08-29T17:15:08.753`)
- [CVE-2024-44939](CVE-2024/CVE-2024-449xx/CVE-2024-44939.json) (`2024-08-29T17:15:08.837`)
- [CVE-2024-44940](CVE-2024/CVE-2024-449xx/CVE-2024-44940.json) (`2024-08-29T17:15:08.903`)
- [CVE-2024-6200](CVE-2024/CVE-2024-62xx/CVE-2024-6200.json) (`2024-08-29T17:53:40.483`)
- [CVE-2024-6201](CVE-2024/CVE-2024-62xx/CVE-2024-6201.json) (`2024-08-29T17:52:07.493`)
- [CVE-2024-6202](CVE-2024/CVE-2024-62xx/CVE-2024-6202.json) (`2024-08-29T17:48:43.723`)
- [CVE-2024-6203](CVE-2024/CVE-2024-62xx/CVE-2024-6203.json) (`2024-08-29T17:46:28.790`)
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-29T17:41:09.627`)
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-29T17:35:34.820`)
- [CVE-2024-7538](CVE-2024/CVE-2024-75xx/CVE-2024-7538.json) (`2024-08-29T17:59:31.983`)
- [CVE-2024-7539](CVE-2024/CVE-2024-75xx/CVE-2024-7539.json) (`2024-08-29T17:59:05.223`)
- [CVE-2024-7540](CVE-2024/CVE-2024-75xx/CVE-2024-7540.json) (`2024-08-29T17:58:17.420`)
- [CVE-2024-7541](CVE-2024/CVE-2024-75xx/CVE-2024-7541.json) (`2024-08-29T17:57:37.673`)
- [CVE-2024-7542](CVE-2024/CVE-2024-75xx/CVE-2024-7542.json) (`2024-08-29T17:56:54.357`)
- [CVE-2024-7546](CVE-2024/CVE-2024-75xx/CVE-2024-7546.json) (`2024-08-29T17:55:47.547`)
- [CVE-2024-8208](CVE-2024/CVE-2024-82xx/CVE-2024-8208.json) (`2024-08-29T17:27:02.397`)
- [CVE-2024-8209](CVE-2024/CVE-2024-82xx/CVE-2024-8209.json) (`2024-08-29T17:23:42.873`)
- [CVE-2024-8210](CVE-2024/CVE-2024-82xx/CVE-2024-8210.json) (`2024-08-29T16:04:45.310`)
## Download and Usage

View File

@ -228512,7 +228512,7 @@ CVE-2023-38001,0,0,2e442ef5d1f9ada2569bffe28a8811d3833d9e464b2a836cb72bac6db743d
CVE-2023-38002,0,0,1540466a828ca09fbbbfd3a7d1fa6f341816e6e7a4b7eb520ebe82fd4c1ac11f,2024-04-30T17:52:35.057000
CVE-2023-38003,0,0,4ddd805b10542d9494e91de28e072619549d2912a77654914b8456fbaea47381,2024-01-19T16:15:09.013000
CVE-2023-3801,0,0,138ee77b03ceaffda7a612b3ad2047ee632ca7ad988ceac5a51bc864960549cf,2024-05-17T02:27:49.220000
CVE-2023-38018,0,1,e90323aa46f6ddf7da49bbec63d074de6a8cc1c6b6edadc7a1136ae6c87cd0d4,2024-08-29T14:36:06.443000
CVE-2023-38018,0,0,e90323aa46f6ddf7da49bbec63d074de6a8cc1c6b6edadc7a1136ae6c87cd0d4,2024-08-29T14:36:06.443000
CVE-2023-38019,0,0,a7483660a3183e15c0cacd3224b950f982216efcae0797ec3946c751f10866dc,2024-02-09T19:13:52.923000
CVE-2023-3802,0,0,fdc4ccc90abad68517d8f377a1b9d399dbf83c5fec5330e0570f27ac07aa9a11,2024-05-17T02:27:49.327000
CVE-2023-38020,0,0,c1a3e43867e9d72a298a543040b6cb59eef078f91f668f177194a59f028fba8e,2024-02-09T18:44:32.197000
@ -233699,7 +233699,7 @@ CVE-2023-45106,0,0,fbc31c2e756ccc5a3fd52adf0d7d39ff1df2073e098586b72e494128e11e4
CVE-2023-45107,0,0,7270dbbcbb0d162c169f41039436620133fcc51175878b91a9d4f170b75cabcf,2023-10-17T16:09:15.537000
CVE-2023-45108,0,0,3fca62a87c80e3ceed2144105cfeb194d64c18265c9a9cbc9d78d5f3e50bb1fc,2023-10-17T16:09:24.633000
CVE-2023-45109,0,0,6472ea14252e4c42f0459a0e30121fa69f31f56b9821a5ef246f725839294af4,2023-10-18T16:05:00.017000
CVE-2023-4511,0,1,d24533fd0edc1f7c6df4699767cb097b3c0dd98e9abc30e9e6bc85d38487729a,2024-08-29T15:15:16.010000
CVE-2023-4511,0,0,d24533fd0edc1f7c6df4699767cb097b3c0dd98e9abc30e9e6bc85d38487729a,2024-08-29T15:15:16.010000
CVE-2023-45111,0,0,84b48a2733a8c0d417c132a4b8ffb2cc2472dc8682ef5516e7d2dfc276c36f2c,2023-11-08T23:14:35.887000
CVE-2023-45112,0,0,49bde636916cd1ee29a0731cfa4c99b92b301a1f930adc5f1e3cec0becafc716,2024-01-02T20:15:09.040000
CVE-2023-45113,0,0,950e6fcbe60da381702704a6ce4e4e2ab402467f5d96d4ab4a3924f95436f9da,2024-01-02T20:15:09.137000
@ -233709,7 +233709,7 @@ CVE-2023-45116,0,0,b4fd89a810a73bc335960686e2a1d70617c79b22c07d93ec0246dbd542a92
CVE-2023-45117,0,0,a85cb65b8aba4c352d15fb027f503a57f38bdef5f76b91e0947cabcf64a522bb,2024-02-02T13:54:01.383000
CVE-2023-45118,0,0,091f4e2f5fcfa33b6e7f36486ad24c6d4b8524fc3c3ac07d054b7c9704af7736,2024-02-02T13:52:50.533000
CVE-2023-45119,0,0,e26dc0fc27a9196697f57b54c228774dbb67cc05f2e8c2c7bacd6cb784af5fe8,2024-02-02T13:46:30.707000
CVE-2023-4512,0,1,6d9f71ddd0bd96b5aa460c8c85024895a0f05780fd5f4c59bf4f575ee7a84883,2024-08-29T15:15:16.160000
CVE-2023-4512,0,0,6d9f71ddd0bd96b5aa460c8c85024895a0f05780fd5f4c59bf4f575ee7a84883,2024-08-29T15:15:16.160000
CVE-2023-45120,0,0,7c0552df998d5ab43f85d906531c40dba1a455b30ea99e39ad08f05c966afdd1,2024-02-02T13:53:03.567000
CVE-2023-45121,0,0,7ed9c4305ebb96b7ea766b8c6629dcad20a4cecff0105f790d3d7e2dccd34aaf,2024-02-02T13:53:15.323000
CVE-2023-45122,0,0,b3d0d07af2421999386dbc34d1b8a9c31bb18a82bacc9bb70bcefd33523477ef,2024-01-02T16:15:11.970000
@ -233720,7 +233720,7 @@ CVE-2023-45126,0,0,28945b283d1eb766908994420c992f9201250f6abfde1aaa65db5130bf3de
CVE-2023-45127,0,0,30c90cc89b399f3d1b72a2349697e65016cb2a7b03c6836d714824dc1f89ef7e,2024-01-02T16:15:12.150000
CVE-2023-45128,0,0,6ebb9075b19fb3af2468b3b03e67b952850560c98de207618c27a8f1ce4f7784,2023-10-23T15:26:25.743000
CVE-2023-45129,0,0,0467759a5a7a722f55a579a46b7838952a9e715d27d3cb4dcff5af0ca1096011,2024-01-07T11:15:13.270000
CVE-2023-4513,0,1,31de722ea89e9ac693bd993d96453905df7c75d78bf3f94f8dcc019c52de04a3,2024-08-29T15:15:16.273000
CVE-2023-4513,0,0,31de722ea89e9ac693bd993d96453905df7c75d78bf3f94f8dcc019c52de04a3,2024-08-29T15:15:16.273000
CVE-2023-45130,0,0,706c11d84cec202b42e08a10e8c6c10bf11cafc3890d23c36033f3b74b889d39,2023-10-24T13:56:46.973000
CVE-2023-45131,0,0,0006aebbe9713a57123eab3e5e4745051796288af4ddba6f414c3ab9aad7e29e,2023-10-19T17:55:24.940000
CVE-2023-45132,0,0,a429013d71839c503c670b051b72c7c43a3c6edfcaecda63e9d08d96c02be6a1,2023-10-18T02:38:01.093000
@ -236389,7 +236389,7 @@ CVE-2023-48734,0,0,a00e8ed9ee0297d00e14120c92d2a34537ed6acb89fdf7c729a6a201564b8
CVE-2023-48736,0,0,4650ae42f478c55f2b393531a489f1fc49543408c2d8e38b1a17c7256fae4372,2023-11-24T23:03:02.490000
CVE-2023-48737,0,0,e4560c9906d1fbdd6d266c2aa73ffd6bd8ec68563549f710a6c35930b7ddcb22,2023-12-05T20:36:45.767000
CVE-2023-48738,0,0,28320da5d8b4badef834d846531ed99ad65c6e55d5df842c60a7dc44dbae1614,2023-12-28T17:19:48.890000
CVE-2023-4874,0,1,7ec57aef589de6c7a302f36fc20a6daa5269966d29fd5f66fc81f0c476fb37c6,2024-08-29T15:15:17.083000
CVE-2023-4874,0,0,7ec57aef589de6c7a302f36fc20a6daa5269966d29fd5f66fc81f0c476fb37c6,2024-08-29T15:15:17.083000
CVE-2023-48741,0,0,d9f7a9a3730621e027c316d995c5fc98d883877c35b20802879521df47443949,2023-12-22T12:13:54.117000
CVE-2023-48742,0,0,ae5a1d41144d1b2bbb0075b4a759503755f5ba906ed41fb9b6794fe8c7da3cfc,2023-12-05T20:10:51.070000
CVE-2023-48743,0,0,223af7476bf80d3f135e206b9d7e56e581693ff7d9317d8c49e8b198e23f86fa,2023-12-05T20:44:29.720000
@ -236399,7 +236399,7 @@ CVE-2023-48746,0,0,848c3d4be5eae4868e50aab87d198759270bc8785e361f0c91f8f5939f81e
CVE-2023-48747,0,0,56bd1c86f1b962a00a0fb6fd287d423bd4b6913b43602c6ac65d1313a90967eb,2024-06-04T16:57:41.053000
CVE-2023-48748,0,0,3a191f52c51e4e3b00825d6727a316031398f86fe994680b7675b1f4ad8abb49,2023-12-06T13:15:14.420000
CVE-2023-48749,0,0,21a0008c77fa48e7fbe865156eb07bde39ebd5553e98dd6f02dcbab5f6712372,2023-12-06T13:07:08.697000
CVE-2023-4875,0,1,330510a5f50be8514d5c6630658b6ff351e9f205aef74327ab6c30e061778f20,2024-08-29T15:15:17.237000
CVE-2023-4875,0,0,330510a5f50be8514d5c6630658b6ff351e9f205aef74327ab6c30e061778f20,2024-08-29T15:15:17.237000
CVE-2023-48751,0,0,5b6277f8a946f765078cc632cd7d9aa7ddcb7bcd9a46d291120efbb3d173483d,2023-12-22T19:32:34.560000
CVE-2023-48752,0,0,c7bff7335a8b87ebb665fb4afb72152c835c7f9be35b8823b89b11b42d582b39,2023-12-06T13:29:00.633000
CVE-2023-48753,0,0,81a8947f287238098b07eb62ed0f18056b0471663741d2de02c9e59f00e743d0,2024-06-04T16:57:41.053000
@ -239410,7 +239410,7 @@ CVE-2023-5367,0,0,efd9da0c3b505e23a32df4c9629d9848bfbedd4a3ea11b62e5e00482040a5a
CVE-2023-5368,0,0,0df12c45aaa77bf6ce37007847b453df8f5ac596bcae57cab997ea01f4081245,2023-11-29T21:15:07.940000
CVE-2023-5369,0,0,7744a4fd27d2004c0e4c46e14e40bce9f176927c88d426d86938484a0e412b46,2023-11-24T09:15:09.607000
CVE-2023-5370,0,0,1f06d5703fc9b70672f97f38dfea8a8287490a5093e641fb4cf61d0bba1dd961,2023-11-24T09:15:09.677000
CVE-2023-5371,0,1,7846bcff40bac06dcf49d2a9812d0c1df875c5b3b357888d38a5d1961cd87141,2024-08-29T15:15:18.620000
CVE-2023-5371,0,0,7846bcff40bac06dcf49d2a9812d0c1df875c5b3b357888d38a5d1961cd87141,2024-08-29T15:15:18.620000
CVE-2023-5372,0,0,7c68f8d7268b3e1bcf17984e2978b6d102abf3dc944cad402eb61e2cdbaf8e93,2024-02-05T22:05:37.100000
