diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34636.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34636.json index 07490914ce3..db8b62aeb1d 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34636.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34636.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34636", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-08-07T02:15:40.780", - "lastModified": "2024-08-07T15:17:46.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:47:17.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:email:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.94.2", + "matchCriteriaId": "BFD9299D-7B4F-4375-B4C5-52D9929FC5A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=08", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35118.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35118.json new file mode 100644 index 00000000000..5f87af979bc --- /dev/null +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35118.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-35118", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-08-29T16:15:08.613", + "lastModified": "2024-08-29T16:15:08.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MaaS360 for Android 6.31 through 8.60 is using hard coded credentials that can be obtained by a user with physical access to the device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/290341", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7166750", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json new file mode 100644 index 00000000000..0d5646cc5ad --- /dev/null +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-35133", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-08-29T17:15:07.250", + "lastModified": "2024-08-29T17:15:07.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7166712", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35697.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35697.json index 8e92e49a4f3..467ad556751 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35697.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35697", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:52.837", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:13:49.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:eduma:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.4.8", + "matchCriteriaId": "F3616F96-75BE-44F4-89A1-870D9CC90120" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/eduma/wordpress-eduma-theme-5-4-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35698.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35698.json index ac3df431ebd..659256044f3 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35698.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35698", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:53.043", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:11:36.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yithemes:yith_woocommerce_tab_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.35.1", + "matchCriteriaId": "1236E5CB-8770-4718-A968-F8DA7F27FC34" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/yith-woocommerce-tab-manager/wordpress-yith-woocommerce-tab-manager-plugin-1-35-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35699.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35699.json index f2f14d6f0ad..1059c6b74c1 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35699.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35699", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:53.253", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:09:55.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_feed:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.9", + "matchCriteriaId": "466E8201-D76F-45A7-89E0-F41A866BC26C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ht-instagram/wordpress-ht-feed-plugin-1-2-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35701.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35701.json index a58bac4ff57..3eaf6e3381c 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35701.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35701", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:53.460", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:09:25.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.14", + "matchCriteriaId": "69E09F7E-4C58-4023-93CA-F30967747DEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-13-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35702.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35702.json index 3a40ef1c0bc..179123c1049 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35702.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35702", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:53.680", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:08:38.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.6.1", + "matchCriteriaId": "475B234F-6D81-4BEC-AAB7-61C68ABAF55F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-for-elementor-plugin-2-0-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35703.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35703.json index 9cd72749c76..1ffe8477e3e 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35703.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35703.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35703", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:53.893", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:08:03.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "D609FDF8-D41B-42A2-9898-B343BE8405AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sina-extension-for-elementor/wordpress-sina-extension-for-elementor-plugin-3-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35704.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35704.json index 06c2d289241..6a451611084 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35704.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35704", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:54.110", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:02:43.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpblockart:blockart_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "DBCD5BF2-F569-4FC2-AFBA-8C53C50E9940" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/blockart-blocks/wordpress-blockart-blocks-plugin-2-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35705.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35705.json index 27c4dd14f6b..fb19345a0f8 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35705.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35705", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:54.327", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:01:16.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getbutterfly:block_for_font_awesome:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "62F6B831-D71B-42A7-BE77-C6BE3886247C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/block-for-font-awesome/wordpress-block-for-font-awesome-plugin-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35706.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35706.json index dec2659474d..f3a8ab07874 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35706.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35706", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:54.540", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T16:59:18.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:heateor:social_login:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.33", + "matchCriteriaId": "CB553D5A-C7D3-4ABF-B31B-41D6A270B613" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/heateor-social-login/wordpress-heateor-social-login-wordpress-plugin-1-1-32-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35895.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35895.json index bd771fe516a..10b513214ce 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35895.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35895.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35895", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:10.477", - "lastModified": "2024-06-25T22:15:32.367", + "lastModified": "2024-08-29T17:15:07.480", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -25,6 +25,10 @@ "url": "https://git.kernel.org/stable/c/6af057ccdd8e7619960aca1f0428339f213b31cd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/913c30f827e17d8cda1da6eeb990f350d36cb69b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/a44770fed86515eedb5a7c00b787f847ebb134a5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" @@ -44,10 +48,6 @@ { "url": "https://git.kernel.org/stable/c/ff91059932401894e6c86341915615c5eb0eca48", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json index 318cc3ae132..e6001caccf5 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35937", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.553", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-08-29T17:15:07.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -28,6 +28,10 @@ { "url": "https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9eb3bc0973d084423a6df21cf2c74692ff05647e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35966.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35966.json index d565cce2c10..551cbfa4d66 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35966.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35966.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35966", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.580", - "lastModified": "2024-08-19T05:15:06.383", + "lastModified": "2024-08-29T17:15:07.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -28,6 +28,10 @@ { "url": "https://git.kernel.org/stable/c/c3f787a3eafe519c93df9abbb0ca5145861c8d0f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/eea40d33bf936a5c7fb03c190e61e0cfee00e872", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json index ee0d9edd626..c995eec6e01 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37462", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T11:15:15.337", - "lastModified": "2024-07-09T18:19:14.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T16:05:11.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.3", + "matchCriteriaId": "8335538D-07A7-4494-8B3F-7CA3D7473BAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ultimate-bootstrap-elements-for-elementor/wordpress-ultimate-bootstrap-elements-for-elementor-plugin-1-4-2-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json index f3ba8e5363d..8fbb7f19475 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39677", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T15:15:22.450", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:29:55.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,26 +81,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nhibernate:nhibernate-core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.9", + "matchCriteriaId": "23371DC1-350D-459D-AB4F-1E251FC87BB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nhibernate:nhibernate-core:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.5.2", + "matchCriteriaId": "09A1DB68-907D-4000-8F0C-8C2E8C699E7C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nhibernate/nhibernate-core/issues/3516", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/nhibernate/nhibernate-core/pull/3517", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/nhibernate/nhibernate-core/pull/3547", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/nhibernate/nhibernate-core/security/advisories/GHSA-fg4q-ccq8-3r5q", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39751.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39751.json index 8f9c6c960fc..a261a41a4fb 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39751.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39751.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39751", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-06T16:15:48.930", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:56:32.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297429", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.ibm.com/support/pages/node/7160580", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json index 683c1c08d52..fb0f788022c 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39880", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:02.740", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:38:18.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -85,8 +105,18 @@ }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,10 +125,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json index 4d05b9f8482..71f8984371a 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39881", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:02.893", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:37:05.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json index f418eef91f1..f24acc624c9 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39882", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:03.013", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:34:50.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json index 90b752dae06..36e02b1a15c 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39883", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:03.133", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:33:42.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:cncsoft-g2:2.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "023EB74A-5EBD-489D-BA0F-CF4ED45EECB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json index 766274df6b4..3137349ad38 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40101", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T14:16:04.117", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:57:16.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,82 @@ "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) reflejado en '/search' en microweber 2.0.15 y anteriores, que permite a atacantes remotos no autenticados inyectar scripts web o HTML arbitrarios a trav\u00e9s del par\u00e1metro 'palabras clave'." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.15", + "matchCriteriaId": "FD28663A-01D3-4043-A5CD-4086DCE81E0C" + } + ] + } + ] + } + ], "references": [ { "url": "http://microweber.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/microweber/microweber/commit/0dede6886c6df3d1f31c4f4e3ba1ab4a336fbf79", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://seclists.org/fulldisclosure/2024/Aug/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40972.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40972.json index 3525eeefba3..926dc073a17 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40972.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40972.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40972", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.820", - "lastModified": "2024-08-19T05:15:06.657", + "lastModified": "2024-08-29T17:15:07.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/0752e7fb549d90c33b4d4186f11cfd25a556d1dd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/0a46ef234756dca04623b7591e8ebb3440622f0b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json index 0482999c095..f604cf39143 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41024", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:11.270", - "lastModified": "2024-07-29T16:21:52.517", + "lastModified": "2024-08-29T17:15:07.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/2eb973ee4770a26d9b5e292b58ad29822d321c7f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/5e305b5986dc52122a9368a1461f0c13e1de3fd6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" @@ -28,6 +32,10 @@ { "url": "https://git.kernel.org/stable/c/c69fd8afacebfdf2f8a1ee1ea7e0723786529874", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ea13bd807f1cef1af375d999980a9b9794c789b6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json new file mode 100644 index 00000000000..97a5365e5a2 --- /dev/null +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-41964", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-29T17:15:07.980", + "lastModified": "2024-08-29T17:15:07.