CVE-2023-5373,0,0,1e9ecbd62ee4b8d32e24aa239b29efaacc0592814aff42cec489729b320c68a4,2024-05-17T02:33:02.550000
CVE-2023-5374,0,0,bbad172aa30166f85ca2e7d3ff515943900e68e6abf27c8173e4afc98be4168f,2024-05-17T02:33:02.667000
@ -240151,7 +240151,7 @@ CVE-2023-6164,0,0,e3c7a4e1a48cdc5842324b064dce28c65508494dbd8ed8164cc5d0471b79e7
CVE-2023-6165,0,0,f2107d2c5066c4712c5e6046aa2042ac235d7ccea34c7b634e11d536dcfbb123,2024-02-03T01:25:24.337000
CVE-2023-6166,0,0,8ece2e2d79a609a08ecc0c03118f7e745d671c37963cfff162ddd8985af2f1e5,2024-01-02T20:19:26.667000
CVE-2023-6173,0,0,7343adaf58fed61e2086b4eef6da46bf9e5f5bd6eb82579bb07a9a0f4b200b6f,2024-03-27T12:29:30.307000
CVE-2023-6174,0,1,b18cc71d2d83aec30453bba31c5e82417721fed62c9c04c095c5b68e826ed0b5,2024-08-29T15:15:19.920000
CVE-2023-6174,0,0,b18cc71d2d83aec30453bba31c5e82417721fed62c9c04c095c5b68e826ed0b5,2024-08-29T15:15:19.920000
CVE-2023-6175,0,0,292fd6fdc7771829084e15d62e77b3249f391ad47293997aeaf57e990740cb16,2024-03-26T12:55:05.010000
CVE-2023-6176,0,0,9ad01adc2f8f8499cb3fffbc9bd4b3a9dd6a8634a9696f484302b53740d28e61,2024-05-22T17:16:08.200000
CVE-2023-6178,0,0,035ab38e16ffe5bdad2680ee51a4ea3ab582dc29b7de69bf38d25dbae50381b7,2023-11-29T18:01:19.947000
@ -241240,7 +241240,7 @@ CVE-2024-0203,0,0,063b59469e2d39d3db7df75ad382d128061b0bf35a42a91806dea69f49fa0d
CVE-2024-0204,0,0,b699cb0fbfcef2df86d44e0a162ba4e8c4378079895d2d432198e9a7796b6315,2024-02-02T17:15:11.167000
CVE-2024-0206,0,0,63fd657c886e5842afc346785e22e00af6ba0840c2bfa9e341295b72f7a0731e,2024-01-16T16:27:52.677000
CVE-2024-0207,0,0,92126e05630e46ac6b3b41ff18aff265f84766fbd2d4983e56651e39802335c7,2024-01-09T19:10:05.427000
CVE-2024-0208,0,1,dfd8552982a97f54cd8e4a1f56cb66bc44fff84d9857e50fe5416e3a0b125963,2024-08-29T15:15:21.790000
CVE-2024-0208,0,0,dfd8552982a97f54cd8e4a1f56cb66bc44fff84d9857e50fe5416e3a0b125963,2024-08-29T15:15:21.790000
CVE-2024-0209,0,0,cc0e1ecc7304ff68fa47a1f32da6280f90788be09a6a4fc8a6049bb9009ef2d0,2024-01-10T14:03:18.133000
CVE-2024-0210,0,0,003de43c8cb0648e807f2160fc3e94690a662553ef75a914de5ae3244c3d24e3,2024-01-10T14:07:07.967000
CVE-2024-0211,0,0,71444c509eeea6381d6338958856769bbb7e4d327c064d335e6903f1dbffc18c,2024-01-10T14:11:32.643000
@ -242032,7 +242032,7 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000
CVE-2024-1056,1,1,de3c2d857f7930bb1c671747f74c34923b31d208024f21be90fd913c538ffa81,2024-08-29T14:15:08.270000
CVE-2024-1056,0,0,de3c2d857f7930bb1c671747f74c34923b31d208024f21be90fd913c538ffa81,2024-08-29T14:15:08.270000
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
@ -249488,7 +249488,7 @@ CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535
CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000
CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000
CVE-2024-2954,0,0,99a73523d01afd84aef469d44b1c2063cfbc0f879cb72415c9f7459e0fff3d47,2024-03-27T12:29:30.307000
CVE-2024-2955,0,1,87371e2fa0fa36bb69e79b36b51ab6671837d2afbbe8e39b32a028ea544a110a,2024-08-29T15:15:26.130000
CVE-2024-2955,0,0,87371e2fa0fa36bb69e79b36b51ab6671837d2afbbe8e39b32a028ea544a110a,2024-08-29T15:15:26.130000
CVE-2024-2956,0,0,ad593b0c44562e3ed1ca80e2bc8e78ccbad39173a3cee350a26fd67da322884b,2024-03-27T12:29:30.307000
CVE-2024-2957,0,0,f9a1c843e62657fa10197867d25d9608c11fa033333e2c1c375aa097ac937bcc,2024-04-24T16:15:08.880000
CVE-2024-2958,0,0,6190889b2483175e407a7ae396217803a4ef295821a00f7dd7e406dd588e1839,2024-05-02T18:00:37.360000
@ -250122,7 +250122,7 @@ CVE-2024-30346,0,0,5b5a05e58b1d0147ecf944d685aa2cb684c437094256980b72baf598e0e39
CVE-2024-30347,0,0,3832109021fb5377af15708c62232a57c5d24e9d2ff3a0f47b969600fc56c7e2,2024-04-03T12:38:04.840000
CVE-2024-30348,0,0,b7419de89d8ae654b53594301d010d5fddf20c53591f31b58044cfc4d2546f37,2024-04-03T12:38:04.840000
CVE-2024-30349,0,0,25aa9323693beb08b7ab8bd5f7a119ec8b674d7e4855843e08ed1d40130ed8a9,2024-04-03T12:38:04.840000
CVE-2024-3035,0,1,84d1ec277576a780cef192bef4ba512edc27cfd9900e8cd035d06ddf2ea6bd18,2024-08-29T15:55:30.247000
CVE-2024-3035,0,0,84d1ec277576a780cef192bef4ba512edc27cfd9900e8cd035d06ddf2ea6bd18,2024-08-29T15:55:30.247000
CVE-2024-30350,0,0,8e1b9e28a9318580e1c2a60beb33a603136695646ec8eec64233a58463351c70,2024-04-03T12:38:04.840000
CVE-2024-30351,0,0,ecc0a626d0b84c1ea6187fb97e8580125e971055c09fe20b6f73f3ab539147d2,2024-04-03T12:38:04.840000
CVE-2024-30352,0,0,5f84adb833e26addccbf839c02a46013d238d5f13fa74ae57d6b24ed1b254339,2024-04-03T12:38:04.840000
@ -253093,7 +253093,7 @@ CVE-2024-34632,0,0,bf1da971d9c08dbfc3ba6b9b0305e27336a8eced8062af973a4612b88c383
CVE-2024-34633,0,0,dcc919d4fe3cd88a5fcb40687da081e03a0a9de314e12214fe0ef228c52e1a41,2024-08-09T21:17:19.217000
CVE-2024-34634,0,0,ca7a7dede48188d5d254d269b40f8d801c38580350c32ea8a5414c109ee76db9,2024-08-09T21:17:55.090000
CVE-2024-34635,0,0,f315481fa1588ad6ec51d6f8cc1b6dc04d19bc1ee3f7f3e279e9f419b1b04cd7,2024-08-09T21:18:43.303000
CVE-2024-34636,0,0,12a9dce84f7a16975e916eab6b83a39752b1b5e387c65698edba42a30c7632cd,2024-08-07T15:17:46.717000
CVE-2024-34636,0,1,6d289e439c66cba4f752a544d7ace1fe5b0d959e931f99945923c8bb0b32e8a7,2024-08-29T16:47:17.790000
CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000
CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9c6,2024-05-17T02:39:57.623000
CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000
@ -253333,10 +253333,12 @@ CVE-2024-35108,0,0,26473bc212f25b793c66f492376510c497f3c8040fd855e035e2125e4662c
CVE-2024-35109,0,0,5c37b5989db27d73a1b7673ab81df5907cc813f794f46739f6fbd9e9480590e6,2024-07-03T02:01:24.210000
CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9863,2024-07-03T02:01:24.987000
CVE-2024-35116,0,0,a563a8223baddb703f5fd1f07e904d7e927e5f21b3c89fcbd6f74db44a319ee0,2024-08-21T14:46:12.917000
CVE-2024-35118,1,1,0ba40b2c40c6ef09fda731446e7f6b93958b2e36babf45f7052eb6f5ef7a825c,2024-08-29T16:15:08.613000
CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
CVE-2024-35133,1,1,f117f91f3e95afe4d2dd250750987e5f67e3a949e9f3fd8318dfe78ce48a068f,2024-08-29T17:15:07.250000
CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
@ -253675,17 +253677,17 @@ CVE-2024-35693,0,0,e9d6d5328e43619ca35047fa4aec0165648618a0099fad8edc05f1d25b849
CVE-2024-35694,0,0,fa45a43cd0fca65456e25f7d940aec56387ace25f593dbbf13cc74603be2d7df,2024-06-10T02:52:08.267000
CVE-2024-35695,0,0,e6774df5e218aae62240ec538fbe0c6292369ab8cde553ab0497ca5dcedecae2,2024-06-10T02:52:08.267000
CVE-2024-35696,0,0,f9216d277779898afaead63d25822320ecb0ebd5314813eeae6443a71f1a9c32,2024-06-10T02:52:08.267000
CVE-2024-35697,0,0,fc9e27ecfc9c9c128323ab157c3b6c99d22ee14655fd8e89d997eabad82cf5ce,2024-06-10T02:52:08.267000
CVE-2024-35698,0,0,a16711ce2250dda75e7529b01c95902f9d909b39a590cbd4669ddcfb4ae0c6ad,2024-06-10T02:52:08.267000
CVE-2024-35699,0,0,707bf0c09fc4f07750d1dea0e82ed1452e318500cfed0af9de751e559535b9cf,2024-06-10T02:52:08.267000
CVE-2024-35697,0,1,ed26483e03d41cbda2679aca1662298d32b2cfe43e2a2b534c7112e53fc75b2f,2024-08-29T17:13:49.557000
CVE-2024-35698,0,1,ce5805ea174c7d79028851b201d10370f7d8980a44f785817681e8858e08f43b,2024-08-29T17:11:36.290000
CVE-2024-35699,0,1,bb29147c315960e5ea1d6cdd4347723d85b9a10f4d38a78e1ce06e8ac950d004,2024-08-29T17:09:55.017000
CVE-2024-3570,0,0,14d409ce8afc07e662d828a6ab25c728d3a76a8eb5212a6ebb12dbb35e62d13c,2024-04-10T19:49:51.183000
CVE-2024-35700,0,0,2082b99df626f3c53a70be6652424ac88700e845ec65f8217af149e8e0e0187c,2024-06-05T19:50:49.063000
CVE-2024-35701,0,0,10f1483050674df5abda790355dad6d957797f166d8af293f2bf2668961754fd,2024-06-10T02:52:08.267000
CVE-2024-35702,0,0,c1602183873805e76800206a0b20cb0e587aac04d99c688f397b00147f20c8bc,2024-06-10T02:52:08.267000
CVE-2024-35703,0,0,ad829ba9fb3ae9bec8d547c2ff356ab6c9ae5041e57e5dd325f1f5d6e6bd0d2b,2024-06-10T02:52:08.267000
CVE-2024-35704,0,0,1ef252fc47b63ae5577862bad55151900a685bef0b4e038b088085da28ee841a,2024-06-10T02:52:08.267000
CVE-2024-35705,0,0,c66b4e3384c3335eecc11b7d9decb16ef720f1d9418e3325b6fc3bf79bf6fb85,2024-06-10T02:52:08.267000
CVE-2024-35706,0,0,36fc4d1192fa0ed0c1ca2e0b2d11cd0d458e72a98aeeb799c2b4c67715a93e15,2024-06-10T02:52:08.267000
CVE-2024-35701,0,1,d5ea4cbe296186cbbbe13c0c1fec760c341a040f00a0104092e554251ceed7c9,2024-08-29T17:09:25.947000
CVE-2024-35702,0,1,efc0987310e7ee4022ef9f2c02fd77dca4c34d10c2575700fa4bcc69be53cbba,2024-08-29T17:08:38.977000