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kirby is a CMS targeting designers and editors. Kirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions. Permissions for creating and deleting languages have already existed and could be configured, but were not enforced by Kirby's frontend or backend code. A permission for updating existing languages has not existed before the patched versions. So disabling the languages.* wildcard permission for a role could not have prohibited updates to existing language definitions. The missing permission checks allowed attackers with Panel access to manipulate the language definitions. The problem has been patched in Kirby 3.6.6.6, Kirby 3.7.5.5, Kirby 3.8.4.4, Kirby 3.9.8.2, Kirby 3.10.1.1, and Kirby 4.3.1. Please update to one of these or a later version to fix the vulnerability. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42222.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42222.json index d02f0344fd2..bd7f98fbdc9 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42222.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42222", "sourceIdentifier": "security@apache.org", "published": "2024-08-07T08:16:12.473", - "lastModified": "2024-08-07T15:17:46.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:43:59.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": "En Apache CloudStack 4.19.1.0, una regresi\u00f3n en la API de listado de redes permite el acceso no autorizado a la lista de detalles de la red para el administrador del dominio y las cuentas de usuario normales. Esta vulnerabilidad compromete el aislamiento de los inquilinos, lo que podr\u00eda provocar un acceso no autorizado a los detalles, las configuraciones y los datos de la red. Se recomienda a los usuarios afectados que actualicen a la versi\u00f3n 4.19.1.1 para solucionar este problema. Los usuarios de versiones anteriores de CloudStack que est\u00e9n considerando actualizar, pueden omitir 4.19.1.0 y actualizar directamente a 4.19.1.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,22 +61,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F28C1387-130B-4479-BE47-3CEBC3E92C5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/apache/cloudstack/issues/9456", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wlj", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json index fe4dde2d589..9f597471adf 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42467", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T13:38:34.740", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:26:43.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openhab:openhab_web_interface:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.1", + "matchCriteriaId": "CD354FE1-98C9-493C-BCF6-4DAFC179459E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/backend/rest/ProxyResource.java#L83", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-v7gr-mqpj-wwh3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43111.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43111.json index 948c77c6a05..96ea8032ced 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43111.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43111", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T16:15:49.370", - "lastModified": "2024-08-07T15:35:08.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:53:16.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "129", + "matchCriteriaId": "AB839932-DBCE-4AAF-BA54-2A226D535616" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874907", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-36/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43112.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43112.json index bbac3a066c1..9c16b2fa92b 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43112.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43112", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T16:15:49.437", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:51:55.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Mantener presionado un enlace de descarga podr\u00eda proporcionar un medio para ejecutar Cross-Site Scripting. Esta vulnerabilidad afecta a Firefox para iOS < 129." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "129", + "matchCriteriaId": "AB839932-DBCE-4AAF-BA54-2A226D535616" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874910", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-36/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43113.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43113.json index be55ef0450a..6e680f46a28 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43113.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43113", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T16:15:49.493", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T16:51:33.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "El men\u00fa contextual de los enlaces podr\u00eda brindar una oportunidad para ataques de Cross-Site Scripting. Esta vulnerabilidad afecta a Firefox para iOS < 129." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "129", + "matchCriteriaId": "AB839932-DBCE-4AAF-BA54-2A226D535616" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874964", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-36/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43140.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43140.json index 8e3887b4d0a..b7241665b8d 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43140.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43140.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43140", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-13T12:15:06.887", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T16:04:30.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "93ECC3F5-0C5F-4366-8911-CC260DA4DBFB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ultimate-bootstrap-elements-for-elementor/wordpress-ultimate-bootstrap-elements-for-elementor-plugin-1-4-4-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json new file mode 100644 index 00000000000..d774c22d87e --- /dev/null +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43804", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-29T17:15:08.193", + "lastModified": "2024-08-29T17:15:08.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. An OS Command Injection vulnerability allows any authenticated user on the application to execute arbitrary code on the web application server via port scanning functionality. User-supplied input is used without validation when constructing and executing an OS command. User supplied JSON POST data is parsed and if \"id\" JSON key does not exist, JSON value supplied via \"ip\" JSON key is assigned to the \"ip\" variable. Later on, \"ip\" variable which can be controlled by the attacker is used when constructing the cmd and cmd1 strings without any extra validation. Then, server_mod.subprocess_execute function is called on both cmd1 and cmd2. When the definition of the server_mod.subprocess_execute() function is analyzed, it can be seen that subprocess.Popen() is called on the input parameter with shell=True which results in OS Command Injection. This issue has not yet been patched. Users are advised to contact the Roxy-WI to coordinate a fix." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json index 38a1255b8af..cf132f5ddd5 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43845", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.837", - "lastModified": "2024-08-19T12:59:59.177", + "lastModified": "2024-08-29T17:15:08.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -25,6 +25,10 @@ "url": "https://git.kernel.org/stable/c/40d7b3ed52449d36143bab8d3e70926aa61a60f4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/c996b570305e7a6910c2ce4cdcd4c22757ffe241", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43884.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43884.json index 48d9b51a1d5..da051b73f79 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43884.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43884", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T08:15:03.827", - "lastModified": "2024-08-27T14:37:20.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-29T17:15:08.457", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -91,12 +91,24 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json index 3bd2248dc43..c1dc614c85f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.437", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:15:08.533", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: drop bad gso csum_start and offset in virtio_net_hdr\n\nTighten csum_start and csum_offset checks in virtio_net_hdr_to_skb\nfor GSO packets.\n\nThe function already checks that a checksum requested with\nVIRTIO_NET_HDR_F_NEEDS_CSUM is in skb linear. But for GSO packets\nthis might not hold for segs after segmentation.\n\nSyzkaller demonstrated to reach this warning in skb_checksum_help\n\n\toffset = skb_checksum_start_offset(skb);\n\tret = -EINVAL;\n\tif (WARN_ON_ONCE(offset >= skb_headlen(skb)))\n\nBy injecting a TSO packet:\n\nWARNING: CPU: 1 PID: 3539 at net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0\n ip_do_fragment+0x209/0x1b20 net/ipv4/ip_output.c:774\n ip_finish_output_gso net/ipv4/ip_output.c:279 [inline]\n __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301\n iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82\n ip_tunnel_xmit+0x2296/0x2c70 net/ipv4/ip_tunnel.c:813\n __gre_xmit net/ipv4/ip_gre.c:469 [inline]\n ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661\n __netdev_start_xmit include/linux/netdevice.h:4850 [inline]\n netdev_start_xmit include/linux/netdevice.h:4864 [inline]\n xmit_one net/core/dev.c:3595 [inline]\n dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611\n __dev_queue_xmit+0x1b97/0x3c90 net/core/dev.c:4261\n packet_snd net/packet/af_packet.c:3073 [inline]\n\nThe geometry of the bad input packet at tcp_gso_segment:\n\n[ 52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0\n[ 52.003050][ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244\n[ 52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(size=1552 type=3 segs=0))\n[ 52.003050][ T8403] csum(0x60000c7 start=199 offset=1536\nip_summed=3 complete_sw=0 valid=0 level=0)\n\nMitigate with stricter input validation.\n\ncsum_offset: for GSO packets, deduce the correct value from gso_type.\nThis is already done for USO. Extend it to TSO. Let UFO be:\nudp[46]_ufo_fragment ignores these fields and always computes the\nchecksum in software.\n\ncsum_start: finding the real offset requires parsing to the transport\nheader. Do not add a parser, use existing segmentation parsing. Thanks\nto SKB_GSO_DODGY, that also catches bad packets that are hw offloaded.\nAgain test both TSO and USO. Do not test UFO for the above reason, and\ndo not test UDP tunnel offload.\n\nGSO packet are almost always CHECKSUM_PARTIAL. USO packets may be\nCHECKSUM_NONE since commit 10154dbded6d6 (\"udp: Allow GSO transmit\nfrom devices with no checksum offload\"), but then still these fields\nare initialized correctly in udp4_hwcsum/udp6_hwcsum_outgoing. So no\nneed to test for ip_summed == CHECKSUM_PARTIAL first.\n\nThis revises an existing fix mentioned in the Fixes tag, which broke\nsmall packets with GSO offload, as detected by kselftests." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: elimine gso csum_start incorrecto y offset en virtio_net_hdr. Apriete las comprobaciones de csum_start y csum_offset en virtio_net_hdr_to_skb para paquetes GSO. La funci\u00f3n ya comprueba que una suma de comprobaci\u00f3n solicitada con VIRTIO_NET_HDR_F_NEEDS_CSUM est\u00e9 en skb lineal. Pero para los paquetes OSG esto podr\u00eda no ser v\u00e1lido para los segmentos posteriores a la segmentaci\u00f3n. Syzkaller demostr\u00f3 alcanzar esta advertencia en skb_checksum_help offset = skb_checksum_start_offset(skb); ret = -EINVAL; if (WARN_ON_ONCE(offset >= skb_headlen(skb))) Al inyectar un paquete TSO: ADVERTENCIA: CPU: 1 PID: 3539 en net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0 ip_do_fragment+0x209/0x1b20 net/ipv4 /ip_output.c:774 ip_finish_output_gso net/ipv4/ip_output.c:279 [en l\u00ednea] __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82 +0x2296 /0x2c70 net/ipv4/ip_tunnel.c:813 __gre_xmit net/ipv4/ip_gre.c:469 [en l\u00ednea] ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661 __netdev_start_xmit include/linux/netdevice.h:4850 [en l\u00ednea ] netdev_start_xmit include/linux/netdevice.h:4864 [en l\u00ednea] xmit_one net/core/dev.c:3595 [en l\u00ednea] dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611 __dev_queue_xmit+0x1b97/0x3c90 net/core/ dev.c:4261 paquete_snd net/packet/af_packet.c:3073 [en l\u00ednea] La geometr\u00eda del paquete de entrada incorrecto en tcp_gso_segment: [ 52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0 [ 52.003050] [ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244 [ 52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(tama\u00f1o=1552 tipo=3 segs=0)) [ 52.003050][ T8403] csum(0x60000c7 start=199 offset=1536 ip_summed=3 complete_sw=0 valid=0 nivel=0) Mitigar con una validaci\u00f3n de entrada m\u00e1s estricta. csum_offset: para paquetes GSO, deduzca el valor correcto de gso_type. Esto ya est\u00e1 hecho para la OSU. Ampliarlo a TSO. Sea UFO: udp[46]_ufo_fragment ignora estos campos y siempre calcula la suma de comprobaci\u00f3n en el software. csum_start: encontrar el desplazamiento real requiere analizar el encabezado de transporte. No agregue un analizador, utilice el an\u00e1lisis de segmentaci\u00f3n existente. Gracias a SKB_GSO_DODGY, eso tambi\u00e9n detecta paquetes defectuosos que se descargan correctamente. Nuevamente pruebe tanto TSO como USO. No pruebe UFO por el motivo anterior y no pruebe la descarga del t\u00fanel UDP. Los paquetes OSG casi siempre son CHECKSUM_PARTIAL. Los paquetes USO pueden ser CHECKSUM_NONE desde el commit 10154dbded6d6 (\"udp: Permitir transmisi\u00f3n GSO desde dispositivos sin descarga de suma de verificaci\u00f3n\"), pero a\u00fan as\u00ed estos campos se inicializan correctamente en udp4_hwcsum/udp6_hwcsum_outgoing. Por lo tanto, no es necesario probar primero ip_summed == CHECKSUM_PARTIAL. Esto revisa una soluci\u00f3n existente mencionada en la etiqueta Correcciones, que romp\u00eda paquetes peque\u00f1os con la descarga GSO, seg\u00fan lo detectado por kselftests." } ], "metrics": {}, @@ -24,6 +28,10 @@ { "url": "https://git.kernel.org/stable/c/89add40066f9ed9abe5f7f886fe5789ff7e0c50e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f01c5e335fbb7fb612d40f14a3c02e2612a43d3b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43943.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43943.json new file mode 100644 index 00000000000..64573bf0ee2 --- /dev/null +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43943.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43943", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-29T16:15:09.013", + "lastModified": "2024-08-29T16:15:09.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wpsoul Greenshift Woocommerce Addon allows SQL Injection.This issue affects Greenshift Woocommerce Addon: from n/a before 1.9.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/greenshiftwoo/wordpress-greenshift-woocommerce-addon-plugin-1-9-8-subscriber-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json new file mode 100644 index 00000000000..26032d20b2c --- /dev/null +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43944.