CVE-2024-35703,0,1,3a96ec9b3644f1c7dd0d28c53c2f590110cc960e7aa39bd9d116fadab3aba7c8,2024-08-29T17:08:03.143000
CVE-2024-35704,0,1,ae5be5424bef2556b4370d869261327b1da2eddd5e4a18109fa239e39f53e1cb,2024-08-29T17:02:43.597000
CVE-2024-35705,0,1,9053adc6cf334c9dbafcc0a27f9f810135153f91d5c401677339a00569c21063,2024-08-29T17:01:16.963000
CVE-2024-35706,0,1,79fe0b73bef78d05b24efbde9566e39867ee0263619bdfa610bb3d5382ce98c4,2024-08-29T16:59:18.167000
CVE-2024-35707,0,0,0ee310226c2a1088ce4cc2fd07c766b5de5fe5d2430ff3462faf2183e3a037ef,2024-07-12T18:37:07.387000
CVE-2024-35708,0,0,ca93af420e3f8f45585fa8a15603b388b58f6dd371fec7b6dc2b7e829270e63d,2024-07-12T18:34:58.983000
CVE-2024-35709,0,0,a34d189a3edc4b01d77993b9bc5b9ee5e3693414eac1d35315061d1249515135,2024-07-17T19:50:21.950000
@ -253888,7 +253890,7 @@ CVE-2024-35891,0,0,020345e2d6b07ed9ebb9279a6d9a2dea40c65eb51e6d3fc0c5cd350efe2fc
CVE-2024-35892,0,0,f5dcb897850b4e8e41108cf32bfe1cea3b258cecc6972cb2630293f619e933f1,2024-05-20T13:00:04.957000
CVE-2024-35893,0,0,e6a35e25225cefb5ffa6b77cac4a079ee713f0238e7e35e74660e66bb0ecc8c4,2024-06-27T12:15:25.943000
CVE-2024-35894,0,0,1790b8bdc53af1b32b593033531b9c956bd1f4a63d07b8a3998381f55832751a,2024-08-12T13:38:21.393000
CVE-2024-35895,0,0,04b8c84c878a9450c1f88c15bd12e0ef9e879448b59cab521eb060ea69ee20a0,2024-06-25T22:15:32.367000
CVE-2024-35895,0,1,c7298cadfd8993347498fa8764731635c42612e209d877b8a7a623f8de654d15,2024-08-29T17:15:07.480000
CVE-2024-35896,0,0,38740fa9e0e28c1998375bca10b45aa3bea5349d16d5bb779072be0a08a5ef50,2024-06-25T22:15:32.433000
CVE-2024-35897,0,0,93dd335f3c661b184a9126ceda6682793e22f6e45c2ebebcb998960eb0c68b3e,2024-06-25T22:15:32.503000
CVE-2024-35898,0,0,f2046edcf7a6f808589e35b06e7686f88f49d32de2ed71667b4d90ced64d89c8,2024-06-27T12:15:26.020000
@ -253934,7 +253936,7 @@ CVE-2024-35933,0,0,4a006ff1d079bb6d954a703f87d533b7f3dd5e7b2e9028e0e41ad1d21adb9
CVE-2024-35934,0,0,0074842a9c706dbd9c15c5cd1ffb5fceea675b039259cbd3fb7970e83e04fdc8,2024-06-25T22:15:33.297000
CVE-2024-35935,0,0,b94869c332d09bfe61cff6d159d41a8e57443d1fa9193ea58cbd56fba95a88c7,2024-06-27T12:15:26.480000
CVE-2024-35936,0,0,46d1dbdbb72380e2ba09d30c538200959b97015bd1818d0db72d18f5ea45cc57,2024-06-27T12:15:26.557000
CVE-2024-35937,0,0,93fcbe510ec686fbb205b42b495c111a3131137ddd8ca181b80e1bc0bc2c5176,2024-05-20T13:00:04.957000
CVE-2024-35937,0,1,82ae4c40831eb21b97830c83aa109556727d4998434151f06721cb4830c701c3,2024-08-29T17:15:07.693000
CVE-2024-35938,0,0,3f987b7ccefd2cd20e4d391a23ba6e09329f701463b576eb89a69b4f7db8fda6,2024-05-20T13:00:04.957000
CVE-2024-35939,0,0,3435308e48b9031f980a7816e91db2cd949c1c4fb158cd17fd95158f54ec6d85,2024-05-20T13:00:04.957000
CVE-2024-3594,0,0,1fcc427f6e76d134c9c043bc92e809df42d05397e52529d77504b8d09b2dcb95,2024-05-24T01:15:30.977000
@ -253966,7 +253968,7 @@ CVE-2024-35962,0,0,4b628f3f57455942301b439ab908f4e8ff039f128cecf651c9be39d0756f5
CVE-2024-35963,0,0,4b2be953857cf7766b285dd241b22e01e396b3d7d820828527a730e260b4992c,2024-05-20T13:00:04.957000
CVE-2024-35964,0,0,f5d9d27ea8b6760773238ebfd515582b0f9cc759b00964f08a322ebd6015ec80,2024-05-20T13:00:04.957000
CVE-2024-35965,0,0,5fc20a16adf1b5ba78e69e7408dfe0a43ea1642272fd65b91b585a26a2b5eafc,2024-05-20T13:00:04.957000
CVE-2024-35966,0,0,a5319755f6591f8202511c7783483f917bd9f85228d52157a7031baedf283355,2024-08-19T05:15:06.383000
CVE-2024-35966,0,1,e2dd13477fd97a555220d38dd72c0005b7eb675750212f81b146d8e838895b36,2024-08-29T17:15:07.763000
CVE-2024-35967,0,0,e3e23303b3dc5d4a65fe66a5f540e6a1db2b9194c0c160b04b3c6d8794f3528f,2024-06-25T22:15:33.880000
CVE-2024-35968,0,0,439ccc18325908cd4ef3a9bd891d3376dacc1d470b882c7bccea812445a8152e,2024-05-20T13:00:04.957000
CVE-2024-35969,0,0,c7e6b7ae441187279ecf5e21ff7ea13c1669f067e7c32158b493f5f3f86ee309,2024-06-27T12:15:26.887000
@ -254947,7 +254949,7 @@ CVE-2024-37373,0,0,26dc5e4538b7cd09464c61fb65e8031c578a3247488f84f82c407880c1c74
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000
CVE-2024-37382,0,1,a8a740545d65ebc631499231db822baee95a9596af82e521bd493b8948bb2169,2024-08-29T14:29:32.920000
CVE-2024-37382,0,0,a8a740545d65ebc631499231db822baee95a9596af82e521bd493b8948bb2169,2024-08-29T14:29:32.920000
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000
@ -254999,7 +255001,7 @@ CVE-2024-37459,0,0,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b690
CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000
CVE-2024-37460,0,0,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000
CVE-2024-37461,0,0,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000
CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000
CVE-2024-37462,0,1,cad64247feae7f9612226534addea8bce3646425783d879f460a4125c6bd3239,2024-08-29T16:05:11.203000
CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000
CVE-2024-37465,0,0,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000
CVE-2024-37466,0,0,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000
@ -255486,7 +255488,7 @@ CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
CVE-2024-38219,0,1,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
@ -255821,7 +255823,7 @@ CVE-2024-38688,0,0,6c1e1c63760b8f330227267f950d647098745020ef3d161e16c9e453d5d48
CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000
CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000
CVE-2024-38692,0,0,761911cf70aa71c41ae3228fdbacf4aede8e08f3f941d9d59231e75b06896f24,2024-08-14T16:48:07.087000
CVE-2024-38693,1,1,82c772919ce606d575041c0bd11db9495504e9e49419e87364efb9dee4bf3b39,2024-08-29T14:15:08.680000
CVE-2024-38693,0,0,82c772919ce606d575041c0bd11db9495504e9e49419e87364efb9dee4bf3b39,2024-08-29T14:15:08.680000
CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa04b9,2024-07-22T13:00:53.287000
CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000
CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000
@ -255895,8 +255897,8 @@ CVE-2024-38787,0,0,0f1e7f4afcb5fbe9535514f1a824c8730251f75282d7daebf1c4763462ac4
CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
CVE-2024-38793,1,1,56f700637cd7fdeb3c401737e9f5e59b82cd4af11e5b9bc6195c7024686f879e,2024-08-29T15:15:26.260000
CVE-2024-38795,1,1,3533c7963609c8889d5345e27732738f5a370e9d4bd4d6063d7cdcbf7dc5484a,2024-08-29T15:15:26.460000
CVE-2024-38793,0,0,56f700637cd7fdeb3c401737e9f5e59b82cd4af11e5b9bc6195c7024686f879e,2024-08-29T15:15:26.260000
CVE-2024-38795,0,0,3533c7963609c8889d5345e27732738f5a370e9d4bd4d6063d7cdcbf7dc5484a,2024-08-29T15:15:26.460000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
@ -256088,7 +256090,7 @@ CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb
CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000
CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000
CVE-2024-39283,0,0,b7e0387ba5dd8a48e1248bb2bf0b89b8e5d589734af2917b519d63ca9a728676,2024-08-14T17:49:14.177000
CVE-2024-39287,0,1,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000
CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000
CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000
CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000
CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32cc4,2024-07-15T07:15:14.940000
@ -256318,7 +256320,7 @@ CVE-2024-39570,0,0,477f2cc2b899254fd1996622a7d04056a7ae423def8bf935cbc64caf51d26
CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff34f,2024-07-09T18:19:14.047000
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
CVE-2024-3958,0,1,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000
CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000
CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000
@ -256337,9 +256339,9 @@ CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fd
CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000
CVE-2024-39619,0,0,eba9a3263593a35724815600925b04c780a0fc23aea386d231775aed259a1e52,2024-08-02T12:59:43.990000
CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000
CVE-2024-39620,1,1,7802e2514fe1fc988c55d2b027b5305c61aad4c32442e446f5977e8482a818e2,2024-08-29T15:15:26.710000
CVE-2024-39620,0,0,7802e2514fe1fc988c55d2b027b5305c61aad4c32442e446f5977e8482a818e2,2024-08-29T15:15:26.710000
CVE-2024-39621,0,0,0c249e1c45f38e7803d96351e629758e9c24acaebc0fdee9ecbe6f2310164e1b,2024-08-02T12:59:43.990000
CVE-2024-39622,1,1,93470736c4d8ca6136ff38301c594010725269f3a08588045ddac2ce8f10106b,2024-08-29T15:15:26.900000