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43944", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-29T16:15:09.197", + "lastModified": "2024-08-29T16:15:09.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Yassine Idrissi Maintenance & Coming Soon Redirect Animation allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance & Coming Soon Redirect Animation: from n/a through 2.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/maintenance-coming-soon-redirect-animation/wordpress-maintenance-coming-soon-redirect-animation-plugin-2-1-3-ip-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43954.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43954.json new file mode 100644 index 00000000000..83aab0614e7 --- /dev/null +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43954.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43954", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-29T16:15:09.383", + "lastModified": "2024-08-29T16:15:09.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Themeum Droip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Droip: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-subscriber-settings-change-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43955.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43955.json new file mode 100644 index 00000000000..30151abd542 --- /dev/null +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43955.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43955", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-29T16:15:09.570", + "lastModified": "2024-08-29T16:15:09.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themeum Droip allows File Manipulation.This issue affects Droip: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-unauthenticated-arbitrary-file-download-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43957.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43957.json new file mode 100644 index 00000000000..23b6bb46c53 --- /dev/null +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43957.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43957", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-29T16:15:09.757", + "lastModified": "2024-08-29T16:15:09.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sk. Abul Hasan Animated Number Counters allows PHP Local File Inclusion.This issue affects Animated Number Counters: from n/a through 1.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/animated-number-counters/wordpress-animated-number-counters-plugin-1-9-editor-limited-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43965.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43965.json new file mode 100644 index 00000000000..af0268672d2 --- /dev/null +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43965.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43965", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-29T16:15:09.947", + "lastModified": "2024-08-29T16:15:09.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smackcoders SendGrid for WordPress allows SQL Injection.This issue affects SendGrid for WordPress: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-sendgrid-mailer/wordpress-sendgrid-for-wordpress-plugin-1-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json new file mode 100644 index 00000000000..2ed2094dd4d --- /dev/null +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44919", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-29T17:15:08.670", + "lastModified": "2024-08-29T17:15:08.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the component admin_ads.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ad description parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json index 12cc3ad7c9f..19c297705cf 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44938", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T12:15:05.960", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:15:08.753", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix shift-out-of-bounds in dbDiscardAG\n\nWhen searching for the next smaller log2 block, BLKSTOL2() returned 0,\ncausing shift exponent -1 to be negative.\n\nThis patch fixes the issue by exiting the loop directly when negative\nshift is found." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: jfs: corrigi\u00f3 el desplazamiento fuera de los l\u00edmites en dbDiscardAG Al buscar el siguiente bloque log2 m\u00e1s peque\u00f1o, BLKSTOL2() devolvi\u00f3 0, lo que provoc\u00f3 que el exponente de desplazamiento -1 fuera negativo. Este parche soluciona el problema saliendo del bucle directamente cuando se encuentra un cambio negativo." } ], "metrics": {}, @@ -21,6 +25,10 @@ "url": "https://git.kernel.org/stable/c/7063b80268e2593e58bee8a8d709c2f3ff93e2f2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/bd04a149e3a29e7f71b7956ed41dba34e42d539e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/f650148b43949ca9e37e820804bb6026fff404f3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44939.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44939.json index cd616e7d42a..f4db8244abd 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44939.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44939.json @@ -2,17 +2,25 @@ "id": "CVE-2024-44939", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T12:15:06.007", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:15:08.837", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix null ptr deref in dtInsertEntry\n\n[syzbot reported]\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 0 PID: 5061 Comm: syz-executor404 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nRIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713\n...\n[Analyze]\nIn dtInsertEntry(), when the pointer h has the same value as p, after writing\nname in UniStrncpy_to_le(), p->header.flag will be cleared. This will cause the\npreviously true judgment \"p->header.flag & BT-LEAF\" to change to no after writing\nthe name operation, this leads to entering an incorrect branch and accessing the\nuninitialized object ih when judging this condition for the second time.\n\n[Fix]\nAfter got the page, check freelist first, if freelist == 0 then exit dtInsert()\nand return -EINVAL." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: corrige null ptr deref en dtInsertEntry [syzbot inform\u00f3] falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr -deref en rango [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 5061 Comm: syz-executor404 No contaminado 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 03 /27 /2024 RIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713 ... [Analizar] En dtInsertEntry(), cuando el puntero h tiene el mismo valor que p, despu\u00e9s de escribir el nombre en UniStrncpy_to_le(), Se borrar\u00e1 p->header.flag. Esto har\u00e1 que el juicio previamente verdadero \"p->header.flag & BT-LEAF\" cambie a no despu\u00e9s de escribir la operaci\u00f3n de nombre, esto lleva a ingresar una rama incorrecta y acceder al objeto no inicializado ih al juzgar esta condici\u00f3n por segunda vez. [Soluci\u00f3n] Despu\u00e9s de obtener la p\u00e1gina, verifique primero la lista libre, si lista libre == 0, salga de dtInsert() y devuelva -EINVAL." } ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/53023ab11836ac56fd75f7a71ec1356e50920fa9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/6ea10dbb1e6c58384136e9adfd75f81951e423f6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json index f0e1833c28a..61ccce5d06c 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44940", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T12:15:06.053", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:15:08.903", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: remove warn in gue_gro_receive on unsupported protocol\n\nDrop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is\nnot known or does not have a GRO handler.\n\nSuch a packet is easily constructed. Syzbot generates them and sets\noff this warning.\n\nRemove the warning as it is expected and not actionable.\n\nThe warning was previously reduced from WARN_ON to WARN_ON_ONCE in\ncommit 270136613bf7 (\"fou: Do WARN_ON_ONCE in gue_gro_receive for bad\nproto callbacks\")." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fou: elimine la advertencia en gue_gro_receive en un protocolo no compatible. Descarte WARN_ON_ONCE en gue_gro_receive si el tipo encapsulado no se conoce o no tiene un controlador GRO. Un paquete de este tipo se construye f\u00e1cilmente. Syzbot los genera y activa esta advertencia. Elimine la advertencia como se esperaba y no es procesable. La advertencia se redujo previamente de WARN_ON a WARN_ON_ONCE en el commit 270136613bf7 (\"fou: Haga WARN_ON_ONCE en gue_gro_receive para devoluciones de llamadas de proto incorrectas\")." } ], "metrics": {}, @@ -21,6 +25,10 @@ "url": "https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45045.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45045.json new file mode 100644 index 00000000000..ad511fd0639 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45045.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45045", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-29T17:15:08.977", + "lastModified": "2024-08-29T17:15:08.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. In the mobile (Android/iOS) device variants of Collabora Online it was possible to inject JavaScript via url encoded values in links contained in documents. Since the Android JavaScript interface allows access to internal functions, the likelihood that the app could be compromised via this vulnerability is considered high. Non-mobile variants are not affected. Mobile variants should update to the latest version provided by the platform appstore. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-84" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-78cg-rg4q-26qv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45056.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45056.json new file mode 100644 index 00000000000..9e1ffc83b3f --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45056.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45056", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-29T17:15:09.173", + "lastModified": "2024-08-29T17:15:09.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "zksolc is a Solidity compiler for ZKsync. All LLVM versions since 2015 fold `(xor (shl 1, x), -1)` to `(rotl ~1, x)` if run with optimizations enabled. Here `~1` is generated as an unsigned 64 bits number (`2^64-1`). This number is zero-extended to 256 bits on EraVM target while it should have been sign-extended. Thus instead of producing `roti 2^256 - 1, x` the compiler produces `rotl 2^64 - 1, x`. Analysis has shown that no contracts were affected by the date of publishing this advisory. This issue has been addressed in version 1.5.3. Users are advised to upgrade and redeploy all contracts. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-682" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/llvm/llvm-project/commit/e48237df95b49a36b8ffceb78c8a58f4be1b4344", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matter-labs/era-compiler-solidity/security/advisories/GHSA-fpx7-8vc6-frjj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6200.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6200.json index 7f5e990b382..8f0db259958 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6200.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6200", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2024-08-06T06:15:35.030", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:53:40.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.143.61", + "matchCriteriaId": "0C394C94-9968-465E-98B9-7BC8429BAD67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.144", + "versionEndExcluding": "2.146.1", + "matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://haloitsm.com/guides/article/?kbid=2152", - "source": "vulnerability@ncsc.ch" + "source": "vulnerability@ncsc.ch", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6201.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6201.json index a72819da930..a0a5a984ea7 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6201.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6201", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2024-08-06T06:15:35.283", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:52:07.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -39,10 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.143.21", + "matchCriteriaId": "A015991C-B19E-4216-9EDA-565C39027C93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.144", + "versionEndExcluding": "2.146.1", + "matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://haloitsm.com/guides/article/?kbid=2153", - "source": "vulnerability@ncsc.ch" + "source": "vulnerability@ncsc.ch", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6202.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6202.json index a75deff4600..5f6f0ee0ae2 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6202.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6202", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2024-08-06T06:15:35.487", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:48:43.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.143.61", + "matchCriteriaId": "0C394C94-9968-465E-98B9-7BC8429BAD67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.144", + "versionEndExcluding": "2.146.1", + "matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://haloitsm.com/guides/article/?kbid=2154", - "source": "vulnerability@ncsc.ch" + "source": "vulnerability@ncsc.ch", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6203.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6203.json index 5422479cc2a..2f6c1b6f296 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6203.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6203.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6203", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2024-08-06T06:15:35.727", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:46:28.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + }, { "source": "vulnerability@ncsc.ch", "type": "Secondary", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.143.61", + "matchCriteriaId": "0C394C94-9968-465E-98B9-7BC8429BAD67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.144", + "versionEndExcluding": "2.146.1", + "matchCriteriaId": "CEBD3BDE-57DA-41C9-821A-F8C6A8864FC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://haloitsm.com/guides/article/?kbid=2155", - "source": "vulnerability@ncsc.ch" + "source": "vulnerability@ncsc.ch", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7523.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7523.json index 772ec00b221..af7bdc32a00 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7523.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7523.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7523", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T13:15:57.297", - "lastModified": "2024-08-06T16:30:24.547", + "lastModified": "2024-08-29T17:41:09.627", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,15 +15,75 @@ "value": "Una opci\u00f3n seleccionada podr\u00eda ocultar parcialmente las indicaciones de seguridad. Esto podr\u00eda ser utilizado por un sitio malicioso para enga\u00f1ar a un usuario para que conceda permisos. *Este problema solo afecta a las versiones de Firefox para Android.* Esta vulnerabilidad afecta a Firefox < 129." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", + "versionEndExcluding": "129", + "matchCriteriaId": "5B4557B2-3B2F-4640-865C-8D61337D5BA0" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908344", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7524.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7524.json index 24bace5d681..53f68d4c18f 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7524.