CVE-2024-39622,0,0,93470736c4d8ca6136ff38301c594010725269f3a08588045ddac2ce8f10106b,2024-08-29T15:15:26.900000
CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000
CVE-2024-39626,0,0,d18b40bac7879d91efce41316f457b002a06c0098fd8a51342c25f4f7011fae6,2024-08-02T12:59:43.990000
CVE-2024-39627,0,0,f6ecb8eb87a0844a06d33fd61ce1655e1dc35cf5d41af8bf595cbdcdb232937f,2024-08-02T12:59:43.990000
@ -256352,7 +256354,7 @@ CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab57042
CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000
CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
CVE-2024-39638,1,1,19f0415de3c51a8807e008f82d87fd5aeb3612f319a69355bb604584c1360df0,2024-08-29T15:15:27.093000
CVE-2024-39638,0,0,19f0415de3c51a8807e008f82d87fd5aeb3612f319a69355bb604584c1360df0,2024-08-29T15:15:27.093000
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
CVE-2024-39641,0,0,82efe19acefcd120a9c9ff4b95bce8c452c5423902a3f6b1c0041639db255e62,2024-08-27T13:02:05.683000
CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000
@ -256366,11 +256368,11 @@ CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56
CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000
CVE-2024-39651,0,0,7d85dfbdb174a6f544eaa1e3819a7aaa062f2afb0dc7664ef14d20fe53cd5df3,2024-08-13T12:58:25.437000
CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000
CVE-2024-39653,1,1,4c53351edc612276d20f37e7113faaa6ef91caca349b69a3ad7f5783a92f282c,2024-08-29T15:15:27.297000
CVE-2024-39653,0,0,4c53351edc612276d20f37e7113faaa6ef91caca349b69a3ad7f5783a92f282c,2024-08-29T15:15:27.297000
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
CVE-2024-39657,0,0,5011bc23ca38c6d5baf0733a7f30352cc204af31d9e0f5e595f8e34352825b69,2024-08-27T13:02:05.683000
CVE-2024-39658,1,1,9843671c5781ced2ba4647a9fa8ddec2df376aee4b080aecaab6e122cbac3f43,2024-08-29T15:15:27.493000
CVE-2024-39658,0,0,9843671c5781ced2ba4647a9fa8ddec2df376aee4b080aecaab6e122cbac3f43,2024-08-29T15:15:27.493000
CVE-2024-39659,0,0,a80d18e493149233fc317020eaf978d1056512cfa7b08cba1fd89af8c4735b0a,2024-08-02T12:59:43.990000
CVE-2024-3966,0,0,f4286335c18162e5dbc573cbc605017489ac12efad77a1ff38ff47be3739d726,2024-07-29T16:52:33.533000
CVE-2024-39660,0,0,2b50deef651f27c87abd29110a94a6037b7dd1c45da64101f17c9a9b365c5efb,2024-08-02T12:59:43.990000
@ -256390,7 +256392,7 @@ CVE-2024-39673,0,0,b1c068f44d0a9aaaf8f58599b1cb881e705b5c945a7c5d93ce78a0cb82068
CVE-2024-39674,0,0,2dd73b99ef60d794197fe0c13977ff0f37547f24c6b5b5c262c92f54addb5ff8,2024-07-26T15:58:35.743000
CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000
CVE-2024-39676,0,0,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000
CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000
CVE-2024-39677,0,1,19aae0820e5763c55aac1da448f1925f52fbe74ae58ddaf8ead6691b86cb8c47,2024-08-29T17:29:55.003000
CVE-2024-39678,0,0,f0f13ad18e725d440582b3a4bbd425936455389008ece86cf58b8c9519b22e2a,2024-07-18T12:28:43.707000
CVE-2024-39679,0,0,ce5bdc949f2b785748533e9e266e218a34e39cb3d0887231dc8fbb4c0a149bec,2024-07-18T12:28:43.707000
CVE-2024-3968,0,0,6e8a3540463fef006a115080523279717acfbbd27b5f9241de34d6d7c04d7716,2024-05-15T18:35:11.453000
@ -256445,7 +256447,7 @@ CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc
CVE-2024-39744,0,0,eaaeebefac8456b26ecfd964a052066c190ef164bcd0d35d42d232bd669213ce,2024-08-23T15:25:31.390000
CVE-2024-39745,0,0,76dcbb05d353e026eccc967feaecdea5409270418987883e30491009b8479ad5,2024-08-23T15:25:13.470000
CVE-2024-39746,0,0,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335ab2c,2024-08-23T15:25:02.123000
CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000
CVE-2024-39751,0,1,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb518,2024-08-29T16:56:32.053000
CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000
CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000
CVE-2024-39771,0,0,3ba9b721b5c229a6c3ffc099ca1090515a4191b0f891c631b67f12313c68d6a9,2024-08-28T12:57:27.610000
@ -256509,10 +256511,10 @@ CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
CVE-2024-39880,0,0,0d3895a20f18a607a453633781a142af12d0a093a0d7a45eb45a661fea050a2f,2024-07-11T13:05:54.930000
CVE-2024-39881,0,0,999c16f1ea871f358fb56e0ffa53bb22ecb2f8b8a97cd93e5b9be53ed882a2df,2024-07-11T13:05:54.930000
CVE-2024-39882,0,0,2b1d641988e25ea4cb8b4c68e5e9ac731c9bf897b66cd83c102a37f8e19ead14,2024-07-11T13:05:54.930000
CVE-2024-39883,0,0,655aeffdc9352f9b176539ef891d133cc8279a64d289dc6a7e745dfe50400306,2024-07-11T13:05:54.930000
CVE-2024-39880,0,1,420ebd90d89764260e107140863beba300a2b5634b205f073c7d4f785b402bdb,2024-08-29T17:38:18.727000
CVE-2024-39881,0,1,6a404ecfc7936b252de6c2cb5c510b917ceff7b4e467b10d3074afc0f4e7d06b,2024-08-29T17:37:05.707000
CVE-2024-39882,0,1,9a57dc33a7a0a78da42a2edafbf913fff71c18f9571da8d380827d41446184ae,2024-08-29T17:34:50.673000
CVE-2024-39883,0,1,29ddfce2130fdc343b1b6ac7c36a22cc5501c3525384f2f6d479cb8846f6f2b8,2024-08-29T17:33:42.420000
CVE-2024-39884,0,0,b9e05b4445bddfb9478e0e90c8835a614732b107588b9ad68c5d004f07dc549b,2024-07-17T21:15:11.743000
CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000
CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0484,2024-07-16T14:15:04.380000
@ -256592,7 +256594,7 @@ CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
CVE-2024-40096,0,0,f4d93815f52e3c16c28040ba21795a35002b57c191156f911baad6e63290a17a,2024-08-22T20:15:09.340000
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
CVE-2024-40101,0,0,fa05a141dcc36735ee72bbd0c3b7b1a769814f7631a0be292d4f64087437d8d6,2024-08-06T16:30:24.547000
CVE-2024-40101,0,1,886521863c96c11be959a1cf217c3eefcb0791bdf3b877e4dc348f32f4062dae,2024-08-29T16:57:16.727000
CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca1da,2024-08-26T17:35:05.733000
@ -256888,8 +256890,8 @@ CVE-2024-40902,0,0,4e014392b4dbdf4c3eaa1eaf547c1f15e32d34ee0d2ed889e6560c95939be
CVE-2024-40903,0,0,651b7373d15f2926785ce0de2df21ae36288d984de87f3f47e275557d5da218e,2024-07-24T19:01:54.317000
CVE-2024-40904,0,0,9aa568b0e026595888acd360a993289314f39d24eb5e574eafaa70b28e216bd9,2024-07-12T16:34:58.687000
CVE-2024-40905,0,0,96eb254d5f8b6d07fa83b1d2229752059acc8f42da01741b8cbd4eaae04230ff,2024-07-12T16:34:58.687000
CVE-2024-40906,0,1,e06807da66b955824f3da74667c1beb9d0fb817d00aa3f4618de93e654a43a9e,2024-08-29T14:48:18.870000
CVE-2024-40907,0,1,95a9f96ca6af7331dbd0daf36905e29922cf13f1aa483339e6a94a1730bf2093,2024-08-29T14:48:30.593000
CVE-2024-40906,0,0,e06807da66b955824f3da74667c1beb9d0fb817d00aa3f4618de93e654a43a9e,2024-08-29T14:48:18.870000
CVE-2024-40907,0,0,95a9f96ca6af7331dbd0daf36905e29922cf13f1aa483339e6a94a1730bf2093,2024-08-29T14:48:30.593000
CVE-2024-40908,0,0,6cdce7f53523afe33cba2998c01eb82605e728b8ccb05b039038c6b90e3df5fa,2024-07-12T16:34:58.687000
CVE-2024-40909,0,0,2557f1e39cb36a28050303053c68b79c667d03c7345936cb7db86b5f125dff39,2024-08-29T13:55:21.407000
CVE-2024-40910,0,0,05374b2cc6508426828834b80ac481cdb20c9dee38a7e0865e9f298ee5c4422f,2024-08-29T13:55:38.203000
@ -256960,7 +256962,7 @@ CVE-2024-40969,0,0,131ef164ab09daf5156190b0d58c62f4c7d030c74546f3e35eab0d09a4a43
CVE-2024-4097,0,0,66ffa92526301cf6212a4835a680920c0ae3100deab31b53b6ec7270ebab3252,2024-05-02T18:00:37.360000
CVE-2024-40970,0,0,caf2538e6f28a086d3d406c06e9ff229dbdc2f65640692e0869148977eaa231e,2024-07-12T16:34:58.687000
CVE-2024-40971,0,0,3a1ab5847a8c301b704d8bdd427dc329bf7ad68865a6fa0d6bfff5bf33c1b1e6,2024-07-12T16:34:58.687000
CVE-2024-40972,0,0,7c7ba4d597dd7429f221b3b6caad3c430af9f5c24f296bc097703057de241176,2024-08-19T05:15:06.657000
CVE-2024-40972,0,1,fa6af6e8974278ad24cb6ac5e07f413b788062237eafa75226e4473182991804,2024-08-29T17:15:07.830000
CVE-2024-40973,0,0,3d9aca66924abb780afa1817341fd38098e7abc82c693f4615445b2ed8f879fd,2024-07-12T16:34:58.687000
CVE-2024-40974,0,0,32ab56cad597bafba819a3c3479ca0af2d6eedd509368346fb5dad5768478c2b,2024-07-12T16:34:58.687000
CVE-2024-40975,0,0,58c77162922e7538a8367d777b273d725db339abb61e841dcb00423a0d11d35e,2024-07-12T16:34:58.687000
@ -257015,7 +257017,7 @@ CVE-2024-41020,0,0,2648cd1ea7885aa6a15ad15439ad5970c22167ebbfaf88f36d6603640a067
CVE-2024-41021,0,0,80fab57b7e9e902bc5d4e6126e206f5737a727cedd90817a7e39c99f7b3679a4,2024-08-12T13:38:29.623000
CVE-2024-41022,0,0,55fcdc9633a220761bf2ee0f6eec0af74a7e91fb5065f3deb58c99d51016114b,2024-07-29T16:21:52.517000