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7524", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T13:15:57.357", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:35:34.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "Firefox agrega ajustes de compatibilidad web en lugar de algunos scripts de seguimiento bloqueados por la Protecci\u00f3n de seguimiento mejorada. En un sitio protegido por la Pol\u00edtica de seguridad de contenido en modo \"din\u00e1mico estricto\", un atacante capaz de inyectar un elemento HTML podr\u00eda haber utilizado un ataque DOM Clobbering en algunas de las correcciones y lograr XSS, evitando la protecci\u00f3n din\u00e1mica estricta del CSP. Esta vulnerabilidad afecta a Firefox < 129, Firefox ESR < 115.14 y Firefox ESR < 128.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "129.0", + "matchCriteriaId": "12C9ABF7-3B44-4C24-B152-488DCF9E2D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.14", + "matchCriteriaId": "77E36842-1F83-4A47-94D2-5D0A9825D3C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.1", + "matchCriteriaId": "38D2AF1C-E314-45EE-A2A9-7B44DA2A4ACF" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7538.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7538.json index f2671f9d02d..793cd38b218 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7538.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7538", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:34.860", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:59:31.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*", + "matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1078/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7539.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7539.json index 54335184662..90f784b1a2f 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7539.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7539", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:35.053", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:59:05.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*", + "matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1079/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7540.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7540.json index a330402638b..d42d63c4245 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7540.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7540", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:35.270", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:58:17.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*", + "matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1080/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7541.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7541.json index 0be6686beea..5abe952df89 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7541.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7541", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:35.470", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:57:37.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*", + "matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1081/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7542.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7542.json index 706c0147860..3eb854f0afb 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7542.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7542", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:35.663", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:56:54.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:1.34:*:*:*:*:*:*:*", + "matchCriteriaId": "61E9AB52-5F6C-43E6-AF07-343081C774A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1082/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7546.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7546.json index 087b13beb7d..47b84c70c0d 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7546.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7546", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-08-06T00:15:36.450", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-29T17:55:47.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ofono_project:ofono:2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3C23EE-8748-4C6E-B445-A9A9A9B3AF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1086/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json index ce305c51776..195ce40d00c 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8208", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-27T18:15:15.950", - "lastModified": "2024-08-27T18:33:14.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:27:02.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en nafisulbari/itsourcecode Insurance Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo editClient.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento AGENT ID conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,18 +140,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.275917", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275917", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.393511", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json index 9d6d98b8ef9..733de0819a9 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8209", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-27T18:15:16.617", - "lastModified": "2024-08-27T18:33:14.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T17:23:42.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en nafisulbari/itsourcecode Insurance Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo addClient.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ID DE CLIENTE conduce a cross site scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -105,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,18 +150,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.275918", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275918", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.393512", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json index 23e06831414..2b007404241 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8210", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-27T19:15:18.250", - "lastModified": "2024-08-28T12:57:39.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-29T16:04:45.310", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -68,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -117,8 +137,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -127,30 +157,591 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8CFCD7B-EFFB-4FAB-9537-46AC7B567126" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03C5CED7-55A7-4026-95CD-A2ADB5853823" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE78C5B-2A98-47EE-BF67-CF58AFE50A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C1EF70-AD9B-48D7-8DF6-A6416C517F12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E691E775-382C-4BA9-AA44-FBC3148D3E54" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42DA6DEB-3578-44A5-916F-1628141F0DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D042C75D-6731-46B2-B11E-A009B9029B3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAFE1E3-B705-4CF1-AEB9-A474432B6D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D08ED7-3E7F-4D30-890E-6535F6C34682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A74D270-9076-474D-A06F-C915FCEA2164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75E5010F-21BA-4B6B-B00C-2688268FD67B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C5E2D7-018E-4ED1-92C7-B5B1D8CC6990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E56821-7EA0-4CA1-BA17-7FD4ED9F794C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD656642-EDD4-4EB2-81AB-04207BC14196" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F968791D-D3BD-442C-818E-4E878B12776D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39FF9666-8493-4A36-A199-1190AD8FAF3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "816E5F34-CE76-49E5-91F3-8CC84C561558" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33CB308B-CF82-4E40-B2DC-23EBD48CD130" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "172D5EFF-E0DF-4A99-8499-71450A46A86C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB305B29-7F89-4A52-9ECF-3DB0BDD2350D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E6F048-D865-4378-87C7-B0E528134276" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D26F4F77-A6E3-4D7D-A781-BEB5FF7BC44F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16954393-3449-438A-978C-265EE3A35FF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641CB5F1-3DE0-480B-95A4-FC42A8FF3C97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94ED678A-AB4C-4637-B0D8-C232A0BB5D5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3AD5EE-8E1E-4336-A1AB-AB028CC71286" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DAF62A4-2429-4B89-8FAD-8B23EF15E050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC28053F-88A9-4CA1-A2A2-CC90FEEA68FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A278BC9-6197-43D9-93C2-3DF760856FB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4599D769-0210-4D49-9896-9AD1376A037E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C677E53-6885-4EC4-A7CC-E24E8F445F59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452F9A4-3A0A-4773-9818-04C94CF9F8E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96195649-172A-4C21-AA15-7B05F86C5CEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A92F2C-16FD-4A53-8066-83FEC2818DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C44BE2C6-BF3E-43C3-B32F-2DCE756F94BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E161E54-2FE9-4359-9B2D-8700D00DE8E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_3rd_DiskMGR.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275919", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275919", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.397274", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json new file mode 100644 index 00000000000..ade164a26e9 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8255", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-29T16:15:10.140", + "lastModified": "2024-08-29T16:15:10.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.4, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f901a5ed071..d9cd5e73ae7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-29T16:00:18.154321+00:00 +2024-08-29T18:00:17.979389+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-29T15:55:30.247000+00:00 +2024-08-29T17:59:31.983000+00:00 ``` ### Last Data Feed Release @@ -33,67 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261477 +261491 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `14` -- [CVE-2024-1056](CVE-2024/CVE-2024-10xx/CVE-2024-1056.json) (`2024-08-29T14:15:08.270`) -- [CVE-2024-38693](CVE-2024/CVE-2024-386xx/CVE-2024-38693.json) (`2024-08-29T14:15:08.680`) -- [CVE-2024-38793](CVE-2024/CVE-2024-387xx/CVE-2024-38793.json) (`2024-08-29T15:15:26.260`) -- [CVE-2024-38795](CVE-2024/CVE-2024-387xx/CVE-2024-38795.json) (`2024-08-29T15:15:26.460`) -- [CVE-2024-39620](CVE-2024/CVE-2024-396xx/CVE-2024-39620.json) (`2024-08-29T15:15:26.710`) -- [CVE-2024-39622](CVE-2024/CVE-2024-396xx/CVE-2024-39622.json) (`2024-08-29T15:15:26.900`) -- [CVE-2024-39638](CVE-2024/CVE-2024-396xx/CVE-2024-39638.json) (`2024-08-29T15:15:27.093`) -- [CVE-2024-39653](CVE-2024/CVE-2024-396xx/CVE-2024-39653.json) (`2024-08-29T15:15:27.297`) -- [CVE-2024-39658](CVE-2024/CVE-2024-396xx/CVE-2024-39658.json) (`2024-08-29T15:15:27.493`) -- [CVE-2024-43132](CVE-2024/CVE-2024-431xx/CVE-2024-43132.json) (`2024-08-29T15:15:28.327`) -- [CVE-2024-43144](CVE-2024/CVE-2024-431xx/CVE-2024-43144.json) (`2024-08-29T15:15:28.530`) -- [CVE-2024-43917](CVE-2024/CVE-2024-439xx/CVE-2024-43917.json) (`2024-08-29T15:15:28.753`) -- [CVE-2024-43918](CVE-2024/CVE-2024-439xx/CVE-2024-43918.json) (`2024-08-29T15:15:29.010`) -- [CVE-2024-43922](CVE-2024/CVE-2024-439xx/CVE-2024-43922.json) (`2024-08-29T15:15:29.227`) -- [CVE-2024-43931](CVE-2024/CVE-2024-439xx/CVE-2024-43931.json) (`2024-08-29T15:15:29.427`) -- [CVE-2024-43939](CVE-2024/CVE-2024-439xx/CVE-2024-43939.json) (`2024-08-29T15:15:29.633`) -- [CVE-2024-43940](CVE-2024/CVE-2024-439xx/CVE-2024-43940.json) (`2024-08-29T15:15:29.833`) -- [CVE-2024-43941](CVE-2024/CVE-2024-439xx/CVE-2024-43941.json) (`2024-08-29T15:15:30.040`) -- [CVE-2024-43942](CVE-2024/CVE-2024-439xx/CVE-2024-43942.json) (`2024-08-29T15:15:30.247`) -- [CVE-2024-5057](CVE-2024/CVE-2024-50xx/CVE-2024-5057.json) (`2024-08-29T14:15:09.080`) -- [CVE-2024-8302](CVE-2024/CVE-2024-83xx/CVE-2024-8302.json) (`2024-08-29T14:15:09.530`) -- [CVE-2024-8303](CVE-2024/CVE-2024-83xx/CVE-2024-8303.json) (`2024-08-29T15:15:34.783`) -- [CVE-2024-8304](CVE-2024/CVE-2024-83xx/CVE-2024-8304.json) (`2024-08-29T15:15:35.070`) +- [CVE-2024-35118](CVE-2024/CVE-2024-351xx/CVE-2024-35118.json) (`2024-08-29T16:15:08.613`) +- [CVE-2024-35133](CVE-2024/CVE-2024-351xx/CVE-2024-35133.json) (`2024-08-29T17:15:07.250`) +- [CVE-2024-41964](CVE-2024/CVE-2024-419xx/CVE-2024-41964.json) (`2024-08-29T17:15:07.980`) +- [CVE-2024-43804](CVE-2024/CVE-2024-438xx/CVE-2024-43804.json) (`2024-08-29T17:15:08.193`) +- [CVE-2024-43943](CVE-2024/CVE-2024-439xx/CVE-2024-43943.json) (`2024-08-29T16:15:09.013`) +- [CVE-2024-43944](CVE-2024/CVE-2024-439xx/CVE-2024-43944.json) (`2024-08-29T16:15:09.197`) +- [CVE-2024-43954](CVE-2024/CVE-2024-439xx/CVE-2024-43954.json) (`2024-08-29T16:15:09.383`) +- [CVE-2024-43955](CVE-2024/CVE-2024-439xx/CVE-2024-43955.json) (`2024-08-29T16:15:09.570`) +- [CVE-2024-43957](CVE-2024/CVE-2024-439xx/CVE-2024-43957.json) (`2024-08-29T16:15:09.757`) +- [CVE-2024-43965](CVE-2024/CVE-2024-439xx/CVE-2024-43965.json) (`2024-08-29T16:15:09.947`) +- [CVE-2024-44919](CVE-2024/CVE-2024-449xx/CVE-2024-44919.json) (`2024-08-29T17:15:08.670`) +- [CVE-2024-45045](CVE-2024/CVE-2024-450xx/CVE-2024-45045.json) (`2024-08-29T17:15:08.977`) +- [CVE-2024-45056](CVE-2024/CVE-2024-450xx/CVE-2024-45056.json) (`2024-08-29T17:15:09.173`) +- [CVE-2024-8255](CVE-2024/CVE-2024-82xx/CVE-2024-8255.json) (`2024-08-29T16:15:10.140`) ### CVEs modified in the last Commit -Recently modified CVEs: `47` +Recently modified CVEs: `50` -- [CVE-2024-42167](CVE-2024/CVE-2024-421xx/CVE-2024-42167.json) (`2024-08-29T15:24:12.060`) -- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-29T14:04:30.733`) -- [CVE-2024-42408](CVE-2024/CVE-2024-424xx/CVE-2024-42408.json) (`2024-08-29T14:22:45.603`) -- [CVE-2024-42493](CVE-2024/CVE-2024-424xx/CVE-2024-42493.json) (`2024-08-29T14:24:14.373`) -- [CVE-2024-4853](CVE-2024/CVE-2024-48xx/CVE-2024-4853.json) (`2024-08-29T15:15:31.687`) -- [CVE-2024-4854](CVE-2024/CVE-2024-48xx/CVE-2024-4854.json) (`2024-08-29T15:15:31.797`) -- [CVE-2024-4855](CVE-2024/CVE-2024-48xx/CVE-2024-4855.json) (`2024-08-29T15:15:31.893`) -- [CVE-2024-5423](CVE-2024/CVE-2024-54xx/CVE-2024-5423.json) (`2024-08-29T15:41:13.247`) -- [CVE-2024-7554](CVE-2024/CVE-2024-75xx/CVE-2024-7554.json) (`2024-08-29T15:42:13.387`) -- [CVE-2024-7610](CVE-2024/CVE-2024-76xx/CVE-2024-7610.json) (`2024-08-29T15:45:27.523`) -- [CVE-2024-7851](CVE-2024/CVE-2024-78xx/CVE-2024-7851.json) (`2024-08-29T15:22:08.227`) -- [CVE-2024-7852](CVE-2024/CVE-2024-78xx/CVE-2024-7852.json) (`2024-08-29T15:23:16.160`) -- [CVE-2024-7853](CVE-2024/CVE-2024-78xx/CVE-2024-7853.json) (`2024-08-29T15:22:52.710`) -- [CVE-2024-8211](CVE-2024/CVE-2024-82xx/CVE-2024-8211.json) (`2024-08-29T15:54:56.390`) -- [CVE-2024-8212](CVE-2024/CVE-2024-82xx/CVE-2024-8212.json) (`2024-08-29T15:53:02.077`) -- [CVE-2024-8213](CVE-2024/CVE-2024-82xx/CVE-2024-8213.json) (`2024-08-29T15:51:33.390`) -- [CVE-2024-8214](CVE-2024/CVE-2024-82xx/CVE-2024-8214.json) (`2024-08-29T15:44:45.280`) -- [CVE-2024-8216](CVE-2024/CVE-2024-82xx/CVE-2024-8216.json) (`2024-08-29T15:41:34.107`) -- [CVE-2024-8217](CVE-2024/CVE-2024-82xx/CVE-2024-8217.json) (`2024-08-29T15:39:43.643`) -- [CVE-2024-8218](CVE-2024/CVE-2024-82xx/CVE-2024-8218.json) (`2024-08-29T15:38:10.610`) -- [CVE-2024-8219](CVE-2024/CVE-2024-82xx/CVE-2024-8219.json) (`2024-08-29T15:35:28.000`) -- [CVE-2024-8220](CVE-2024/CVE-2024-82xx/CVE-2024-8220.json) (`2024-08-29T14:49:54.737`) -- [CVE-2024-8221](CVE-2024/CVE-2024-82xx/CVE-2024-8221.json) (`2024-08-29T15:32:11.397`) -- [CVE-2024-8222](CVE-2024/CVE-2024-82xx/CVE-2024-8222.json) (`2024-08-29T15:13:09.227`) -- [CVE-2024-8223](CVE-2024/CVE-2024-82xx/CVE-2024-8223.json) (`2024-08-29T15:11:36.127`) +- [CVE-2024-43111](CVE-2024/CVE-2024-431xx/CVE-2024-43111.json) (`2024-08-29T16:53:16.233`) +- [CVE-2024-43112](CVE-2024/CVE-2024-431xx/CVE-2024-43112.json) (`2024-08-29T16:51:55.937`) +- [CVE-2024-43113](CVE-2024/CVE-2024-431xx/CVE-2024-43113.json) (`2024-08-29T16:51:33.367`) +- [CVE-2024-43140](CVE-2024/CVE-2024-431xx/CVE-2024-43140.json) (`2024-08-29T16:04:30.370`) +- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2024-08-29T17:15:08.397`) +- [CVE-2024-43884](CVE-2024/CVE-2024-438xx/CVE-2024-43884.json) (`2024-08-29T17:15:08.457`) +- [CVE-2024-43897](CVE-2024/CVE-2024-438xx/CVE-2024-43897.json) (`2024-08-29T17:15:08.533`) +- [CVE-2024-44938](CVE-2024/CVE-2024-449xx/CVE-2024-44938.json) (`2024-08-29T17:15:08.753`) +- [CVE-2024-44939](CVE-2024/CVE-2024-449xx/CVE-2024-44939.json) (`2024-08-29T17:15:08.837`) +- [CVE-2024-44940](CVE-2024/CVE-2024-449xx/CVE-2024-44940.json) (`2024-08-29T17:15:08.903`) +- [CVE-2024-6200](CVE-2024/CVE-2024-62xx/CVE-2024-6200.json) (`2024-08-29T17:53:40.483`) +- [CVE-2024-6201](CVE-2024/CVE-2024-62xx/CVE-2024-6201.json) (`2024-08-29T17:52:07.493`) +- [CVE-2024-6202](CVE-2024/CVE-2024-62xx/CVE-2024-6202.json) (`2024-08-29T17:48:43.723`) +- [CVE-2024-6203](CVE-2024/CVE-2024-62xx/CVE-2024-6203.json) (`2024-08-29T17:46:28.790`) +- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-29T17:41:09.627`) +- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-29T17:35:34.820`) +- [CVE-2024-7538](CVE-2024/CVE-2024-75xx/CVE-2024-7538.json) (`2024-08-29T17:59:31.983`) +- [CVE-2024-7539](CVE-2024/CVE-2024-75xx/CVE-2024-7539.json) (`2024-08-29T17:59:05.223`) +- [CVE-2024-7540](CVE-2024/CVE-2024-75xx/CVE-2024-7540.json) (`2024-08-29T17:58:17.420`) +- [CVE-2024-7541](CVE-2024/CVE-2024-75xx/CVE-2024-7541.json) (`2024-08-29T17:57:37.673`) +- [CVE-2024-7542](CVE-2024/CVE-2024-75xx/CVE-2024-7542.json) (`2024-08-29T17:56:54.357`) +- [CVE-2024-7546](CVE-2024/CVE-2024-75xx/CVE-2024-7546.json) (`2024-08-29T17:55:47.547`) +- [CVE-2024-8208](CVE-2024/CVE-2024-82xx/CVE-2024-8208.json) (`2024-08-29T17:27:02.397`) +- [CVE-2024-8209](CVE-2024/CVE-2024-82xx/CVE-2024-8209.json) (`2024-08-29T17:23:42.873`) +- [CVE-2024-8210](CVE-2024/CVE-2024-82xx/CVE-2024-8210.json) (`2024-08-29T16:04:45.310`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 85bb3017633..b5292c39c13 100644 --- a/_state.csv +++ b/_state.csv @@ -228512,7 +228512,7 @@ CVE-2023-38001,0,0,2e442ef5d1f9ada2569bffe28a8811d3833d9e464b2a836cb72bac6db743d CVE-2023-38002,0,0,1540466a828ca09fbbbfd3a7d1fa6f341816e6e7a4b7eb520ebe82fd4c1ac11f,2024-04-30T17:52:35.057000 CVE-2023-38003,0,0,4ddd805b10542d9494e91de28e072619549d2912a77654914b8456fbaea47381,2024-01-19T16:15:09.013000 CVE-2023-3801,0,0,138ee77b03ceaffda7a612b3ad2047ee632ca7ad988ceac5a51bc864960549cf,2024-05-17T02:27:49.220000 -CVE-2023-38018,0,1,e90323aa46f6ddf7da49bbec63d074de6a8cc1c6b6edadc7a1136ae6c87cd0d4,2024-08-29T14:36:06.443000 +CVE-2023-38018,0,0,e90323aa46f6ddf7da49bbec63d074de6a8cc1c6b6edadc7a1136ae6c87cd0d4,2024-08-29T14:36:06.443000 CVE-2023-38019,0,0,a7483660a3183e15c0cacd3224b950f982216efcae0797ec3946c751f10866dc,2024-02-09T19:13:52.923000 CVE-2023-3802,0,0,fdc4ccc90abad68517d8f377a1b9d399dbf83c5fec5330e0570f27ac07aa9a11,2024-05-17T02:27:49.327000 CVE-2023-38020,0,0,c1a3e43867e9d72a298a543040b6cb59eef078f91f668f177194a59f028fba8e,2024-02-09T18:44:32.197000 @@ -233699,7 +233699,7 @@ CVE-2023-45106,0,0,fbc31c2e756ccc5a3fd52adf0d7d39ff1df2073e098586b72e494128e11e4 CVE-2023-45107,0,0,7270dbbcbb0d162c169f41039436620133fcc51175878b91a9d4f170b75cabcf,2023-10-17T16:09:15.537000 CVE-2023-45108,0,0,3fca62a87c80e3ceed2144105cfeb194d64c18265c9a9cbc9d78d5f3e50bb1fc,2023-10-17T16:09:24.633000 CVE-2023-45109,0,0,6472ea14252e4c42f0459a0e30121fa69f31f56b9821a5ef246f725839294af4,2023-10-18T16:05:00.017000 -CVE-2023-4511,0,1,d24533fd0edc1f7c6df4699767cb097b3c0dd98e9abc30e9e6bc85d38487729a,2024-08-29T15:15:16.010000 +CVE-2023-4511,0,0,d24533fd0edc1f7c6df4699767cb097b3c0dd98e9abc30e9e6bc85d38487729a,2024-08-29T15:15:16.010000 CVE-2023-45111,0,0,84b48a2733a8c0d417c132a4b8ffb2cc2472dc8682ef5516e7d2dfc276c36f2c,2023-11-08T23:14:35.887000 CVE-2023-45112,0,0,49bde636916cd1ee29a0731cfa4c99b92b301a1f930adc5f1e3cec0becafc716,2024-01-02T20:15:09.040000 CVE-2023-45113,0,0,950e6fcbe60da381702704a6ce4e4e2ab402467f5d96d4ab4a3924f95436f9da,2024-01-02T20:15:09.137000 @@ -233709,7 +233709,7 @@ CVE-2023-45116,0,0,b4fd89a810a73bc335960686e2a1d70617c79b22c07d93ec0246dbd542a92 CVE-2023-45117,0,0,a85cb65b8aba4c352d15fb027f503a57f38bdef5f76b91e0947cabcf64a522bb,2024-02-02T13:54:01.383000 CVE-2023-45118,0,0,091f4e2f5fcfa33b6e7f36486ad24c6d4b8524fc3c3ac07d054b7c9704af7736,2024-02-02T13:52:50.533000 CVE-2023-45119,0,0,e26dc0fc27a9196697f57b54c228774dbb67cc05f2e8c2c7bacd6cb784af5fe8,2024-02-02T13:46:30.707000 -CVE-2023-4512,0,1,6d9f71ddd0bd96b5aa460c8c85024895a0f05780fd5f4c59bf4f575ee7a84883,2024-08-29T15:15:16.160000 +CVE-2023-4512,0,0,6d9f71ddd0bd96b5aa460c8c85024895a0f05780fd5f4c59bf4f575ee7a84883,2024-08-29T15:15:16.160000 CVE-2023-45120,0,0,7c0552df998d5ab43f85d906531c40dba1a455b30ea99e39ad08f05c966afdd1,2024-02-02T13:53:03.567000 CVE-2023-45121,0,0,7ed9c4305ebb96b7ea766b8c6629dcad20a4cecff0105f790d3d7e2dccd34aaf,2024-02-02T13:53:15.323000 CVE-2023-45122,0,0,b3d0d07af2421999386dbc34d1b8a9c31bb18a82bacc9bb70bcefd33523477ef,2024-01-02T16:15:11.970000 @@ -233720,7 +233720,7 @@ CVE-2023-45126,0,0,28945b283d1eb766908994420c992f9201250f6abfde1aaa65db5130bf3de CVE-2023-45127,0,0,30c90cc89b399f3d1b72a2349697e65016cb2a7b03c6836d714824dc1f89ef7e,2024-01-02T16:15:12.150000 CVE-2023-45128,0,0,6ebb9075b19fb3af2468b3b03e67b952850560c98de207618c27a8f1ce4f7784,2023-10-23T15:26:25.743000 CVE-2023-45129,0,0,0467759a5a7a722f55a579a46b7838952a9e715d27d3cb4dcff5af0ca1096011,2024-01-07T11:15:13.270000 -CVE-2023-4513,0,1,31de722ea89e9ac693bd993d96453905df7c75d78bf3f94f8dcc019c52de04a3,2024-08-29T15:15:16.273000 +CVE-2023-4513,0,0,31de722ea89e9ac693bd993d96453905df7c75d78bf3f94f8dcc019c52de04a3,2024-08-29T15:15:16.273000 CVE-2023-45130,0,0,706c11d84cec202b42e08a10e8c6c10bf11cafc3890d23c36033f3b74b889d39,2023-10-24T13:56:46.973000 CVE-2023-45131,0,0,0006aebbe9713a57123eab3e5e4745051796288af4ddba6f414c3ab9aad7e29e,2023-10-19T17:55:24.940000 CVE-2023-45132,0,0,a429013d71839c503c670b051b72c7c43a3c6edfcaecda63e9d08d96c02be6a1,2023-10-18T02:38:01.093000 @@ -236389,7 +236389,7 @@ CVE-2023-48734,0,0,a00e8ed9ee0297d00e14120c92d2a34537ed6acb89fdf7c729a6a201564b8 CVE-2023-48736,0,0,4650ae42f478c55f2b393531a489f1fc49543408c2d8e38b1a17c7256fae4372,2023-11-24T23:03:02.490000 CVE-2023-48737,0,0,e4560c9906d1fbdd6d266c2aa73ffd6bd8ec68563549f710a6c35930b7ddcb22,2023-12-05T20:36:45.767000 CVE-2023-48738,0,0,28320da5d8b4badef834d846531ed99ad65c6e55d5df842c60a7dc44dbae1614,2023-12-28T17:19:48.890000 -CVE-2023-4874,0,1,7ec57aef589de6c7a302f36fc20a6daa5269966d29fd5f66fc81f0c476fb37c6,2024-08-29T15:15:17.083000 +CVE-2023-4874,0,0,7ec57aef589de6c7a302f36fc20a6daa5269966d29fd5f66fc81f0c476fb37c6,2024-08-29T15:15:17.083000 CVE-2023-48741,0,0,d9f7a9a3730621e027c316d995c5fc98d883877c35b20802879521df47443949,2023-12-22T12:13:54.117000 CVE-2023-48742,0,0,ae5a1d41144d1b2bbb0075b4a759503755f5ba906ed41fb9b6794fe8c7da3cfc,2023-12-05T20:10:51.070000 CVE-2023-48743,0,0,223af7476bf80d3f135e206b9d7e56e581693ff7d9317d8c49e8b198e23f86fa,2023-12-05T20:44:29.720000 @@ -236399,7 +236399,7 @@ CVE-2023-48746,0,0,848c3d4be5eae4868e50aab87d198759270bc8785e361f0c91f8f5939f81e CVE-2023-48747,0,0,56bd1c86f1b962a00a0fb6fd287d423bd4b6913b43602c6ac65d1313a90967eb,2024-06-04T16:57:41.053000 CVE-2023-48748,0,0,3a191f52c51e4e3b00825d6727a316031398f86fe994680b7675b1f4ad8abb49,2023-12-06T13:15:14.420000 CVE-2023-48749,0,0,21a0008c77fa48e7fbe865156eb07bde39ebd5553e98dd6f02dcbab5f6712372,2023-12-06T13:07:08.697000 -CVE-2023-4875,0,1,330510a5f50be8514d5c6630658b6ff351e9f205aef74327ab6c30e061778f20,2024-08-29T15:15:17.237000 +CVE-2023-4875,0,0,330510a5f50be8514d5c6630658b6ff351e9f205aef74327ab6c30e061778f20,2024-08-29T15:15:17.237000 CVE-2023-48751,0,0,5b6277f8a946f765078cc632cd7d9aa7ddcb7bcd9a46d291120efbb3d173483d,2023-12-22T19:32:34.560000 CVE-2023-48752,0,0,c7bff7335a8b87ebb665fb4afb72152c835c7f9be35b8823b89b11b42d582b39,2023-12-06T13:29:00.633000 CVE-2023-48753,0,0,81a8947f287238098b07eb62ed0f18056b0471663741d2de02c9e59f00e743d0,2024-06-04T16:57:41.053000 @@ -239410,7 +239410,7 @@ CVE-2023-5367,0,0,efd9da0c3b505e23a32df4c9629d9848bfbedd4a3ea11b62e5e00482040a5a CVE-2023-5368,0,0,0df12c45aaa77bf6ce37007847b453df8f5ac596bcae57cab997ea01f4081245,2023-11-29T21:15:07.940000 CVE-2023-5369,0,0,7744a4fd27d2004c0e4c46e14e40bce9f176927c88d426d86938484a0e412b46,2023-11-24T09:15:09.607000 CVE-2023-5370,0,0,1f06d5703fc9b70672f97f38dfea8a8287490a5093e641fb4cf61d0bba1dd961,2023-11-24T09:15:09.677000 -CVE-2023-5371,0,1,7846bcff40bac06dcf49d2a9812d0c1df875c5b3b357888d38a5d1961cd87141,2024-08-29T15:15:18.620000 +CVE-2023-5371,0,0,7846bcff40bac06dcf49d2a9812d0c1df875c5b3b357888d38a5d1961cd87141,2024-08-29T15:15:18.620000 CVE-2023-5372,0,0,7c68f8d7268b3e1bcf17984e2978b6d102abf3dc944cad402eb61e2cdbaf8e93,2024-02-05T22:05:37.100000 CVE-2023-5373,0,0,1e9ecbd62ee4b8d32e24aa239b29efaacc0592814aff42cec489729b320c68a4,2024-05-17T02:33:02.550000 CVE-2023-5374,0,0,bbad172aa30166f85ca2e7d3ff515943900e68e6abf27c8173e4afc98be4168f,2024-05-17T02:33:02.667000 @@ -240151,7 +240151,7 @@ CVE-2023-6164,0,0,e3c7a4e1a48cdc5842324b064dce28c65508494dbd8ed8164cc5d0471b79e7 CVE-2023-6165,0,0,f2107d2c5066c4712c5e6046aa2042ac235d7ccea34c7b634e11d536dcfbb123,2024-02-03T01:25:24.337000 CVE-2023-6166,0,0,8ece2e2d79a609a08ecc0c03118f7e745d671c37963cfff162ddd8985af2f1e5,2024-01-02T20:19:26.667000 CVE-2023-6173,0,0,7343adaf58fed61e2086b4eef6da46bf9e5f5bd6eb82579bb07a9a0f4b200b6f,2024-03-27T12:29:30.307000 -CVE-2023-6174,0,1,b18cc71d2d83aec30453bba31c5e82417721fed62c9c04c095c5b68e826ed0b5,2024-08-29T15:15:19.920000 +CVE-2023-6174,0,0,b18cc71d2d83aec30453bba31c5e82417721fed62c9c04c095c5b68e826ed0b5,2024-08-29T15:15:19.920000 CVE-2023-6175,0,0,292fd6fdc7771829084e15d62e77b3249f391ad47293997aeaf57e990740cb16,2024-03-26T12:55:05.010000 CVE-2023-6176,0,0,9ad01adc2f8f8499cb3fffbc9bd4b3a9dd6a8634a9696f484302b53740d28e61,2024-05-22T17:16:08.200000 CVE-2023-6178,0,0,035ab38e16ffe5bdad2680ee51a4ea3ab582dc29b7de69bf38d25dbae50381b7,2023-11-29T18:01:19.947000 @@ -241240,7 +241240,7 @@ CVE-2024-0203,0,0,063b59469e2d39d3db7df75ad382d128061b0bf35a42a91806dea69f49fa0d CVE-2024-0204,0,0,b699cb0fbfcef2df86d44e0a162ba4e8c4378079895d2d432198e9a7796b6315,2024-02-02T17:15:11.167000 CVE-2024-0206,0,0,63fd657c886e5842afc346785e22e00af6ba0840c2bfa9e341295b72f7a0731e,2024-01-16T16:27:52.677000 CVE-2024-0207,0,0,92126e05630e46ac6b3b41ff18aff265f84766fbd2d4983e56651e39802335c7,2024-01-09T19:10:05.427000 -CVE-2024-0208,0,1,dfd8552982a97f54cd8e4a1f56cb66bc44fff84d9857e50fe5416e3a0b125963,2024-08-29T15:15:21.790000 +CVE-2024-0208,0,0,dfd8552982a97f54cd8e4a1f56cb66bc44fff84d9857e50fe5416e3a0b125963,2024-08-29T15:15:21.790000 CVE-2024-0209,0,0,cc0e1ecc7304ff68fa47a1f32da6280f90788be09a6a4fc8a6049bb9009ef2d0,2024-01-10T14:03:18.133000 CVE-2024-0210,0,0,003de43c8cb0648e807f2160fc3e94690a662553ef75a914de5ae3244c3d24e3,2024-01-10T14:07:07.967000 CVE-2024-0211,0,0,71444c509eeea6381d6338958856769bbb7e4d327c064d335e6903f1dbffc18c,2024-01-10T14:11:32.643000 @@ -242032,7 +242032,7 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000 -CVE-2024-1056,1,1,de3c2d857f7930bb1c671747f74c34923b31d208024f21be90fd913c538ffa81,2024-08-29T14:15:08.270000 +CVE-2024-1056,0,0,de3c2d857f7930bb1c671747f74c34923b31d208024f21be90fd913c538ffa81,2024-08-29T14:15:08.270000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 @@ -249488,7 +249488,7 @@ CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535 CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000 CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000 CVE-2024-2954,0,0,99a73523d01afd84aef469d44b1c2063cfbc0f879cb72415c9f7459e0fff3d47,2024-03-27T12:29:30.307000 -CVE-2024-2955,0,1,87371e2fa0fa36bb69e79b36b51ab6671837d2afbbe8e39b32a028ea544a110a,2024-08-29T15:15:26.130000 +CVE-2024-2955,0,0,87371e2fa0fa36bb69e79b36b51ab6671837d2afbbe8e39b32a028ea544a110a,2024-08-29T15:15:26.130000 CVE-2024-2956,0,0,ad593b0c44562e3ed1ca80e2bc8e78ccbad39173a3cee350a26fd67da322884b,2024-03-27T12:29:30.307000 CVE-2024-2957,0,0,f9a1c843e62657fa10197867d25d9608c11fa033333e2c1c375aa097ac937bcc,2024-04-24T16:15:08.880000 CVE-2024-2958,0,0,6190889b2483175e407a7ae396217803a4ef295821a00f7dd7e406dd588e1839,2024-05-02T18:00:37.360000 @@ -250122,7 +250122,7 @@ CVE-2024-30346,0,0,5b5a05e58b1d0147ecf944d685aa2cb684c437094256980b72baf598e0e39 CVE-2024-30347,0,0,3832109021fb5377af15708c62232a57c5d24e9d2ff3a0f47b969600fc56c7e2,2024-04-03T12:38:04.840000 CVE-2024-30348,0,0,b7419de89d8ae654b53594301d010d5fddf20c53591f31b58044cfc4d2546f37,2024-04-03T12:38:04.840000 CVE-2024-30349,0,0,25aa9323693beb08b7ab8bd5f7a119ec8b674d7e4855843e08ed1d40130ed8a9,2024-04-03T12:38:04.840000 -CVE-2024-3035,0,1,84d1ec277576a780cef192bef4ba512edc27cfd9900e8cd035d06ddf2ea6bd18,2024-08-29T15:55:30.247000 +CVE-2024-3035,0,0,84d1ec277576a780cef192bef4ba512edc27cfd9900e8cd035d06ddf2ea6bd18,2024-08-29T15:55:30.247000 CVE-2024-30350,0,0,8e1b9e28a9318580e1c2a60beb33a603136695646ec8eec64233a58463351c70,2024-04-03T12:38:04.840000 CVE-2024-30351,0,0,ecc0a626d0b84c1ea6187fb97e8580125e971055c09fe20b6f73f3ab539147d2,2024-04-03T12:38:04.840000 CVE-2024-30352,0,0,5f84adb833e26addccbf839c02a46013d238d5f13fa74ae57d6b24ed1b254339,2024-04-03T12:38:04.840000 @@ -253093,7 +253093,7 @@ CVE-2024-34632,0,0,bf1da971d9c08dbfc3ba6b9b0305e27336a8eced8062af973a4612b88c383 CVE-2024-34633,0,0,dcc919d4fe3cd88a5fcb40687da081e03a0a9de314e12214fe0ef228c52e1a41,2024-08-09T21:17:19.217000 CVE-2024-34634,0,0,ca7a7dede48188d5d254d269b40f8d801c38580350c32ea8a5414c109ee76db9,2024-08-09T21:17:55.090000 CVE-2024-34635,0,0,f315481fa1588ad6ec51d6f8cc1b6dc04d19bc1ee3f7f3e279e9f419b1b04cd7,2024-08-09T21:18:43.303000 -CVE-2024-34636,0,0,12a9dce84f7a16975e916eab6b83a39752b1b5e387c65698edba42a30c7632cd,2024-08-07T15:17:46.717000 +CVE-2024-34636,0,1,6d289e439c66cba4f752a544d7ace1fe5b0d959e931f99945923c8bb0b32e8a7,2024-08-29T16:47:17.790000 CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000 CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9c6,2024-05-17T02:39:57.623000 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 @@ -253333,10 +253333,12 @@ CVE-2024-35108,0,0,26473bc212f25b793c66f492376510c497f3c8040fd855e035e2125e4662c CVE-2024-35109,0,0,5c37b5989db27d73a1b7673ab81df5907cc813f794f46739f6fbd9e9480590e6,2024-07-03T02:01:24.210000 CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9863,2024-07-03T02:01:24.987000 CVE-2024-35116,0,0,a563a8223baddb703f5fd1f07e904d7e927e5f21b3c89fcbd6f74db44a319ee0,2024-08-21T14:46:12.917000 +CVE-2024-35118,1,1,0ba40b2c40c6ef09fda731446e7f6b93958b2e36babf45f7052eb6f5ef7a825c,2024-08-29T16:15:08.613000 CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 +CVE-2024-35133,1,1,f117f91f3e95afe4d2dd250750987e5f67e3a949e9f3fd8318dfe78ce48a068f,2024-08-29T17:15:07.250000 CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000 CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000 CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000 @@ -253675,17 +253677,17 @@ CVE-2024-35693,0,0,e9d6d5328e43619ca35047fa4aec0165648618a0099fad8edc05f1d25b849 CVE-2024-35694,0,0,fa45a43cd0fca65456e25f7d940aec56387ace25f593dbbf13cc74603be2d7df,2024-06-10T02:52:08.267000 