CVE-2024-41023,0,0,48ce4747e102be8dbf6b96a23a471ccbe6850776b27384be80a54885d800aaa0,2024-07-29T16:21:52.517000
CVE-2024-41024,0,0,a83e56d28d472d169b675cbc7079dc9f720d853f9c0fe05fe88a8ff3b3b2caa6,2024-07-29T16:21:52.517000
CVE-2024-41024,0,1,b4b450c12c4e7528b0db15eafe148df0f49dad8766e75dc7693b0baeeae43049,2024-08-29T17:15:07.913000
CVE-2024-41025,0,0,c2ffc0923afdc6d50c51b6d8bd71c7e00bbd09e54e834785bf9af35cbe7118ba,2024-07-29T16:21:52.517000
CVE-2024-41026,0,0,eb7a88c6e7503e12c39942286d936a0841d7b65fc7e3861b8ccd8b44d0a3eedb,2024-07-29T16:21:52.517000
CVE-2024-41027,0,0,b0aa1b4e0a98fd9219cf8bf1c3c66e6cba578add94d4435f1336632da80a96c4,2024-07-29T16:21:52.517000
@ -257499,6 +257501,7 @@ CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f1
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
CVE-2024-41964,1,1,c45ff35e62675e482c446480812cec28bd444641c96d22a8dd402747148148a9,2024-08-29T17:15:07.980000
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0c33,2024-08-23T18:40:16.173000
@ -257552,7 +257555,7 @@ CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f975
CVE-2024-42067,0,0,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000
CVE-2024-42068,0,0,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000
CVE-2024-42069,0,0,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000
CVE-2024-4207,0,1,23b562075e6ff01c716f0403eaa58619ea0da4022e550dfbfd73808372a68c95,2024-08-29T15:46:20.557000
CVE-2024-4207,0,0,23b562075e6ff01c716f0403eaa58619ea0da4022e550dfbfd73808372a68c95,2024-08-29T15:46:20.557000
CVE-2024-42070,0,0,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000
CVE-2024-42071,0,0,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000
CVE-2024-42072,0,0,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000
@ -257654,11 +257657,11 @@ CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce
CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000
CVE-2024-42161,0,0,c37820156f6b32c3b0c8d53e62b0eb3e8a498c0455e3173c812581d5bb793102,2024-08-05T20:19:29.607000
CVE-2024-42162,0,0,6afe87ab720ed2f9c2f080d1a44ac6b35a3f68a956a94f09bb5c649d3b32abfa,2024-08-05T20:19:56.047000
CVE-2024-42163,0,1,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000
CVE-2024-42164,0,1,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000
CVE-2024-42165,0,1,afbf2cad1a7704e22288c4baca0d1211c9d7246324d2cb6ec83be77d26dee06d,2024-08-29T15:21:22.330000
CVE-2024-42166,0,1,18df6e3d78544dc8ad38e19fe493f73a53f7ef17f4a96d8246b9654224a5ce6f,2024-08-29T15:23:20.647000
CVE-2024-42167,0,1,cd8646272ac8e058d6c4cd2f9a697cfc1c8ee88730b877963e6d060dbe9c7f9a,2024-08-29T15:24:12.060000
CVE-2024-42163,0,0,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000
CVE-2024-42164,0,0,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000
CVE-2024-42165,0,0,afbf2cad1a7704e22288c4baca0d1211c9d7246324d2cb6ec83be77d26dee06d,2024-08-29T15:21:22.330000
CVE-2024-42166,0,0,18df6e3d78544dc8ad38e19fe493f73a53f7ef17f4a96d8246b9654224a5ce6f,2024-08-29T15:23:20.647000
CVE-2024-42167,0,0,cd8646272ac8e058d6c4cd2f9a697cfc1c8ee88730b877963e6d060dbe9c7f9a,2024-08-29T15:24:12.060000
CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000
CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000
CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000
@ -257666,7 +257669,7 @@ CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad
CVE-2024-42218,0,0,331226ea49af1a2f92292f364b4fd8bc3c26a90f49d1b9421ad0db0c509189fd,2024-08-12T18:27:54.660000
CVE-2024-42219,0,0,6d72ad1f1e2233036625c33df60f051fc9699cbd96bd0caf5f28288f63cee194,2024-08-12T18:30:21.627000
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
CVE-2024-42222,0,0,62014732c367340e7231f93e13a11fa814d7e00cce4ded101da5e783fb41f371,2024-08-07T15:17:46.717000
CVE-2024-42222,0,1,b89ef57d67246c59e7b320f402a614639a269bceaaa0c30be9cf5a9576c14c01,2024-08-29T16:43:59.923000
CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000
CVE-2024-42224,0,0,be03c0669f567c4c43069feb6297d1d0b39887abc231ab7cb6117aeb87386008,2024-08-02T14:24:16.187000
CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000
@ -257802,7 +257805,7 @@ CVE-2024-42362,0,0,25fca8ac5e8ac7bce381e03b27abd95b45c4c358dff550b984cd00a130f5a
CVE-2024-42363,0,0,845d80b3d90627c09cd2ebcd1015d3397a70bb5dfd2fb99126f84654bc7633e2,2024-08-21T12:30:33.697000
CVE-2024-42364,0,0,4c3af5024e60bada8ffc9756b86fe112164c9d8aeb4b4858c936071d813f7c5c,2024-08-23T16:18:28.547000
CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000
CVE-2024-42366,0,1,a9568172e4bcd6c1cd45e47dacc87e8aa79df67869d590679718151cd9b5e17b,2024-08-29T14:04:30.733000
CVE-2024-42366,0,0,a9568172e4bcd6c1cd45e47dacc87e8aa79df67869d590679718151cd9b5e17b,2024-08-29T14:04:30.733000
CVE-2024-42367,0,0,78b96b1f30a7354fdfb7431aa08d9784ec8c3726b77126448b6109517286436c,2024-08-12T13:41:36.517000
CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0d34,2024-08-14T02:07:05.410000
CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000
@ -257825,7 +257828,7 @@ CVE-2024-42398,0,0,ecec97745a6273f6b5e5720bfa1d0ff4b8e46532c92273931272e35e326b7
CVE-2024-42399,0,0,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b158,2024-08-23T15:06:13.350000
CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000
CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00
CVE-2024-42408,0,1,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
CVE-2024-42418,0,0,cd8cebc8a20c18f0027a896396b37c57ee369fd63657ca2801f50759cb9c420b,2024-08-23T16:18:28.547000
@ -257852,7 +257855,7 @@ CVE-2024-42463,0,0,1887d4b9dbb205a7918713aab61d422ae1234ef53aa6637fd3664544692f6
CVE-2024-42464,0,0,c028981b0f05209b8f9398c3d10076a5d141612668af4661ca8e9b565e3a5a68,2024-08-28T20:35:52.940000
CVE-2024-42465,0,0,cc1706811a59c806dba0a5fe5e46aaf63eb46135d4336575a42fc94641a6632d,2024-08-28T20:32:31.737000
CVE-2024-42466,0,0,b147a6143c0f1b29bc81d9c541a33cc57bd399450bc78084e7c0d7553a8f8a24,2024-08-28T20:48:14.917000
CVE-2024-42467,0,0,e23e0abc0a807db2a53f3a498d6ca2ef36fe18197da36ac218027e00b6ca7984,2024-08-12T13:41:36.517000
CVE-2024-42467,0,1,66b04633a9e7d48f7fdda11dcba365569847fef4d628314bc09c6b60fb102d1c,2024-08-29T16:26:43.947000
CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000
CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
@ -257876,7 +257879,7 @@ CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca76
CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000
CVE-2024-42493,0,1,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000
CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
@ -258139,9 +258142,9 @@ CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f
CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000
CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000
CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000
CVE-2024-43111,0,0,f62efcceb5ca8831b50b8cf6203a83ed8d98a025353eabc40d90f197fefec403,2024-08-07T15:35:08.127000
CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca28a,2024-08-06T16:30:24.547000
CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000
CVE-2024-43111,0,1,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000
CVE-2024-43112,0,1,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000
CVE-2024-43113,0,1,7e6f0ba01b475bb6cfca73e8eda2423288e38b8146984d081803bef7596c3140,2024-08-29T16:51:33.367000
CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000
CVE-2024-43116,0,0,94cb738117c364125cdbbaaf42fcfa3d1fe11aaa7081e49de319178ad8cee60b,2024-08-27T13:02:05.683000
CVE-2024-43117,0,0,05a8c9c88ed7d8baa1ba7cda12219cce1f916317ccf5f0825de6fdf0716e21e8,2024-08-27T13:02:05.683000
@ -258157,16 +258160,16 @@ CVE-2024-43129,0,0,31c20babbf5c34491baa27c55ebc5586c6252f19bd444c66f49a6914d67b1
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
CVE-2024-43130,0,0,8ac60d1cc8aa75b0576e9410e6684738dc0975304323a1567a1f0eb99e4d577f,2024-08-13T12:58:25.437000
CVE-2024-43131,0,0,8591ee6c3e77a5a691612e6bee62ebc0760a7b8123e10043f1c0be2a86a8517c,2024-08-13T12:58:25.437000
CVE-2024-43132,1,1,b060e648ea7891699e780cd8ad9b5fa405e8e6e05f1907909729fea4f1187176,2024-08-29T15:15:28.327000
CVE-2024-43132,0,0,b060e648ea7891699e780cd8ad9b5fa405e8e6e05f1907909729fea4f1187176,2024-08-29T15:15:28.327000
CVE-2024-43133,0,0,9e3f4ff9c8102da720c262ea41d7de033957edff3ff57332662b4c6a475cc118,2024-08-13T12:58:25.437000
CVE-2024-43135,0,0,1848aed765bf1b3f105991b4b7c25107cc56730f5bab291f1691a8e7e95da171,2024-08-13T12:58:25.437000
CVE-2024-43137,0,0,8de1b2565c6057c436104ee14f3d6e8ca057aac92c9a82c9e40b213e90604b29,2024-08-13T12:58:25.437000
CVE-2024-43138,0,0,7523d930cd7a5a7279891b38d575a91618010966f29bc4ae8a9118211d3e5f6c,2024-08-13T12:58:25.437000
CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d76917df,2024-08-13T12:58:25.437000
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
CVE-2024-43140,0,0,879ec5b84127dbdf3b24e5badc8e43666af405516e082469bf8472d96501dd05,2024-08-13T12:58:25.437000
CVE-2024-43140,0,1,ddd9555407bf13c17882395b6a58ab3090224c7fbcadd5faeeb830d264aad29c,2024-08-29T16:04:30.370000
CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000
CVE-2024-43144,1,1,ba68910f82422d441b5eaf9ef1b0e63533860f90b0246793d0652a6145457bf6,2024-08-29T15:15:28.530000
CVE-2024-43144,0,0,ba68910f82422d441b5eaf9ef1b0e63533860f90b0246793d0652a6145457bf6,2024-08-29T15:15:28.530000
CVE-2024-43145,0,0,7ccb83b884d8dc58ceb4932d45768a752924d5c2938e5a3f671a778aaba995f8,2024-08-19T12:59:59.177000
CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000
CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000
@ -258411,6 +258414,7 @@ CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8
CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
CVE-2024-43804,1,1,a05538f5e2cfb3b6ba08f43744442444cf050b0b8e60b38ebb1001e310a33aab,2024-08-29T17:15:08.193000
CVE-2024-43805,0,0,e9de3af7500f4b69c1539a4468aa5c023c43f557b57ab88b796f849dd26b41b4,2024-08-29T13:25:27.537000
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
@ -258452,7 +258456,7 @@ CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd
CVE-2024-43842,0,0,a9e92e9fe7d83f2bbbf14ffa788f7191f8705535edb6aa37b190042b46301c8a,2024-08-19T12:59:59.177000
CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000
CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000
CVE-2024-43845,0,0,b81153317e67ba7655f1e8ab3354e74cc099ea35dc466dacb5e6813a988621de,2024-08-19T12:59:59.177000
CVE-2024-43845,0,1,975e9883b95b773086eb2dd70b312cb34500f721b9f0912731724d7ad97a858e,2024-08-29T17:15:08.397000
CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000
CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000
CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000
@ -258495,7 +258499,7 @@ CVE-2024-43880,0,0,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d
CVE-2024-43881,0,0,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000
CVE-2024-43882,0,0,d55668215cd6d665e2480e5f531dc425652dbf9b52271fdc563c400a262ed289,2024-08-21T12:30:33.697000
CVE-2024-43883,0,0,91d9dc24243e1eb7439b854fe03a12be52a8a2651dc7ad627233ff467dccabae,2024-08-23T16:18:28.547000
CVE-2024-43884,0,0,1be55cc2577ddf4ea3eaad20febdb123bf6382b6da5a314c3a4af81052b5a493,2024-08-27T14:37:20.410000
CVE-2024-43884,0,1,337c32679015164150e2b893414f874b7284984b79da625d0489e093363d9444,2024-08-29T17:15:08.457000
CVE-2024-43885,0,0,11114407819a3f9e00d8d9cb1392c069e87eaa286d3f0b384cc6ce2d553b62cd,2024-08-27T14:37:37.887000
CVE-2024-43886,0,0,e1250be1137132d32f51f141081958e76d96de370d77286a8411bf00a519b833,2024-08-27T14:37:45.377000
CVE-2024-43887,0,0,376d550e40434349f0ec085b772876fe107bf2fe9c2438232db402487dd1f398,2024-08-26T12:47:20.187000
@ -258509,7 +258513,7 @@ CVE-2024-43893,0,0,43d0e9d62118f7a5f6c9bfc09f584d8b53fd652e6e40996287fc9d1d1f103
CVE-2024-43894,0,0,7a0da327bf71c13dadb4c3586216ee65cc1ccf79c9e17e8e4e11aa7af72ebd02,2024-08-26T12:47:20.187000
CVE-2024-43895,0,0,f4f0faf6f450c11bcd9bbffc3bfe9363bfd6c37323777a86f991b1d25c456a35,2024-08-26T12:47:20.187000
CVE-2024-43896,0,0,02f54c59717b3feef195015864900404f36f00fe9986d4059d517c9dd0f9a5bb,2024-08-26T12:47:20.187000
CVE-2024-43897,0,0,272a5e6ed23f226be655c71945633c1818e2d186619a4f55ac8593cb15d32ae8,2024-08-26T12:47:20.187000
CVE-2024-43897,0,1,f0f19d4c6371825704d376e54489917481cd4d9ad4f907a2d95f0a5bdf06c617,2024-08-29T17:15:08.533000
CVE-2024-43898,0,0,b20ddc83f3dcf4bc1ad714089af29bfc939502c108354aa514b44633c401dbf4,2024-08-26T12:47:20.187000
CVE-2024-43899,0,0,1953a8ac8e9197ec884f1f7ed08130ca2ce11e7bc600d6d066b299186890c781,2024-08-27T14:38:19.740000
CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000
@ -258531,17 +258535,23 @@ CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d
CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
CVE-2024-43917,1,1,af83a014e5f2de698c85436a27aed31e1bac7faaf65dcf3ed5e0fa10b1af9716,2024-08-29T15:15:28.753000
CVE-2024-43918,1,1,43a92419e6571ce470ec6a35edf136a81403a8ed78c478f20979da16483f3d46,2024-08-29T15:15:29.010000
CVE-2024-43917,0,0,af83a014e5f2de698c85436a27aed31e1bac7faaf65dcf3ed5e0fa10b1af9716,2024-08-29T15:15:28.753000
CVE-2024-43918,0,0,43a92419e6571ce470ec6a35edf136a81403a8ed78c478f20979da16483f3d46,2024-08-29T15:15:29.010000
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
CVE-2024-43922,1,1,d67632ae9b03e359192f45db78f3e688ac55ffb853b8e64a475b472b7ab0ecd9,2024-08-29T15:15:29.227000
CVE-2024-43922,0,0,d67632ae9b03e359192f45db78f3e688ac55ffb853b8e64a475b472b7ab0ecd9,2024-08-29T15:15:29.227000
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
CVE-2024-43931,1,1,fc5752d45eefd7ceb4ca041f2458c97127d8bdb333bcc0ac9d615bb0d8d69aae,2024-08-29T15:15:29.427000
CVE-2024-43939,1,1,823725df89462bfe8e17bbdec59df57734d4df9671c5c38b3853b1db91a6a6a6,2024-08-29T15:15:29.633000
CVE-2024-43940,1,1,d40fd3e90e637a061d52568bb9fcaf27ff6166b45b336a61a957b5826d704d8f,2024-08-29T15:15:29.833000
CVE-2024-43941,1,1,8bf955247c320fa7ff1484a9d8086edd3c8655790229238bf3f73fe6fc428ab1,2024-08-29T15:15:30.040000
CVE-2024-43942,1,1,5033bbb3050b0bb163dd78850662ca8a190298ef0b220e9cadd29efc076d3ef6,2024-08-29T15:15:30.247000
CVE-2024-43931,0,0,fc5752d45eefd7ceb4ca041f2458c97127d8bdb333bcc0ac9d615bb0d8d69aae,2024-08-29T15:15:29.427000
CVE-2024-43939,0,0,823725df89462bfe8e17bbdec59df57734d4df9671c5c38b3853b1db91a6a6a6,2024-08-29T15:15:29.633000
CVE-2024-43940,0,0,d40fd3e90e637a061d52568bb9fcaf27ff6166b45b336a61a957b5826d704d8f,2024-08-29T15:15:29.833000
CVE-2024-43941,0,0,8bf955247c320fa7ff1484a9d8086edd3c8655790229238bf3f73fe6fc428ab1,2024-08-29T15:15:30.040000
CVE-2024-43942,0,0,5033bbb3050b0bb163dd78850662ca8a190298ef0b220e9cadd29efc076d3ef6,2024-08-29T15:15:30.247000
CVE-2024-43943,1,1,35cfcf314b02187a72848b2b9da9c6428e95d4802c2ae2f5451ac18ebae73445,2024-08-29T16:15:09.013000
CVE-2024-43944,1,1,b467788cb50d7e274c3d06f8d45afff68d4c0f0fd6386d60365fe71de96aab07,2024-08-29T16:15:09.197000
CVE-2024-4395,0,0,7eb8bb55518c25270e2cdb5da345e646a2437fce6bdd0ba1dda9f1e27539a52c,2024-07-03T02:07:30.800000
CVE-2024-43954,1,1,2ccc7b513b158020b11a49457087f5750ade347299d915ce64e666a998ff3c61,2024-08-29T16:15:09.383000
CVE-2024-43955,1,1,3fbed09885bb08958b9a9e392fdf0c8d17ba26726242e2aee808dd7b744cd51f,2024-08-29T16:15:09.570000
CVE-2024-43957,1,1,7dcc2d4b3598a3d9b2c07cee6d790dca11f0afb7f5a7cc2fcf8f65e53e37aca4,2024-08-29T16:15:09.757000
CVE-2024-43965,1,1,0a6b2f140cce58bd0a8d0f6cf0401281f3ed0cd540c5d143269efb5eebaceb73,2024-08-29T16:15:09.947000
CVE-2024-43966,0,0,cd3d16dd9709908a4a64e6a13b6fef840bd6c4e6049b114619dc3ea375d7306a,2024-08-26T15:15:23.727000
CVE-2024-43967,0,0,dd198820d01657feb4461b4126ff9f2ed88f09f4d5c22ed753dc2e0d9ac5168d,2024-08-26T19:10:09.607000
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
@ -258661,6 +258671,7 @@ CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e088
CVE-2024-44913,0,0,b6a472d5fd19f3234cb94f535078ee5f4ccf42464ba38a6cbd2f0b0b0d56c911,2024-08-29T13:25:27.537000
CVE-2024-44914,0,0,cdab06c38600f9663e7e3d6a83c73bbea13a8eac91f638774262eedf9129b83e,2024-08-29T13:25:27.537000
CVE-2024-44915,0,0,189fc1c6cfc0d9d55a03d683dcd4ceecbf61c3a051a5df8bd60ce5a5dfbbadd4,2024-08-29T13:25:27.537000
CVE-2024-44919,1,1,11a363d1aa0283eae12fa58899a26d5602593431cdc0e48ff36cea52c4b2ec41,2024-08-29T17:15:08.670000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
@ -258670,10 +258681,10 @@ CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0
CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000
CVE-2024-44936,0,0,b9963badb762ccd078f0ff0276e3a054720ee02adaf519a8ed2637b289dbf485,2024-08-26T12:47:20.187000
CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000
CVE-2024-44938,0,0,81d8c4fa2822291c31e2752229de00d1bfc6803d6c6c74b987910dc96d3f451e,2024-08-26T12:47:20.187000
CVE-2024-44939,0,0,df2a3231cc28f02dcccf984f7f5e5e4e9d5e3f87d2741a1f7e67c845a96a8582,2024-08-26T12:47:20.187000
CVE-2024-44938,0,1,78c7eb7f4b70b2193d6a764b661f1c4b34c66de744f08d6fe3e652c84bf9ba47,2024-08-29T17:15:08.753000
CVE-2024-44939,0,1,77e340056998b85a0edb6eda2bb5776e7eba0084412d6173fbb841dbdf80b07a,2024-08-29T17:15:08.837000
CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81a4,2024-06-04T19:20:39.240000
CVE-2024-44940,0,0,f3c78670c961ed218069273846baa8ab159598a99ca4d39386baf88d3ac01c7d,2024-08-26T12:47:20.187000
CVE-2024-44940,0,1,6d3559648bdfa621b46434f9855de2178fa1de08defe3fd31c71176641a2c51c,2024-08-29T17:15:08.903000
CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000
CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000
CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000
@ -258691,11 +258702,13 @@ CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c31
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45045,1,1,2308eac775db7b014337e6f88c44a856959b64cfc960c8b60b52be8b2d7a3787,2024-08-29T17:15:08.977000
CVE-2024-45046,0,0,4d7016da74eaf67c450dc439af799ed2952384706074b1964aaa74d9bd45c737,2024-08-29T13:25:27.537000
CVE-2024-45048,0,0,f84a03b52c4e4737f004ef4638c6c48a715aa1051c897955680d1101538ffe4e,2024-08-29T13:25:27.537000
CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000
CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000
CVE-2024-45054,0,0,b9a631b4140dc3b625193d3b302c7a5fbf5e7defa5c6f149bad3cc57b44dfb5d,2024-08-29T13:25:27.537000
CVE-2024-45056,1,1,c501b83657c4bca4bc02eb574baa9b51885aa622e83de25de4c7b549d83a0d89,2024-08-29T17:15:09.173000
CVE-2024-45057,0,0,9d8b06345321949fa48379fc2183ae1808eec74c9e7dce5df7d16d85f9e3fc50,2024-08-29T13:25:27.537000
CVE-2024-45058,0,0,7787e6673db22abfd684889eec25f0d15a1228d1d6048ef359937e89120200d3,2024-08-29T13:25:27.537000
CVE-2024-45059,0,0,1db4a990b2e27521ef605a35909b28cc3d1be1d4c9ec2ad338f6d6fa0c866be3,2024-08-29T13:25:27.537000
@ -259048,9 +259061,9 @@ CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000
CVE-2024-4851,0,0,cdc6cbe948e120051439ba4105c24946466b84d7a624559fd86ce63f704d51cd,2024-06-07T14:56:05.647000
CVE-2024-4853,0,1,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000
CVE-2024-4854,0,1,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000
CVE-2024-4855,0,1,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000
CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
@ -259218,7 +259231,7 @@ CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a7
CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000
CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000
CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000
CVE-2024-5057,1,1,7e80181b87ff71d98864f6661c18cafdc7709b89033721fa59717c6299cd2179,2024-08-29T14:15:09.080000
CVE-2024-5057,0,0,7e80181b87ff71d98864f6661c18cafdc7709b89033721fa59717c6299cd2179,2024-08-29T14:15:09.080000
CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000
CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000
CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000
@ -259552,7 +259565,7 @@ CVE-2024-5419,0,0,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798
CVE-2024-5420,0,0,3867de6c80eaebb04ae4def03e9baadba6a4785f9b7d05c922afac144ffa3470,2024-06-10T18:15:38.367000
CVE-2024-5421,0,0,687f3a5898a97c7e4a575e3431d3fe4a696cee8599b8881eabbed4fc7122e815,2024-06-10T18:15:38.447000
CVE-2024-5422,0,0,a7ac042f03539b57f700d43aa5929a4431fad7f2a64327cabdefb452ddb8c884,2024-06-10T18:15:38.520000
CVE-2024-5423,0,1,c0eb8661372608209ca31873262040c83e56e01f96081eb3f127055f8501110c,2024-08-29T15:41:13.247000
CVE-2024-5423,0,0,c0eb8661372608209ca31873262040c83e56e01f96081eb3f127055f8501110c,2024-08-29T15:41:13.247000
CVE-2024-5424,0,0,dd542e2b4b449f200a4b1a82e6055968c0edff7c6325ff444ef99264bbf9b209,2024-06-28T10:27:00.920000
CVE-2024-5425,0,0,6a4e5f79f55def4d138c1c07874dfb0365b816ea97355d904460c326f384651d,2024-06-07T14:56:05.647000
CVE-2024-5426,0,0,34afa7194afb894f777aa3dfb9357e73895bc2898fe4d0744eeb7d3dbc6f96b2,2024-06-11T18:03:58.213000
@ -260178,10 +260191,10 @@ CVE-2024-6194,0,0,f00a226f70ff49a057b84fcaca304b983b6bd1564bd5a99084e1dc1658dc9a
CVE-2024-6195,0,0,d35dc776097027653d4328476e596f9f167a82473590f04576da829da4609970,2024-08-01T13:51:26.273000
CVE-2024-6196,0,0,347e5d0fbb342c4d3dd5d440e2946d6924b36395364c1557d43d309fd11da3db,2024-08-01T13:49:15.767000
CVE-2024-6197,0,0,db7d7a44ba55906002b55001393fe27a9e62dffd18b100796d7e096f2fd44460,2024-08-26T15:25:59.960000
CVE-2024-6200,0,0,7c3ae18397336de3b19854fceb09c4d149b05254de65b72663f49c28e01b6d08,2024-08-06T16:30:24.547000
CVE-2024-6201,0,0,6076154b4512e760554abd0a737bc0b84ee6d5333741fc91235c9ed31a163119,2024-08-06T16:30:24.547000
CVE-2024-6202,0,0,76d8c5f3d8b2ec987e73ed5b5ff236911a83f186cddbe37dd3f0e93bd247100e,2024-08-06T16:30:24.547000
CVE-2024-6203,0,0,bb85fbb9dbf898aa4678aea988ceea22a4fc8b2cce161ae9b3e2d897fef1b018,2024-08-06T16:30:24.547000
CVE-2024-6200,0,1,722d981d84658a736a5a6764f93f4a9ccec1590f7bef592a19ce39ecef9883b5,2024-08-29T17:53:40.483000
CVE-2024-6201,0,1,598d56b506e8c445cb59964b9db6d77d5a9f4c1b7b2ffecffa9033ad60685adc,2024-08-29T17:52:07.493000
CVE-2024-6202,0,1,247631a9e2647b82d3ccde2f575b6ac32697ff24a61656c143ef0145416ab9ec,2024-08-29T17:48:43.723000
CVE-2024-6203,0,1,3b9c553aeaabf6b65504ab651e97d9d81983015dea0894c7aa9459e33da609dc,2024-08-29T17:46:28.790000
CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000
CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
@ -261078,8 +261091,8 @@ CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da327376
CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000
CVE-2024-7521,0,0,93e518aa5fe4de4582901fabd10f56f08fc773ab920d9d06860ccc32d826d11d,2024-08-12T16:05:10.907000
CVE-2024-7522,0,0,8cb3e499c594094550f4257bf1be1fb169aadf72b2b6dad6246a075ed4ee872d,2024-08-12T16:06:05.300000
CVE-2024-7523,0,0,fe83ea86a9ef382979bc6637fb391f4f5b138f7fa6edf8afc732d9a7d7226616,2024-08-06T16:30:24.547000
CVE-2024-7524,0,0,922fd32401db78399003a2728d5a83f1486debb49b4159a7c46f4d064f93af28,2024-08-06T16:30:24.547000
CVE-2024-7523,0,1,037427c5dc228ac7d7c706d32604adaf00a2c303dfd3a5cb1aaf8bf15b6f9044,2024-08-29T17:41:09.627000
CVE-2024-7524,0,1,55b2959f46d5a03cc7e4bb47de03aeac574cf3416fb0ebbf64758ff53e5fdcb3,2024-08-29T17:35:34.820000
CVE-2024-7525,0,0,0f44155e5b1b275dd77c786a7ef323cd6045a6d2a2adbf5e4f560db015c1f014,2024-08-12T16:07:19.537000
CVE-2024-7526,0,0,718006135a6a1c568dedda22ff0d54a97e1bc5accec99de9b33ac5ed305a3aef,2024-08-12T16:07:50.743000
CVE-2024-7527,0,0,ba69bbbe0f023f0603eef152253f5471e5d273c1eed361075a22cda08eede171,2024-08-12T16:08:06.493000
@ -261093,22 +261106,22 @@ CVE-2024-7534,0,0,98f2f863f9ff1ef735b3417cb63f8ba3143b94eac42d58cd6d4fab5089c39a
CVE-2024-7535,0,0,406a485be4ed145018eee5a42eee293edf3f855e9e608d288637ad13611ff84e,2024-08-12T18:31:56.687000
CVE-2024-7536,0,0,6d744a1cdbceb73b2517cc38c4973ef8f9e81b399df7da1dbc0e072ba9141ac8,2024-08-12T18:32:03.167000
CVE-2024-7537,0,0,61295dad87b53130c2dd823a35a4a3e356388230d39cb431835e7e748292780d,2024-08-06T16:30:24.547000
CVE-2024-7538,0,0,e33ad9f86e3120d1b43fdde2c5199d53495847f7161ecde40b507e5e94c53b56,2024-08-06T16:30:24.547000
CVE-2024-7539,0,0,75691853410c7f4953d396c3a424cbea6cb17a4cc9e5c33867ffb68bb6da4b56,2024-08-06T16:30:24.547000
CVE-2024-7540,0,0,b35bb302a2441f24b2b943886007578a815e7984e0621fb0e58dd8fd952c06f2,2024-08-06T16:30:24.547000
CVE-2024-7541,0,0,fc666aaa3e294fb089fc5cec94db1550e428faa40703d7fcd5c7b600d90bb8bd,2024-08-06T16:30:24.547000
CVE-2024-7542,0,0,940baaf3d43b54e02ba5def96a972431c14e7bce67b461f92169df289f4cc2fb,2024-08-06T16:30:24.547000
CVE-2024-7538,0,1,193fad63547610339afca51fb42f4e1b63efd1246fa12674999d016a71d7b352,2024-08-29T17:59:31.983000
CVE-2024-7539,0,1,f5313ec8fa4093892a6a915c2e5a1fb241a9ccadb615dbc613c26bf8411561db,2024-08-29T17:59:05.223000
CVE-2024-7540,0,1,a5e3c1e7e7e511557c429d550e93b149d880c481d8eb2e7e1b5655826d5383a6,2024-08-29T17:58:17.420000
CVE-2024-7541,0,1,83642307317073348ded7a23e8ff0e9b118ff48adf011a10e2cae2d27754450e,2024-08-29T17:57:37.673000
CVE-2024-7542,0,1,1269a04db1d1ad61c67b794e66cecf85c1f21fcbfa7055b04ea9d171531a9580,2024-08-29T17:56:54.357000
CVE-2024-7543,0,0,503a11ee44f99a51704a6abc3db92fb588f21d0ff08bd2bd9e412e5d0c2d46f8,2024-08-19T19:59:55.340000
CVE-2024-7544,0,0,c1cf8fbff6eae578412d69636bfc44a9dcbaf3b74591629eefcc6a239c026269,2024-08-19T20:00:24.957000
CVE-2024-7545,0,0,ddf5364e31008f118bae55653e1cb0aef851b5fa86eb5245378834db00788f01,2024-08-19T20:00:57.433000
CVE-2024-7546,0,0,4c4058f55a0d0a018227dbcde80b1939d604dff5f03a9d71d0e845e5adb26d16,2024-08-06T16:30:24.547000
CVE-2024-7546,0,1,f0e17dfeb0cdd5afe72952dae828c70ab7df9064d65ae78474e00d359cb4b6ed,2024-08-29T17:55:47.547000
CVE-2024-7547,0,0,8b5af897776f46884f36969e1145e07082807ba989be313683ebd633a8d93d75,2024-08-19T20:03:12.377000
CVE-2024-7548,0,0,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee770,2024-08-08T13:04:18.753000
CVE-2024-7550,0,0,0ccf7d721eccaf753ef6c8a48b561ee0f9b8839c90b74eac00f4a21c8fe96817,2024-08-12T18:32:08.900000
CVE-2024-7551,0,0,b186fc017c389d319de7d861b1d913a84a5458cd5dbd51c140f542d4aff6a7a9,2024-08-12T16:12:12.377000
CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000
CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000
CVE-2024-7554,0,1,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000
CVE-2024-7554,0,0,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000
CVE-2024-7557,0,0,689a9daa3ab546590d7c99bd152e6a8f70602c50080585be6131605a7c141656,2024-08-13T17:00:53.670000
CVE-2024-7559,0,0,4dc25ec2b0f2eec8919ecc81f209446d933d662f72b02d2630c82c602d53e698,2024-08-23T16:18:28.547000
CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000
@ -261141,7 +261154,7 @@ CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df
CVE-2024-7606,0,0,a274c3cb55abf1d09b9eed03004046b3bab57ca9c346c9c7f8eb3d1a43589575,2024-08-29T13:25:27.537000
CVE-2024-7607,0,0,a22f9e92f7acda9358a9e1022b2325b742d117f4b1e701544a71613f7628ae8f,2024-08-29T13:25:27.537000
CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000
CVE-2024-7610,0,1,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000
CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
@ -261275,9 +261288,9 @@ CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b025
CVE-2024-7848,0,0,0ee368073eef37c35843cc78ada12ebce75ec11f5e51f0fe556018a4bb2deefe,2024-08-22T12:48:02.790000
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
CVE-2024-7851,0,1,59aa43af6902d4a788d7da1730827e642c78bd3a9a790eb7c6cdc9cf8851f000,2024-08-29T15:22:08.227000
CVE-2024-7852,0,1,cfaf6efee3831acfddb66b2453fc175105bb415bea9978d14cd59ad6f5b30e0e,2024-08-29T15:23:16.160000
CVE-2024-7853,0,1,90e064ba16388d2c255ea61f6d50069bab92e333b7116c2e5b296230c0d5372d,2024-08-29T15:22:52.710000
CVE-2024-7851,0,0,59aa43af6902d4a788d7da1730827e642c78bd3a9a790eb7c6cdc9cf8851f000,2024-08-29T15:22:08.227000
CVE-2024-7852,0,0,cfaf6efee3831acfddb66b2453fc175105bb415bea9978d14cd59ad6f5b30e0e,2024-08-29T15:23:16.160000
CVE-2024-7853,0,0,90e064ba16388d2c255ea61f6d50069bab92e333b7116c2e5b296230c0d5372d,2024-08-29T15:22:52.710000
CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000
CVE-2024-7856,0,0,33feb207767ca0a7c11c844a262a4c47fe31800a079ccc95735f9fe6bb170e1c,2024-08-29T13:25:27.537000
CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000
@ -261444,21 +261457,21 @@ CVE-2024-8198,0,0,de980718a9ea6cc588b2d974e2982799ff7ae4aa3d30e607d169215732d938
CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000
CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000
CVE-2024-8207,0,0,498323e8227fa40c3fd29b85835950264192b60730f689cfc748d515dfd6f7ad,2024-08-27T13:01:37.913000
CVE-2024-8208,0,0,c0546cf56f335de149e039eaf41ddcfe92498da6cf6c84b8fa1c52ddaf26fb1f,2024-08-27T18:33:14.247000
CVE-2024-8209,0,0,55f7ec189eb87638165e40939313326ea0521e4ed80e56afdb88c580a7b1c999,2024-08-27T18:33:14.247000
CVE-2024-8210,0,0,0f20faea29960531878b9d44b5de81c4bb8a136a66158d050d0fa865804f0894,2024-08-28T12:57:39.090000
CVE-2024-8211,0,1,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab5d,2024-08-29T15:54:56.390000
CVE-2024-8212,0,1,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000
CVE-2024-8213,0,1,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000
CVE-2024-8214,0,1,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000
CVE-2024-8216,0,1,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000
CVE-2024-8217,0,1,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000
CVE-2024-8218,0,1,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000
CVE-2024-8219,0,1,8da7ad5f905df25476479f9a020f475db5ef1778247a297ab54e6d15cd2bd400,2024-08-29T15:35:28
CVE-2024-8220,0,1,2f2f7d8658b6cd96b7599dd980b6c9f65d79b9a8996b730a397954fe9fd0d42b,2024-08-29T14:49:54.737000
CVE-2024-8221,0,1,584227fe8ab90444d0f31d160d6c03407e5a5ae40db37bf3c9a2eaed655ef7e0,2024-08-29T15:32:11.397000
CVE-2024-8222,0,1,8d9fa7c58ca8bdc0788d0ea9191f3e7e0b045a8238cc82c5bc079b96b023ea40,2024-08-29T15:13:09.227000
CVE-2024-8223,0,1,fe884c5ca8ba03daed3304c1b870a734ae4c97c4b3757014b0dc450032c9ade3,2024-08-29T15:11:36.127000
CVE-2024-8208,0,1,3f393cbce0f1d113de710d532681141cada8ef6f9dabc882bcef6792a38ba6dd,2024-08-29T17:27:02.397000
CVE-2024-8209,0,1,011c93b978693cad1f1840a0255528b9ea24513efb93d121a5e919ef5bade0bf,2024-08-29T17:23:42.873000
CVE-2024-8210,0,1,ac28e7311389cbf5c8425b33e7b199665a7b3d5ab76ba6a58fa3d14c45f9ee55,2024-08-29T16:04:45.310000
CVE-2024-8211,0,0,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab5d,2024-08-29T15:54:56.390000
CVE-2024-8212,0,0,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000
CVE-2024-8213,0,0,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000
CVE-2024-8214,0,0,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000
CVE-2024-8216,0,0,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000
CVE-2024-8217,0,0,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000
CVE-2024-8218,0,0,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000
CVE-2024-8219,0,0,8da7ad5f905df25476479f9a020f475db5ef1778247a297ab54e6d15cd2bd400,2024-08-29T15:35:28
CVE-2024-8220,0,0,2f2f7d8658b6cd96b7599dd980b6c9f65d79b9a8996b730a397954fe9fd0d42b,2024-08-29T14:49:54.737000
CVE-2024-8221,0,0,584227fe8ab90444d0f31d160d6c03407e5a5ae40db37bf3c9a2eaed655ef7e0,2024-08-29T15:32:11.397000
CVE-2024-8222,0,0,8d9fa7c58ca8bdc0788d0ea9191f3e7e0b045a8238cc82c5bc079b96b023ea40,2024-08-29T15:13:09.227000
CVE-2024-8223,0,0,fe884c5ca8ba03daed3304c1b870a734ae4c97c4b3757014b0dc450032c9ade3,2024-08-29T15:11:36.127000
CVE-2024-8224,0,0,95fec52f6c9625e460f8029e3f7573af1ea21487b80d7297957e6d41b36a1f50,2024-08-29T00:16:14.413000
CVE-2024-8225,0,0,d4b2d2ccb272432312e58651359d5df16c3e3434eacab3aae53ef4faa54c7744,2024-08-29T00:14:43.957000
CVE-2024-8226,0,0,dde9beb091cd0309f8a2603c2ffae674646580e1c9b72641fb6ca67812daca74,2024-08-29T00:13:44.260000
@ -261468,11 +261481,12 @@ CVE-2024-8229,0,0,b4e82f248689c551a8c2d56510132af8816aa6c16d8f7b5aa18c38850899c5
CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb4e,2024-08-29T00:08:24.643000
CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000
CVE-2024-8250,0,0,74fb86f8fe2035c18dd497ff04e870378212b13108551159d2a1c3008bad35b8,2024-08-29T13:25:27.537000
CVE-2024-8255,1,1,1ba22686992caf6d2b849b6835a0bffed1e0c071f8e2f2d7d811361b36c158e5,2024-08-29T16:15:10.140000
CVE-2024-8294,0,0,4dbc4ed3db14d85852b6f7a6aa39a58fb9813e3a468ce2496730622a4e7e8e20,2024-08-29T13:25:27.537000
CVE-2024-8295,0,0,f8b1eacce92adcda34eadca7b6a5f9b0537bcb1008b6d197cf25cbc03f38d464,2024-08-29T13:25:27.537000
CVE-2024-8296,0,0,66346d5f20138091aa1a5c7abd768c7cc1b063d98b4b8f55461cfa2a34a9e06b,2024-08-29T13:25:27.537000
CVE-2024-8297,0,0,be3630f7076c181ff3a7dd53d449891a972e9958d66bbbdeb816e8e8d932d822,2024-08-29T13:25:27.537000
CVE-2024-8301,0,0,a320b86a1c6d3602618f46f60fc09d8dff020322bb7a7b0e43fc9a496aef7f93,2024-08-29T13:25:27.537000
CVE-2024-8302,1,1,6aa1d8b6c4a0f124c66574ced2f9e480e232ca912559bf0084d593981c6213c1,2024-08-29T14:15:09.530000
CVE-2024-8303,1,1,df216f6ed6991ebfcd8d04a527576b3dbc34dfc62eb0afc850512e7710171894,2024-08-29T15:15:34.783000
CVE-2024-8304,1,1,0b11e3bd31707139d665525dc7f3be4c5c9aa682a3f15d2ded6c49c9b5d9a51b,2024-08-29T15:15:35.070000
CVE-2024-8302,0,0,6aa1d8b6c4a0f124c66574ced2f9e480e232ca912559bf0084d593981c6213c1,2024-08-29T14:15:09.530000
CVE-2024-8303,0,0,df216f6ed6991ebfcd8d04a527576b3dbc34dfc62eb0afc850512e7710171894,2024-08-29T15:15:34.783000
CVE-2024-8304,0,0,0b11e3bd31707139d665525dc7f3be4c5c9aa682a3f15d2ded6c49c9b5d9a51b,2024-08-29T15:15:35.070000

Can't render this file because it is too large.