CVE-2024-35695,0,0,e6774df5e218aae62240ec538fbe0c6292369ab8cde553ab0497ca5dcedecae2,2024-06-10T02:52:08.267000 CVE-2024-35696,0,0,f9216d277779898afaead63d25822320ecb0ebd5314813eeae6443a71f1a9c32,2024-06-10T02:52:08.267000 -CVE-2024-35697,0,0,fc9e27ecfc9c9c128323ab157c3b6c99d22ee14655fd8e89d997eabad82cf5ce,2024-06-10T02:52:08.267000 -CVE-2024-35698,0,0,a16711ce2250dda75e7529b01c95902f9d909b39a590cbd4669ddcfb4ae0c6ad,2024-06-10T02:52:08.267000 -CVE-2024-35699,0,0,707bf0c09fc4f07750d1dea0e82ed1452e318500cfed0af9de751e559535b9cf,2024-06-10T02:52:08.267000 +CVE-2024-35697,0,1,ed26483e03d41cbda2679aca1662298d32b2cfe43e2a2b534c7112e53fc75b2f,2024-08-29T17:13:49.557000 +CVE-2024-35698,0,1,ce5805ea174c7d79028851b201d10370f7d8980a44f785817681e8858e08f43b,2024-08-29T17:11:36.290000 +CVE-2024-35699,0,1,bb29147c315960e5ea1d6cdd4347723d85b9a10f4d38a78e1ce06e8ac950d004,2024-08-29T17:09:55.017000 CVE-2024-3570,0,0,14d409ce8afc07e662d828a6ab25c728d3a76a8eb5212a6ebb12dbb35e62d13c,2024-04-10T19:49:51.183000 CVE-2024-35700,0,0,2082b99df626f3c53a70be6652424ac88700e845ec65f8217af149e8e0e0187c,2024-06-05T19:50:49.063000 -CVE-2024-35701,0,0,10f1483050674df5abda790355dad6d957797f166d8af293f2bf2668961754fd,2024-06-10T02:52:08.267000 -CVE-2024-35702,0,0,c1602183873805e76800206a0b20cb0e587aac04d99c688f397b00147f20c8bc,2024-06-10T02:52:08.267000 -CVE-2024-35703,0,0,ad829ba9fb3ae9bec8d547c2ff356ab6c9ae5041e57e5dd325f1f5d6e6bd0d2b,2024-06-10T02:52:08.267000 -CVE-2024-35704,0,0,1ef252fc47b63ae5577862bad55151900a685bef0b4e038b088085da28ee841a,2024-06-10T02:52:08.267000 -CVE-2024-35705,0,0,c66b4e3384c3335eecc11b7d9decb16ef720f1d9418e3325b6fc3bf79bf6fb85,2024-06-10T02:52:08.267000 -CVE-2024-35706,0,0,36fc4d1192fa0ed0c1ca2e0b2d11cd0d458e72a98aeeb799c2b4c67715a93e15,2024-06-10T02:52:08.267000 +CVE-2024-35701,0,1,d5ea4cbe296186cbbbe13c0c1fec760c341a040f00a0104092e554251ceed7c9,2024-08-29T17:09:25.947000 +CVE-2024-35702,0,1,efc0987310e7ee4022ef9f2c02fd77dca4c34d10c2575700fa4bcc69be53cbba,2024-08-29T17:08:38.977000 +CVE-2024-35703,0,1,3a96ec9b3644f1c7dd0d28c53c2f590110cc960e7aa39bd9d116fadab3aba7c8,2024-08-29T17:08:03.143000 +CVE-2024-35704,0,1,ae5be5424bef2556b4370d869261327b1da2eddd5e4a18109fa239e39f53e1cb,2024-08-29T17:02:43.597000 +CVE-2024-35705,0,1,9053adc6cf334c9dbafcc0a27f9f810135153f91d5c401677339a00569c21063,2024-08-29T17:01:16.963000 +CVE-2024-35706,0,1,79fe0b73bef78d05b24efbde9566e39867ee0263619bdfa610bb3d5382ce98c4,2024-08-29T16:59:18.167000 CVE-2024-35707,0,0,0ee310226c2a1088ce4cc2fd07c766b5de5fe5d2430ff3462faf2183e3a037ef,2024-07-12T18:37:07.387000 CVE-2024-35708,0,0,ca93af420e3f8f45585fa8a15603b388b58f6dd371fec7b6dc2b7e829270e63d,2024-07-12T18:34:58.983000 CVE-2024-35709,0,0,a34d189a3edc4b01d77993b9bc5b9ee5e3693414eac1d35315061d1249515135,2024-07-17T19:50:21.950000 @@ -253888,7 +253890,7 @@ CVE-2024-35891,0,0,020345e2d6b07ed9ebb9279a6d9a2dea40c65eb51e6d3fc0c5cd350efe2fc CVE-2024-35892,0,0,f5dcb897850b4e8e41108cf32bfe1cea3b258cecc6972cb2630293f619e933f1,2024-05-20T13:00:04.957000 CVE-2024-35893,0,0,e6a35e25225cefb5ffa6b77cac4a079ee713f0238e7e35e74660e66bb0ecc8c4,2024-06-27T12:15:25.943000 CVE-2024-35894,0,0,1790b8bdc53af1b32b593033531b9c956bd1f4a63d07b8a3998381f55832751a,2024-08-12T13:38:21.393000 -CVE-2024-35895,0,0,04b8c84c878a9450c1f88c15bd12e0ef9e879448b59cab521eb060ea69ee20a0,2024-06-25T22:15:32.367000 +CVE-2024-35895,0,1,c7298cadfd8993347498fa8764731635c42612e209d877b8a7a623f8de654d15,2024-08-29T17:15:07.480000 CVE-2024-35896,0,0,38740fa9e0e28c1998375bca10b45aa3bea5349d16d5bb779072be0a08a5ef50,2024-06-25T22:15:32.433000 CVE-2024-35897,0,0,93dd335f3c661b184a9126ceda6682793e22f6e45c2ebebcb998960eb0c68b3e,2024-06-25T22:15:32.503000 CVE-2024-35898,0,0,f2046edcf7a6f808589e35b06e7686f88f49d32de2ed71667b4d90ced64d89c8,2024-06-27T12:15:26.020000 @@ -253934,7 +253936,7 @@ CVE-2024-35933,0,0,4a006ff1d079bb6d954a703f87d533b7f3dd5e7b2e9028e0e41ad1d21adb9 CVE-2024-35934,0,0,0074842a9c706dbd9c15c5cd1ffb5fceea675b039259cbd3fb7970e83e04fdc8,2024-06-25T22:15:33.297000 CVE-2024-35935,0,0,b94869c332d09bfe61cff6d159d41a8e57443d1fa9193ea58cbd56fba95a88c7,2024-06-27T12:15:26.480000 CVE-2024-35936,0,0,46d1dbdbb72380e2ba09d30c538200959b97015bd1818d0db72d18f5ea45cc57,2024-06-27T12:15:26.557000 -CVE-2024-35937,0,0,93fcbe510ec686fbb205b42b495c111a3131137ddd8ca181b80e1bc0bc2c5176,2024-05-20T13:00:04.957000 +CVE-2024-35937,0,1,82ae4c40831eb21b97830c83aa109556727d4998434151f06721cb4830c701c3,2024-08-29T17:15:07.693000 CVE-2024-35938,0,0,3f987b7ccefd2cd20e4d391a23ba6e09329f701463b576eb89a69b4f7db8fda6,2024-05-20T13:00:04.957000 CVE-2024-35939,0,0,3435308e48b9031f980a7816e91db2cd949c1c4fb158cd17fd95158f54ec6d85,2024-05-20T13:00:04.957000 CVE-2024-3594,0,0,1fcc427f6e76d134c9c043bc92e809df42d05397e52529d77504b8d09b2dcb95,2024-05-24T01:15:30.977000 @@ -253966,7 +253968,7 @@ CVE-2024-35962,0,0,4b628f3f57455942301b439ab908f4e8ff039f128cecf651c9be39d0756f5 CVE-2024-35963,0,0,4b2be953857cf7766b285dd241b22e01e396b3d7d820828527a730e260b4992c,2024-05-20T13:00:04.957000 CVE-2024-35964,0,0,f5d9d27ea8b6760773238ebfd515582b0f9cc759b00964f08a322ebd6015ec80,2024-05-20T13:00:04.957000 CVE-2024-35965,0,0,5fc20a16adf1b5ba78e69e7408dfe0a43ea1642272fd65b91b585a26a2b5eafc,2024-05-20T13:00:04.957000 -CVE-2024-35966,0,0,a5319755f6591f8202511c7783483f917bd9f85228d52157a7031baedf283355,2024-08-19T05:15:06.383000 +CVE-2024-35966,0,1,e2dd13477fd97a555220d38dd72c0005b7eb675750212f81b146d8e838895b36,2024-08-29T17:15:07.763000 CVE-2024-35967,0,0,e3e23303b3dc5d4a65fe66a5f540e6a1db2b9194c0c160b04b3c6d8794f3528f,2024-06-25T22:15:33.880000 CVE-2024-35968,0,0,439ccc18325908cd4ef3a9bd891d3376dacc1d470b882c7bccea812445a8152e,2024-05-20T13:00:04.957000 CVE-2024-35969,0,0,c7e6b7ae441187279ecf5e21ff7ea13c1669f067e7c32158b493f5f3f86ee309,2024-06-27T12:15:26.887000 @@ -254947,7 +254949,7 @@ CVE-2024-37373,0,0,26dc5e4538b7cd09464c61fb65e8031c578a3247488f84f82c407880c1c74 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000 -CVE-2024-37382,0,1,a8a740545d65ebc631499231db822baee95a9596af82e521bd493b8948bb2169,2024-08-29T14:29:32.920000 +CVE-2024-37382,0,0,a8a740545d65ebc631499231db822baee95a9596af82e521bd493b8948bb2169,2024-08-29T14:29:32.920000 CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000 @@ -254999,7 +255001,7 @@ CVE-2024-37459,0,0,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b690 CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000 CVE-2024-37460,0,0,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000 CVE-2024-37461,0,0,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000 -CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000 +CVE-2024-37462,0,1,cad64247feae7f9612226534addea8bce3646425783d879f460a4125c6bd3239,2024-08-29T16:05:11.203000 CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000 CVE-2024-37465,0,0,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000 CVE-2024-37466,0,0,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000 @@ -255486,7 +255488,7 @@ CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000 CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000 CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000 -CVE-2024-38219,0,1,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000 +CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 @@ -255821,7 +255823,7 @@ CVE-2024-38688,0,0,6c1e1c63760b8f330227267f950d647098745020ef3d161e16c9e453d5d48 CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000 CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000 CVE-2024-38692,0,0,761911cf70aa71c41ae3228fdbacf4aede8e08f3f941d9d59231e75b06896f24,2024-08-14T16:48:07.087000 -CVE-2024-38693,1,1,82c772919ce606d575041c0bd11db9495504e9e49419e87364efb9dee4bf3b39,2024-08-29T14:15:08.680000 +CVE-2024-38693,0,0,82c772919ce606d575041c0bd11db9495504e9e49419e87364efb9dee4bf3b39,2024-08-29T14:15:08.680000 CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa04b9,2024-07-22T13:00:53.287000 CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000 CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000 @@ -255895,8 +255897,8 @@ CVE-2024-38787,0,0,0f1e7f4afcb5fbe9535514f1a824c8730251f75282d7daebf1c4763462ac4 CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000 CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000 CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000 -CVE-2024-38793,1,1,56f700637cd7fdeb3c401737e9f5e59b82cd4af11e5b9bc6195c7024686f879e,2024-08-29T15:15:26.260000 -CVE-2024-38795,1,1,3533c7963609c8889d5345e27732738f5a370e9d4bd4d6063d7cdcbf7dc5484a,2024-08-29T15:15:26.460000 +CVE-2024-38793,0,0,56f700637cd7fdeb3c401737e9f5e59b82cd4af11e5b9bc6195c7024686f879e,2024-08-29T15:15:26.260000 +CVE-2024-38795,0,0,3533c7963609c8889d5345e27732738f5a370e9d4bd4d6063d7cdcbf7dc5484a,2024-08-29T15:15:26.460000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000 @@ -256088,7 +256090,7 @@ CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 CVE-2024-39283,0,0,b7e0387ba5dd8a48e1248bb2bf0b89b8e5d589734af2917b519d63ca9a728676,2024-08-14T17:49:14.177000 -CVE-2024-39287,0,1,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 +CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000 CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000 CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32cc4,2024-07-15T07:15:14.940000 @@ -256318,7 +256320,7 @@ CVE-2024-39570,0,0,477f2cc2b899254fd1996622a7d04056a7ae423def8bf935cbc64caf51d26 CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff34f,2024-07-09T18:19:14.047000 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 -CVE-2024-3958,0,1,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 +CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000 @@ -256337,9 +256339,9 @@ CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fd CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000 CVE-2024-39619,0,0,eba9a3263593a35724815600925b04c780a0fc23aea386d231775aed259a1e52,2024-08-02T12:59:43.990000 CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000 -CVE-2024-39620,1,1,7802e2514fe1fc988c55d2b027b5305c61aad4c32442e446f5977e8482a818e2,2024-08-29T15:15:26.710000 +CVE-2024-39620,0,0,7802e2514fe1fc988c55d2b027b5305c61aad4c32442e446f5977e8482a818e2,2024-08-29T15:15:26.710000 CVE-2024-39621,0,0,0c249e1c45f38e7803d96351e629758e9c24acaebc0fdee9ecbe6f2310164e1b,2024-08-02T12:59:43.990000 -CVE-2024-39622,1,1,93470736c4d8ca6136ff38301c594010725269f3a08588045ddac2ce8f10106b,2024-08-29T15:15:26.900000 +CVE-2024-39622,0,0,93470736c4d8ca6136ff38301c594010725269f3a08588045ddac2ce8f10106b,2024-08-29T15:15:26.900000 CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000 CVE-2024-39626,0,0,d18b40bac7879d91efce41316f457b002a06c0098fd8a51342c25f4f7011fae6,2024-08-02T12:59:43.990000 CVE-2024-39627,0,0,f6ecb8eb87a0844a06d33fd61ce1655e1dc35cf5d41af8bf595cbdcdb232937f,2024-08-02T12:59:43.990000 @@ -256352,7 +256354,7 @@ CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab57042 CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000 CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000 CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000 -CVE-2024-39638,1,1,19f0415de3c51a8807e008f82d87fd5aeb3612f319a69355bb604584c1360df0,2024-08-29T15:15:27.093000 +CVE-2024-39638,0,0,19f0415de3c51a8807e008f82d87fd5aeb3612f319a69355bb604584c1360df0,2024-08-29T15:15:27.093000 CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000 CVE-2024-39641,0,0,82efe19acefcd120a9c9ff4b95bce8c452c5423902a3f6b1c0041639db255e62,2024-08-27T13:02:05.683000 CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000 @@ -256366,11 +256368,11 @@ CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-39651,0,0,7d85dfbdb174a6f544eaa1e3819a7aaa062f2afb0dc7664ef14d20fe53cd5df3,2024-08-13T12:58:25.437000 CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000 -CVE-2024-39653,1,1,4c53351edc612276d20f37e7113faaa6ef91caca349b69a3ad7f5783a92f282c,2024-08-29T15:15:27.297000 +CVE-2024-39653,0,0,4c53351edc612276d20f37e7113faaa6ef91caca349b69a3ad7f5783a92f282c,2024-08-29T15:15:27.297000 CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000 CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000 CVE-2024-39657,0,0,5011bc23ca38c6d5baf0733a7f30352cc204af31d9e0f5e595f8e34352825b69,2024-08-27T13:02:05.683000 -CVE-2024-39658,1,1,9843671c5781ced2ba4647a9fa8ddec2df376aee4b080aecaab6e122cbac3f43,2024-08-29T15:15:27.493000 +CVE-2024-39658,0,0,9843671c5781ced2ba4647a9fa8ddec2df376aee4b080aecaab6e122cbac3f43,2024-08-29T15:15:27.493000 CVE-2024-39659,0,0,a80d18e493149233fc317020eaf978d1056512cfa7b08cba1fd89af8c4735b0a,2024-08-02T12:59:43.990000 CVE-2024-3966,0,0,f4286335c18162e5dbc573cbc605017489ac12efad77a1ff38ff47be3739d726,2024-07-29T16:52:33.533000 CVE-2024-39660,0,0,2b50deef651f27c87abd29110a94a6037b7dd1c45da64101f17c9a9b365c5efb,2024-08-02T12:59:43.990000 @@ -256390,7 +256392,7 @@ CVE-2024-39673,0,0,b1c068f44d0a9aaaf8f58599b1cb881e705b5c945a7c5d93ce78a0cb82068 CVE-2024-39674,0,0,2dd73b99ef60d794197fe0c13977ff0f37547f24c6b5b5c262c92f54addb5ff8,2024-07-26T15:58:35.743000 CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000 CVE-2024-39676,0,0,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000 -CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000 +CVE-2024-39677,0,1,19aae0820e5763c55aac1da448f1925f52fbe74ae58ddaf8ead6691b86cb8c47,2024-08-29T17:29:55.003000 CVE-2024-39678,0,0,f0f13ad18e725d440582b3a4bbd425936455389008ece86cf58b8c9519b22e2a,2024-07-18T12:28:43.707000 CVE-2024-39679,0,0,ce5bdc949f2b785748533e9e266e218a34e39cb3d0887231dc8fbb4c0a149bec,2024-07-18T12:28:43.707000 CVE-2024-3968,0,0,6e8a3540463fef006a115080523279717acfbbd27b5f9241de34d6d7c04d7716,2024-05-15T18:35:11.453000 @@ -256445,7 +256447,7 @@ CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc CVE-2024-39744,0,0,eaaeebefac8456b26ecfd964a052066c190ef164bcd0d35d42d232bd669213ce,2024-08-23T15:25:31.390000 CVE-2024-39745,0,0,76dcbb05d353e026eccc967feaecdea5409270418987883e30491009b8479ad5,2024-08-23T15:25:13.470000 CVE-2024-39746,0,0,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335ab2c,2024-08-23T15:25:02.123000 -CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 +CVE-2024-39751,0,1,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb518,2024-08-29T16:56:32.053000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 CVE-2024-39771,0,0,3ba9b721b5c229a6c3ffc099ca1090515a4191b0f891c631b67f12313c68d6a9,2024-08-28T12:57:27.610000 @@ -256509,10 +256511,10 @@ CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000 -CVE-2024-39880,0,0,0d3895a20f18a607a453633781a142af12d0a093a0d7a45eb45a661fea050a2f,2024-07-11T13:05:54.930000 -CVE-2024-39881,0,0,999c16f1ea871f358fb56e0ffa53bb22ecb2f8b8a97cd93e5b9be53ed882a2df,2024-07-11T13:05:54.930000 -CVE-2024-39882,0,0,2b1d641988e25ea4cb8b4c68e5e9ac731c9bf897b66cd83c102a37f8e19ead14,2024-07-11T13:05:54.930000 -CVE-2024-39883,0,0,655aeffdc9352f9b176539ef891d133cc8279a64d289dc6a7e745dfe50400306,2024-07-11T13:05:54.930000 +CVE-2024-39880,0,1,420ebd90d89764260e107140863beba300a2b5634b205f073c7d4f785b402bdb,2024-08-29T17:38:18.727000 +CVE-2024-39881,0,1,6a404ecfc7936b252de6c2cb5c510b917ceff7b4e467b10d3074afc0f4e7d06b,2024-08-29T17:37:05.707000 +CVE-2024-39882,0,1,9a57dc33a7a0a78da42a2edafbf913fff71c18f9571da8d380827d41446184ae,2024-08-29T17:34:50.673000 +CVE-2024-39883,0,1,29ddfce2130fdc343b1b6ac7c36a22cc5501c3525384f2f6d479cb8846f6f2b8,2024-08-29T17:33:42.420000 CVE-2024-39884,0,0,b9e05b4445bddfb9478e0e90c8835a614732b107588b9ad68c5d004f07dc549b,2024-07-17T21:15:11.743000 CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000 CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0484,2024-07-16T14:15:04.380000 @@ -256592,7 +256594,7 @@ CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2 CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000 CVE-2024-40096,0,0,f4d93815f52e3c16c28040ba21795a35002b57c191156f911baad6e63290a17a,2024-08-22T20:15:09.340000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 -CVE-2024-40101,0,0,fa05a141dcc36735ee72bbd0c3b7b1a769814f7631a0be292d4f64087437d8d6,2024-08-06T16:30:24.547000 +CVE-2024-40101,0,1,886521863c96c11be959a1cf217c3eefcb0791bdf3b877e4dc348f32f4062dae,2024-08-29T16:57:16.727000 CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000 CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000 CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca1da,2024-08-26T17:35:05.733000 @@ -256888,8 +256890,8 @@ CVE-2024-40902,0,0,4e014392b4dbdf4c3eaa1eaf547c1f15e32d34ee0d2ed889e6560c95939be CVE-2024-40903,0,0,651b7373d15f2926785ce0de2df21ae36288d984de87f3f47e275557d5da218e,2024-07-24T19:01:54.317000 CVE-2024-40904,0,0,9aa568b0e026595888acd360a993289314f39d24eb5e574eafaa70b28e216bd9,2024-07-12T16:34:58.687000 CVE-2024-40905,0,0,96eb254d5f8b6d07fa83b1d2229752059acc8f42da01741b8cbd4eaae04230ff,2024-07-12T16:34:58.687000 -CVE-2024-40906,0,1,e06807da66b955824f3da74667c1beb9d0fb817d00aa3f4618de93e654a43a9e,2024-08-29T14:48:18.870000 -CVE-2024-40907,0,1,95a9f96ca6af7331dbd0daf36905e29922cf13f1aa483339e6a94a1730bf2093,2024-08-29T14:48:30.593000 +CVE-2024-40906,0,0,e06807da66b955824f3da74667c1beb9d0fb817d00aa3f4618de93e654a43a9e,2024-08-29T14:48:18.870000 +CVE-2024-40907,0,0,95a9f96ca6af7331dbd0daf36905e29922cf13f1aa483339e6a94a1730bf2093,2024-08-29T14:48:30.593000 CVE-2024-40908,0,0,6cdce7f53523afe33cba2998c01eb82605e728b8ccb05b039038c6b90e3df5fa,2024-07-12T16:34:58.687000 CVE-2024-40909,0,0,2557f1e39cb36a28050303053c68b79c667d03c7345936cb7db86b5f125dff39,2024-08-29T13:55:21.407000 CVE-2024-40910,0,0,05374b2cc6508426828834b80ac481cdb20c9dee38a7e0865e9f298ee5c4422f,2024-08-29T13:55:38.203000 @@ -256960,7 +256962,7 @@ CVE-2024-40969,0,0,131ef164ab09daf5156190b0d58c62f4c7d030c74546f3e35eab0d09a4a43 CVE-2024-4097,0,0,66ffa92526301cf6212a4835a680920c0ae3100deab31b53b6ec7270ebab3252,2024-05-02T18:00:37.360000 CVE-2024-40970,0,0,caf2538e6f28a086d3d406c06e9ff229dbdc2f65640692e0869148977eaa231e,2024-07-12T16:34:58.687000 CVE-2024-40971,0,0,3a1ab5847a8c301b704d8bdd427dc329bf7ad68865a6fa0d6bfff5bf33c1b1e6,2024-07-12T16:34:58.687000 -CVE-2024-40972,0,0,7c7ba4d597dd7429f221b3b6caad3c430af9f5c24f296bc097703057de241176,2024-08-19T05:15:06.657000 +CVE-2024-40972,0,1,fa6af6e8974278ad24cb6ac5e07f413b788062237eafa75226e4473182991804,2024-08-29T17:15:07.830000 CVE-2024-40973,0,0,3d9aca66924abb780afa1817341fd38098e7abc82c693f4615445b2ed8f879fd,2024-07-12T16:34:58.687000 CVE-2024-40974,0,0,32ab56cad597bafba819a3c3479ca0af2d6eedd509368346fb5dad5768478c2b,2024-07-12T16:34:58.687000 CVE-2024-40975,0,0,58c77162922e7538a8367d777b273d725db339abb61e841dcb00423a0d11d35e,2024-07-12T16:34:58.687000 @@ -257015,7 +257017,7 @@ CVE-2024-41020,0,0,2648cd1ea7885aa6a15ad15439ad5970c22167ebbfaf88f36d6603640a067 CVE-2024-41021,0,0,80fab57b7e9e902bc5d4e6126e206f5737a727cedd90817a7e39c99f7b3679a4,2024-08-12T13:38:29.623000 CVE-2024-41022,0,0,55fcdc9633a220761bf2ee0f6eec0af74a7e91fb5065f3deb58c99d51016114b,2024-07-29T16:21:52.517000 CVE-2024-41023,0,0,48ce4747e102be8dbf6b96a23a471ccbe6850776b27384be80a54885d800aaa0,2024-07-29T16:21:52.517000 -CVE-2024-41024,0,0,a83e56d28d472d169b675cbc7079dc9f720d853f9c0fe05fe88a8ff3b3b2caa6,2024-07-29T16:21:52.517000 +CVE-2024-41024,0,1,b4b450c12c4e7528b0db15eafe148df0f49dad8766e75dc7693b0baeeae43049,2024-08-29T17:15:07.913000 CVE-2024-41025,0,0,c2ffc0923afdc6d50c51b6d8bd71c7e00bbd09e54e834785bf9af35cbe7118ba,2024-07-29T16:21:52.517000 CVE-2024-41026,0,0,eb7a88c6e7503e12c39942286d936a0841d7b65fc7e3861b8ccd8b44d0a3eedb,2024-07-29T16:21:52.517000 CVE-2024-41027,0,0,b0aa1b4e0a98fd9219cf8bf1c3c66e6cba578add94d4435f1336632da80a96c4,2024-07-29T16:21:52.517000 @@ -257499,6 +257501,7 @@ CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f1 CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000 CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000 CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000 +CVE-2024-41964,1,1,c45ff35e62675e482c446480812cec28bd444641c96d22a8dd402747148148a9,2024-08-29T17:15:07.980000 CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0c33,2024-08-23T18:40:16.173000 @@ -257552,7 +257555,7 @@ CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f975 CVE-2024-42067,0,0,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000 CVE-2024-42068,0,0,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000 CVE-2024-42069,0,0,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000 -CVE-2024-4207,0,1,23b562075e6ff01c716f0403eaa58619ea0da4022e550dfbfd73808372a68c95,2024-08-29T15:46:20.557000 +CVE-2024-4207,0,0,23b562075e6ff01c716f0403eaa58619ea0da4022e550dfbfd73808372a68c95,2024-08-29T15:46:20.557000 CVE-2024-42070,0,0,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000 CVE-2024-42071,0,0,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000 CVE-2024-42072,0,0,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000 @@ -257654,11 +257657,11 @@ CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000 CVE-2024-42161,0,0,c37820156f6b32c3b0c8d53e62b0eb3e8a498c0455e3173c812581d5bb793102,2024-08-05T20:19:29.607000 CVE-2024-42162,0,0,6afe87ab720ed2f9c2f080d1a44ac6b35a3f68a956a94f09bb5c649d3b32abfa,2024-08-05T20:19:56.047000 -CVE-2024-42163,0,1,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000 -CVE-2024-42164,0,1,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000 -CVE-2024-42165,0,1,afbf2cad1a7704e22288c4baca0d1211c9d7246324d2cb6ec83be77d26dee06d,2024-08-29T15:21:22.330000 -CVE-2024-42166,0,1,18df6e3d78544dc8ad38e19fe493f73a53f7ef17f4a96d8246b9654224a5ce6f,2024-08-29T15:23:20.647000 -CVE-2024-42167,0,1,cd8646272ac8e058d6c4cd2f9a697cfc1c8ee88730b877963e6d060dbe9c7f9a,2024-08-29T15:24:12.060000 +CVE-2024-42163,0,0,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000 +CVE-2024-42164,0,0,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000 +CVE-2024-42165,0,0,afbf2cad1a7704e22288c4baca0d1211c9d7246324d2cb6ec83be77d26dee06d,2024-08-29T15:21:22.330000 +CVE-2024-42166,0,0,18df6e3d78544dc8ad38e19fe493f73a53f7ef17f4a96d8246b9654224a5ce6f,2024-08-29T15:23:20.647000 +CVE-2024-42167,0,0,cd8646272ac8e058d6c4cd2f9a697cfc1c8ee88730b877963e6d060dbe9c7f9a,2024-08-29T15:24:12.060000 CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 @@ -257666,7 +257669,7 @@ CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad CVE-2024-42218,0,0,331226ea49af1a2f92292f364b4fd8bc3c26a90f49d1b9421ad0db0c509189fd,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,6d72ad1f1e2233036625c33df60f051fc9699cbd96bd0caf5f28288f63cee194,2024-08-12T18:30:21.627000 CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000 -CVE-2024-42222,0,0,62014732c367340e7231f93e13a11fa814d7e00cce4ded101da5e783fb41f371,2024-08-07T15:17:46.717000 +CVE-2024-42222,0,1,b89ef57d67246c59e7b320f402a614639a269bceaaa0c30be9cf5a9576c14c01,2024-08-29T16:43:59.923000 CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000 CVE-2024-42224,0,0,be03c0669f567c4c43069feb6297d1d0b39887abc231ab7cb6117aeb87386008,2024-08-02T14:24:16.187000 CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000 @@ -257802,7 +257805,7 @@ CVE-2024-42362,0,0,25fca8ac5e8ac7bce381e03b27abd95b45c4c358dff550b984cd00a130f5a CVE-2024-42363,0,0,845d80b3d90627c09cd2ebcd1015d3397a70bb5dfd2fb99126f84654bc7633e2,2024-08-21T12:30:33.697000 CVE-2024-42364,0,0,4c3af5024e60bada8ffc9756b86fe112164c9d8aeb4b4858c936071d813f7c5c,2024-08-23T16:18:28.547000 CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 -CVE-2024-42366,0,1,a9568172e4bcd6c1cd45e47dacc87e8aa79df67869d590679718151cd9b5e17b,2024-08-29T14:04:30.733000 +CVE-2024-42366,0,0,a9568172e4bcd6c1cd45e47dacc87e8aa79df67869d590679718151cd9b5e17b,2024-08-29T14:04:30.733000 CVE-2024-42367,0,0,78b96b1f30a7354fdfb7431aa08d9784ec8c3726b77126448b6109517286436c,2024-08-12T13:41:36.517000 CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0d34,2024-08-14T02:07:05.410000 CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000 @@ -257825,7 +257828,7 @@ CVE-2024-42398,0,0,ecec97745a6273f6b5e5720bfa1d0ff4b8e46532c92273931272e35e326b7 CVE-2024-42399,0,0,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b158,2024-08-23T15:06:13.350000 CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000 CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00 -CVE-2024-42408,0,1,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000 +CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000 CVE-2024-42418,0,0,cd8cebc8a20c18f0027a896396b37c57ee369fd63657ca2801f50759cb9c420b,2024-08-23T16:18:28.547000 @@ -257852,7 +257855,7 @@ CVE-2024-42463,0,0,1887d4b9dbb205a7918713aab61d422ae1234ef53aa6637fd3664544692f6 CVE-2024-42464,0,0,c028981b0f05209b8f9398c3d10076a5d141612668af4661ca8e9b565e3a5a68,2024-08-28T20:35:52.940000 CVE-2024-42465,0,0,cc1706811a59c806dba0a5fe5e46aaf63eb46135d4336575a42fc94641a6632d,2024-08-28T20:32:31.737000 CVE-2024-42466,0,0,b147a6143c0f1b29bc81d9c541a33cc57bd399450bc78084e7c0d7553a8f8a24,2024-08-28T20:48:14.917000 -CVE-2024-42467,0,0,e23e0abc0a807db2a53f3a498d6ca2ef36fe18197da36ac218027e00b6ca7984,2024-08-12T13:41:36.517000 +CVE-2024-42467,0,1,66b04633a9e7d48f7fdda11dcba365569847fef4d628314bc09c6b60fb102d1c,2024-08-29T16:26:43.947000 CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000 CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000 CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000 @@ -257876,7 +257879,7 @@ CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca76 CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 -CVE-2024-42493,0,1,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 +CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 @@ -258139,9 +258142,9 @@ CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000 -CVE-2024-43111,0,0,f62efcceb5ca8831b50b8cf6203a83ed8d98a025353eabc40d90f197fefec403,2024-08-07T15:35:08.127000 -CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca28a,2024-08-06T16:30:24.547000 -CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000 +CVE-2024-43111,0,1,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000 +CVE-2024-43112,0,1,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000 +CVE-2024-43113,0,1,7e6f0ba01b475bb6cfca73e8eda2423288e38b8146984d081803bef7596c3140,2024-08-29T16:51:33.367000 CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000 CVE-2024-43116,0,0,94cb738117c364125cdbbaaf42fcfa3d1fe11aaa7081e49de319178ad8cee60b,2024-08-27T13:02:05.683000 CVE-2024-43117,0,0,05a8c9c88ed7d8baa1ba7cda12219cce1f916317ccf5f0825de6fdf0716e21e8,2024-08-27T13:02:05.683000 @@ -258157,16 +258160,16 @@ CVE-2024-43129,0,0,31c20babbf5c34491baa27c55ebc5586c6252f19bd444c66f49a6914d67b1 CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000 CVE-2024-43130,0,0,8ac60d1cc8aa75b0576e9410e6684738dc0975304323a1567a1f0eb99e4d577f,2024-08-13T12:58:25.437000 CVE-2024-43131,0,0,8591ee6c3e77a5a691612e6bee62ebc0760a7b8123e10043f1c0be2a86a8517c,2024-08-13T12:58:25.437000 -CVE-2024-43132,1,1,b060e648ea7891699e780cd8ad9b5fa405e8e6e05f1907909729fea4f1187176,2024-08-29T15:15:28.327000 +CVE-2024-43132,0,0,b060e648ea7891699e780cd8ad9b5fa405e8e6e05f1907909729fea4f1187176,2024-08-29T15:15:28.327000 CVE-2024-43133,0,0,9e3f4ff9c8102da720c262ea41d7de033957edff3ff57332662b4c6a475cc118,2024-08-13T12:58:25.437000 CVE-2024-43135,0,0,1848aed765bf1b3f105991b4b7c25107cc56730f5bab291f1691a8e7e95da171,2024-08-13T12:58:25.437000 CVE-2024-43137,0,0,8de1b2565c6057c436104ee14f3d6e8ca057aac92c9a82c9e40b213e90604b29,2024-08-13T12:58:25.437000 CVE-2024-43138,0,0,7523d930cd7a5a7279891b38d575a91618010966f29bc4ae8a9118211d3e5f6c,2024-08-13T12:58:25.437000 CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d76917df,2024-08-13T12:58:25.437000 CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000 -CVE-2024-43140,0,0,879ec5b84127dbdf3b24e5badc8e43666af405516e082469bf8472d96501dd05,2024-08-13T12:58:25.437000 +CVE-2024-43140,0,1,ddd9555407bf13c17882395b6a58ab3090224c7fbcadd5faeeb830d264aad29c,2024-08-29T16:04:30.370000 CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000 -CVE-2024-43144,1,1,ba68910f82422d441b5eaf9ef1b0e63533860f90b0246793d0652a6145457bf6,2024-08-29T15:15:28.530000 +CVE-2024-43144,0,0,ba68910f82422d441b5eaf9ef1b0e63533860f90b0246793d0652a6145457bf6,2024-08-29T15:15:28.530000 CVE-2024-43145,0,0,7ccb83b884d8dc58ceb4932d45768a752924d5c2938e5a3f671a778aaba995f8,2024-08-19T12:59:59.177000 CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000 CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000 @@ -258411,6 +258414,7 @@ CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8 CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000 +CVE-2024-43804,1,1,a05538f5e2cfb3b6ba08f43744442444cf050b0b8e60b38ebb1001e310a33aab,2024-08-29T17:15:08.193000 CVE-2024-43805,0,0,e9de3af7500f4b69c1539a4468aa5c023c43f557b57ab88b796f849dd26b41b4,2024-08-29T13:25:27.537000 CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000 CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000 @@ -258452,7 +258456,7 @@ CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd CVE-2024-43842,0,0,a9e92e9fe7d83f2bbbf14ffa788f7191f8705535edb6aa37b190042b46301c8a,2024-08-19T12:59:59.177000 CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000 CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000 -CVE-2024-43845,0,0,b81153317e67ba7655f1e8ab3354e74cc099ea35dc466dacb5e6813a988621de,2024-08-19T12:59:59.177000 +CVE-2024-43845,0,1,975e9883b95b773086eb2dd70b312cb34500f721b9f0912731724d7ad97a858e,2024-08-29T17:15:08.397000 CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000 CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000 CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000 @@ -258495,7 +258499,7 @@ CVE-2024-43880,0,0,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d CVE-2024-43881,0,0,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000 CVE-2024-43882,0,0,d55668215cd6d665e2480e5f531dc425652dbf9b52271fdc563c400a262ed289,2024-08-21T12:30:33.697000 CVE-2024-43883,0,0,91d9dc24243e1eb7439b854fe03a12be52a8a2651dc7ad627233ff467dccabae,2024-08-23T16:18:28.547000 -CVE-2024-43884,0,0,1be55cc2577ddf4ea3eaad20febdb123bf6382b6da5a314c3a4af81052b5a493,2024-08-27T14:37:20.410000 +CVE-2024-43884,0,1,337c32679015164150e2b893414f874b7284984b79da625d0489e093363d9444,2024-08-29T17:15:08.457000 CVE-2024-43885,0,0,11114407819a3f9e00d8d9cb1392c069e87eaa286d3f0b384cc6ce2d553b62cd,2024-08-27T14:37:37.887000 CVE-2024-43886,0,0,e1250be1137132d32f51f141081958e76d96de370d77286a8411bf00a519b833,2024-08-27T14:37:45.377000 CVE-2024-43887,0,0,376d550e40434349f0ec085b772876fe107bf2fe9c2438232db402487dd1f398,2024-08-26T12:47:20.187000 @@ -258509,7 +258513,7 @@ CVE-2024-43893,0,0,43d0e9d62118f7a5f6c9bfc09f584d8b53fd652e6e40996287fc9d1d1f103 CVE-2024-43894,0,0,7a0da327bf71c13dadb4c3586216ee65cc1ccf79c9e17e8e4e11aa7af72ebd02,2024-08-26T12:47:20.187000 CVE-2024-43895,0,0,f4f0faf6f450c11bcd9bbffc3bfe9363bfd6c37323777a86f991b1d25c456a35,2024-08-26T12:47:20.187000 CVE-2024-43896,0,0,02f54c59717b3feef195015864900404f36f00fe9986d4059d517c9dd0f9a5bb,2024-08-26T12:47:20.187000 -CVE-2024-43897,0,0,272a5e6ed23f226be655c71945633c1818e2d186619a4f55ac8593cb15d32ae8,2024-08-26T12:47:20.187000 +CVE-2024-43897,0,1,f0f19d4c6371825704d376e54489917481cd4d9ad4f907a2d95f0a5bdf06c617,2024-08-29T17:15:08.533000 CVE-2024-43898,0,0,b20ddc83f3dcf4bc1ad714089af29bfc939502c108354aa514b44633c401dbf4,2024-08-26T12:47:20.187000 CVE-2024-43899,0,0,1953a8ac8e9197ec884f1f7ed08130ca2ce11e7bc600d6d066b299186890c781,2024-08-27T14:38:19.740000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 @@ -258531,17 +258535,23 @@ CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000 CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000 -CVE-2024-43917,1,1,af83a014e5f2de698c85436a27aed31e1bac7faaf65dcf3ed5e0fa10b1af9716,2024-08-29T15:15:28.753000 -CVE-2024-43918,1,1,43a92419e6571ce470ec6a35edf136a81403a8ed78c478f20979da16483f3d46,2024-08-29T15:15:29.010000 +CVE-2024-43917,0,0,af83a014e5f2de698c85436a27aed31e1bac7faaf65dcf3ed5e0fa10b1af9716,2024-08-29T15:15:28.753000 +CVE-2024-43918,0,0,43a92419e6571ce470ec6a35edf136a81403a8ed78c478f20979da16483f3d46,2024-08-29T15:15:29.010000 CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000 -CVE-2024-43922,1,1,d67632ae9b03e359192f45db78f3e688ac55ffb853b8e64a475b472b7ab0ecd9,2024-08-29T15:15:29.227000 +CVE-2024-43922,0,0,d67632ae9b03e359192f45db78f3e688ac55ffb853b8e64a475b472b7ab0ecd9,2024-08-29T15:15:29.227000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 -CVE-2024-43931,1,1,fc5752d45eefd7ceb4ca041f2458c97127d8bdb333bcc0ac9d615bb0d8d69aae,2024-08-29T15:15:29.427000 -CVE-2024-43939,1,1,823725df89462bfe8e17bbdec59df57734d4df9671c5c38b3853b1db91a6a6a6,2024-08-29T15:15:29.633000 -CVE-2024-43940,1,1,d40fd3e90e637a061d52568bb9fcaf27ff6166b45b336a61a957b5826d704d8f,2024-08-29T15:15:29.833000 -CVE-2024-43941,1,1,8bf955247c320fa7ff1484a9d8086edd3c8655790229238bf3f73fe6fc428ab1,2024-08-29T15:15:30.040000 -CVE-2024-43942,1,1,5033bbb3050b0bb163dd78850662ca8a190298ef0b220e9cadd29efc076d3ef6,2024-08-29T15:15:30.247000 +CVE-2024-43931,0,0,fc5752d45eefd7ceb4ca041f2458c97127d8bdb333bcc0ac9d615bb0d8d69aae,2024-08-29T15:15:29.427000 +CVE-2024-43939,0,0,823725df89462bfe8e17bbdec59df57734d4df9671c5c38b3853b1db91a6a6a6,2024-08-29T15:15:29.633000 +CVE-2024-43940,0,0,d40fd3e90e637a061d52568bb9fcaf27ff6166b45b336a61a957b5826d704d8f,2024-08-29T15:15:29.833000 +CVE-2024-43941,0,0,8bf955247c320fa7ff1484a9d8086edd3c8655790229238bf3f73fe6fc428ab1,2024-08-29T15:15:30.040000 +CVE-2024-43942,0,0,5033bbb3050b0bb163dd78850662ca8a190298ef0b220e9cadd29efc076d3ef6,2024-08-29T15:15:30.247000 +CVE-2024-43943,1,1,35cfcf314b02187a72848b2b9da9c6428e95d4802c2ae2f5451ac18ebae73445,2024-08-29T16:15:09.013000 +CVE-2024-43944,1,1,b467788cb50d7e274c3d06f8d45afff68d4c0f0fd6386d60365fe71de96aab07,2024-08-29T16:15:09.197000 CVE-2024-4395,0,0,7eb8bb55518c25270e2cdb5da345e646a2437fce6bdd0ba1dda9f1e27539a52c,2024-07-03T02:07:30.800000 +CVE-2024-43954,1,1,2ccc7b513b158020b11a49457087f5750ade347299d915ce64e666a998ff3c61,2024-08-29T16:15:09.383000 +CVE-2024-43955,1,1,3fbed09885bb08958b9a9e392fdf0c8d17ba26726242e2aee808dd7b744cd51f,2024-08-29T16:15:09.570000 +CVE-2024-43957,1,1,7dcc2d4b3598a3d9b2c07cee6d790dca11f0afb7f5a7cc2fcf8f65e53e37aca4,2024-08-29T16:15:09.757000 +CVE-2024-43965,1,1,0a6b2f140cce58bd0a8d0f6cf0401281f3ed0cd540c5d143269efb5eebaceb73,2024-08-29T16:15:09.947000 CVE-2024-43966,0,0,cd3d16dd9709908a4a64e6a13b6fef840bd6c4e6049b114619dc3ea375d7306a,2024-08-26T15:15:23.727000 CVE-2024-43967,0,0,dd198820d01657feb4461b4126ff9f2ed88f09f4d5c22ed753dc2e0d9ac5168d,2024-08-26T19:10:09.607000 CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000 @@ -258661,6 +258671,7 @@ CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e088 CVE-2024-44913,0,0,b6a472d5fd19f3234cb94f535078ee5f4ccf42464ba38a6cbd2f0b0b0d56c911,2024-08-29T13:25:27.537000 CVE-2024-44914,0,0,cdab06c38600f9663e7e3d6a83c73bbea13a8eac91f638774262eedf9129b83e,2024-08-29T13:25:27.537000 CVE-2024-44915,0,0,189fc1c6cfc0d9d55a03d683dcd4ceecbf61c3a051a5df8bd60ce5a5dfbbadd4,2024-08-29T13:25:27.537000 +CVE-2024-44919,1,1,11a363d1aa0283eae12fa58899a26d5602593431cdc0e48ff36cea52c4b2ec41,2024-08-29T17:15:08.670000 CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000 @@ -258670,10 +258681,10 @@ CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0 CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 CVE-2024-44936,0,0,b9963badb762ccd078f0ff0276e3a054720ee02adaf519a8ed2637b289dbf485,2024-08-26T12:47:20.187000 CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 -CVE-2024-44938,0,0,81d8c4fa2822291c31e2752229de00d1bfc6803d6c6c74b987910dc96d3f451e,2024-08-26T12:47:20.187000 -CVE-2024-44939,0,0,df2a3231cc28f02dcccf984f7f5e5e4e9d5e3f87d2741a1f7e67c845a96a8582,2024-08-26T12:47:20.187000 +CVE-2024-44938,0,1,78c7eb7f4b70b2193d6a764b661f1c4b34c66de744f08d6fe3e652c84bf9ba47,2024-08-29T17:15:08.753000 +CVE-2024-44939,0,1,77e340056998b85a0edb6eda2bb5776e7eba0084412d6173fbb841dbdf80b07a,2024-08-29T17:15:08.837000 CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81a4,2024-06-04T19:20:39.240000 -CVE-2024-44940,0,0,f3c78670c961ed218069273846baa8ab159598a99ca4d39386baf88d3ac01c7d,2024-08-26T12:47:20.187000 +CVE-2024-44940,0,1,6d3559648bdfa621b46434f9855de2178fa1de08defe3fd31c71176641a2c51c,2024-08-29T17:15:08.903000 CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000 CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000 @@ -258691,11 +258702,13 @@ CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c31 CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000 +CVE-2024-45045,1,1,2308eac775db7b014337e6f88c44a856959b64cfc960c8b60b52be8b2d7a3787,2024-08-29T17:15:08.977000 CVE-2024-45046,0,0,4d7016da74eaf67c450dc439af799ed2952384706074b1964aaa74d9bd45c737,2024-08-29T13:25:27.537000 CVE-2024-45048,0,0,f84a03b52c4e4737f004ef4638c6c48a715aa1051c897955680d1101538ffe4e,2024-08-29T13:25:27.537000 CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000 CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000 CVE-2024-45054,0,0,b9a631b4140dc3b625193d3b302c7a5fbf5e7defa5c6f149bad3cc57b44dfb5d,2024-08-29T13:25:27.537000 +CVE-2024-45056,1,1,c501b83657c4bca4bc02eb574baa9b51885aa622e83de25de4c7b549d83a0d89,2024-08-29T17:15:09.173000 CVE-2024-45057,0,0,9d8b06345321949fa48379fc2183ae1808eec74c9e7dce5df7d16d85f9e3fc50,2024-08-29T13:25:27.537000 CVE-2024-45058,0,0,7787e6673db22abfd684889eec25f0d15a1228d1d6048ef359937e89120200d3,2024-08-29T13:25:27.537000 CVE-2024-45059,0,0,1db4a990b2e27521ef605a35909b28cc3d1be1d4c9ec2ad338f6d6fa0c866be3,2024-08-29T13:25:27.537000 @@ -259048,9 +259061,9 @@ CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000 CVE-2024-4851,0,0,cdc6cbe948e120051439ba4105c24946466b84d7a624559fd86ce63f704d51cd,2024-06-07T14:56:05.647000 -CVE-2024-4853,0,1,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 -CVE-2024-4854,0,1,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000 -CVE-2024-4855,0,1,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 +CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 +CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000 +CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 @@ -259218,7 +259231,7 @@ CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a7 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 -CVE-2024-5057,1,1,7e80181b87ff71d98864f6661c18cafdc7709b89033721fa59717c6299cd2179,2024-08-29T14:15:09.080000 +CVE-2024-5057,0,0,7e80181b87ff71d98864f6661c18cafdc7709b89033721fa59717c6299cd2179,2024-08-29T14:15:09.080000 CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 @@ -259552,7 +259565,7 @@ CVE-2024-5419,0,0,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798 CVE-2024-5420,0,0,3867de6c80eaebb04ae4def03e9baadba6a4785f9b7d05c922afac144ffa3470,2024-06-10T18:15:38.367000 CVE-2024-5421,0,0,687f3a5898a97c7e4a575e3431d3fe4a696cee8599b8881eabbed4fc7122e815,2024-06-10T18:15:38.447000 CVE-2024-5422,0,0,a7ac042f03539b57f700d43aa5929a4431fad7f2a64327cabdefb452ddb8c884,2024-06-10T18:15:38.520000 -CVE-2024-5423,0,1,c0eb8661372608209ca31873262040c83e56e01f96081eb3f127055f8501110c,2024-08-29T15:41:13.247000 +CVE-2024-5423,0,0,c0eb8661372608209ca31873262040c83e56e01f96081eb3f127055f8501110c,2024-08-29T15:41:13.247000 CVE-2024-5424,0,0,dd542e2b4b449f200a4b1a82e6055968c0edff7c6325ff444ef99264bbf9b209,2024-06-28T10:27:00.920000 CVE-2024-5425,0,0,6a4e5f79f55def4d138c1c07874dfb0365b816ea97355d904460c326f384651d,2024-06-07T14:56:05.647000 CVE-2024-5426,0,0,34afa7194afb894f777aa3dfb9357e73895bc2898fe4d0744eeb7d3dbc6f96b2,2024-06-11T18:03:58.213000 @@ -260178,10 +260191,10 @@ CVE-2024-6194,0,0,f00a226f70ff49a057b84fcaca304b983b6bd1564bd5a99084e1dc1658dc9a CVE-2024-6195,0,0,d35dc776097027653d4328476e596f9f167a82473590f04576da829da4609970,2024-08-01T13:51:26.273000 CVE-2024-6196,0,0,347e5d0fbb342c4d3dd5d440e2946d6924b36395364c1557d43d309fd11da3db,2024-08-01T13:49:15.767000 CVE-2024-6197,0,0,db7d7a44ba55906002b55001393fe27a9e62dffd18b100796d7e096f2fd44460,2024-08-26T15:25:59.960000 -CVE-2024-6200,0,0,7c3ae18397336de3b19854fceb09c4d149b05254de65b72663f49c28e01b6d08,2024-08-06T16:30:24.547000 -CVE-2024-6201,0,0,6076154b4512e760554abd0a737bc0b84ee6d5333741fc91235c9ed31a163119,2024-08-06T16:30:24.547000 -CVE-2024-6202,0,0,76d8c5f3d8b2ec987e73ed5b5ff236911a83f186cddbe37dd3f0e93bd247100e,2024-08-06T16:30:24.547000 -CVE-2024-6203,0,0,bb85fbb9dbf898aa4678aea988ceea22a4fc8b2cce161ae9b3e2d897fef1b018,2024-08-06T16:30:24.547000 +CVE-2024-6200,0,1,722d981d84658a736a5a6764f93f4a9ccec1590f7bef592a19ce39ecef9883b5,2024-08-29T17:53:40.483000 +CVE-2024-6201,0,1,598d56b506e8c445cb59964b9db6d77d5a9f4c1b7b2ffecffa9033ad60685adc,2024-08-29T17:52:07.493000 +CVE-2024-6202,0,1,247631a9e2647b82d3ccde2f575b6ac32697ff24a61656c143ef0145416ab9ec,2024-08-29T17:48:43.723000 +CVE-2024-6203,0,1,3b9c553aeaabf6b65504ab651e97d9d81983015dea0894c7aa9459e33da609dc,2024-08-29T17:46:28.790000 CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000 CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000 CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000 @@ -261078,8 +261091,8 @@ CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da327376 CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000 CVE-2024-7521,0,0,93e518aa5fe4de4582901fabd10f56f08fc773ab920d9d06860ccc32d826d11d,2024-08-12T16:05:10.907000 CVE-2024-7522,0,0,8cb3e499c594094550f4257bf1be1fb169aadf72b2b6dad6246a075ed4ee872d,2024-08-12T16:06:05.300000 -CVE-2024-7523,0,0,fe83ea86a9ef382979bc6637fb391f4f5b138f7fa6edf8afc732d9a7d7226616,2024-08-06T16:30:24.547000 -CVE-2024-7524,0,0,922fd32401db78399003a2728d5a83f1486debb49b4159a7c46f4d064f93af28,2024-08-06T16:30:24.547000 +CVE-2024-7523,0,1,037427c5dc228ac7d7c706d32604adaf00a2c303dfd3a5cb1aaf8bf15b6f9044,2024-08-29T17:41:09.627000 +CVE-2024-7524,0,1,55b2959f46d5a03cc7e4bb47de03aeac574cf3416fb0ebbf64758ff53e5fdcb3,2024-08-29T17:35:34.820000 CVE-2024-7525,0,0,0f44155e5b1b275dd77c786a7ef323cd6045a6d2a2adbf5e4f560db015c1f014,2024-08-12T16:07:19.537000 CVE-2024-7526,0,0,718006135a6a1c568dedda22ff0d54a97e1bc5accec99de9b33ac5ed305a3aef,2024-08-12T16:07:50.743000 CVE-2024-7527,0,0,ba69bbbe0f023f0603eef152253f5471e5d273c1eed361075a22cda08eede171,2024-08-12T16:08:06.493000 @@ -261093,22 +261106,22 @@ CVE-2024-7534,0,0,98f2f863f9ff1ef735b3417cb63f8ba3143b94eac42d58cd6d4fab5089c39a CVE-2024-7535,0,0,406a485be4ed145018eee5a42eee293edf3f855e9e608d288637ad13611ff84e,2024-08-12T18:31:56.687000 CVE-2024-7536,0,0,6d744a1cdbceb73b2517cc38c4973ef8f9e81b399df7da1dbc0e072ba9141ac8,2024-08-12T18:32:03.167000 CVE-2024-7537,0,0,61295dad87b53130c2dd823a35a4a3e356388230d39cb431835e7e748292780d,2024-08-06T16:30:24.547000 -CVE-2024-7538,0,0,e33ad9f86e3120d1b43fdde2c5199d53495847f7161ecde40b507e5e94c53b56,2024-08-06T16:30:24.547000 -CVE-2024-7539,0,0,75691853410c7f4953d396c3a424cbea6cb17a4cc9e5c33867ffb68bb6da4b56,2024-08-06T16:30:24.547000 -CVE-2024-7540,0,0,b35bb302a2441f24b2b943886007578a815e7984e0621fb0e58dd8fd952c06f2,2024-08-06T16:30:24.547000 -CVE-2024-7541,0,0,fc666aaa3e294fb089fc5cec94db1550e428faa40703d7fcd5c7b600d90bb8bd,2024-08-06T16:30:24.547000 -CVE-2024-7542,0,0,940baaf3d43b54e02ba5def96a972431c14e7bce67b461f92169df289f4cc2fb,2024-08-06T16:30:24.547000 +CVE-2024-7538,0,1,193fad63547610339afca51fb42f4e1b63efd1246fa12674999d016a71d7b352,2024-08-29T17:59:31.983000 +CVE-2024-7539,0,1,f5313ec8fa4093892a6a915c2e5a1fb241a9ccadb615dbc613c26bf8411561db,2024-08-29T17:59:05.223000 +CVE-2024-7540,0,1,a5e3c1e7e7e511557c429d550e93b149d880c481d8eb2e7e1b5655826d5383a6,2024-08-29T17:58:17.420000 +CVE-2024-7541,0,1,83642307317073348ded7a23e8ff0e9b118ff48adf011a10e2cae2d27754450e,2024-08-29T17:57:37.673000 +CVE-2024-7542,0,1,1269a04db1d1ad61c67b794e66cecf85c1f21fcbfa7055b04ea9d171531a9580,2024-08-29T17:56:54.357000 CVE-2024-7543,0,0,503a11ee44f99a51704a6abc3db92fb588f21d0ff08bd2bd9e412e5d0c2d46f8,2024-08-19T19:59:55.340000 CVE-2024-7544,0,0,c1cf8fbff6eae578412d69636bfc44a9dcbaf3b74591629eefcc6a239c026269,2024-08-19T20:00:24.957000 CVE-2024-7545,0,0,ddf5364e31008f118bae55653e1cb0aef851b5fa86eb5245378834db00788f01,2024-08-19T20:00:57.433000 -CVE-2024-7546,0,0,4c4058f55a0d0a018227dbcde80b1939d604dff5f03a9d71d0e845e5adb26d16,2024-08-06T16:30:24.547000 +CVE-2024-7546,0,1,f0e17dfeb0cdd5afe72952dae828c70ab7df9064d65ae78474e00d359cb4b6ed,2024-08-29T17:55:47.547000 CVE-2024-7547,0,0,8b5af897776f46884f36969e1145e07082807ba989be313683ebd633a8d93d75,2024-08-19T20:03:12.377000 CVE-2024-7548,0,0,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee770,2024-08-08T13:04:18.753000 CVE-2024-7550,0,0,0ccf7d721eccaf753ef6c8a48b561ee0f9b8839c90b74eac00f4a21c8fe96817,2024-08-12T18:32:08.900000 CVE-2024-7551,0,0,b186fc017c389d319de7d861b1d913a84a5458cd5dbd51c140f542d4aff6a7a9,2024-08-12T16:12:12.377000 CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000 CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000 -CVE-2024-7554,0,1,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000 +CVE-2024-7554,0,0,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000 CVE-2024-7557,0,0,689a9daa3ab546590d7c99bd152e6a8f70602c50080585be6131605a7c141656,2024-08-13T17:00:53.670000 CVE-2024-7559,0,0,4dc25ec2b0f2eec8919ecc81f209446d933d662f72b02d2630c82c602d53e698,2024-08-23T16:18:28.547000 CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000 @@ -261141,7 +261154,7 @@ CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df CVE-2024-7606,0,0,a274c3cb55abf1d09b9eed03004046b3bab57ca9c346c9c7f8eb3d1a43589575,2024-08-29T13:25:27.537000 CVE-2024-7607,0,0,a22f9e92f7acda9358a9e1022b2325b742d117f4b1e701544a71613f7628ae8f,2024-08-29T13:25:27.537000 CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000 -CVE-2024-7610,0,1,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000 +CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 @@ -261275,9 +261288,9 @@ CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b025 CVE-2024-7848,0,0,0ee368073eef37c35843cc78ada12ebce75ec11f5e51f0fe556018a4bb2deefe,2024-08-22T12:48:02.790000 CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000 CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000 -CVE-2024-7851,0,1,59aa43af6902d4a788d7da1730827e642c78bd3a9a790eb7c6cdc9cf8851f000,2024-08-29T15:22:08.227000 -CVE-2024-7852,0,1,cfaf6efee3831acfddb66b2453fc175105bb415bea9978d14cd59ad6f5b30e0e,2024-08-29T15:23:16.160000 -CVE-2024-7853,0,1,90e064ba16388d2c255ea61f6d50069bab92e333b7116c2e5b296230c0d5372d,2024-08-29T15:22:52.710000 +CVE-2024-7851,0,0,59aa43af6902d4a788d7da1730827e642c78bd3a9a790eb7c6cdc9cf8851f000,2024-08-29T15:22:08.227000 +CVE-2024-7852,0,0,cfaf6efee3831acfddb66b2453fc175105bb415bea9978d14cd59ad6f5b30e0e,2024-08-29T15:23:16.160000 +CVE-2024-7853,0,0,90e064ba16388d2c255ea61f6d50069bab92e333b7116c2e5b296230c0d5372d,2024-08-29T15:22:52.710000 CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000 CVE-2024-7856,0,0,33feb207767ca0a7c11c844a262a4c47fe31800a079ccc95735f9fe6bb170e1c,2024-08-29T13:25:27.537000 CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000 @@ -261444,21 +261457,21 @@ CVE-2024-8198,0,0,de980718a9ea6cc588b2d974e2982799ff7ae4aa3d30e607d169215732d938 CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000 CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000 CVE-2024-8207,0,0,498323e8227fa40c3fd29b85835950264192b60730f689cfc748d515dfd6f7ad,2024-08-27T13:01:37.913000 -CVE-2024-8208,0,0,c0546cf56f335de149e039eaf41ddcfe92498da6cf6c84b8fa1c52ddaf26fb1f,2024-08-27T18:33:14.247000 -CVE-2024-8209,0,0,55f7ec189eb87638165e40939313326ea0521e4ed80e56afdb88c580a7b1c999,2024-08-27T18:33:14.247000 -CVE-2024-8210,0,0,0f20faea29960531878b9d44b5de81c4bb8a136a66158d050d0fa865804f0894,2024-08-28T12:57:39.090000 -CVE-2024-8211,0,1,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab5d,2024-08-29T15:54:56.390000 -CVE-2024-8212,0,1,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000 -CVE-2024-8213,0,1,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000 -CVE-2024-8214,0,1,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000 -CVE-2024-8216,0,1,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000 -CVE-2024-8217,0,1,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000 -CVE-2024-8218,0,1,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000 -CVE-2024-8219,0,1,8da7ad5f905df25476479f9a020f475db5ef1778247a297ab54e6d15cd2bd400,2024-08-29T15:35:28 -CVE-2024-8220,0,1,2f2f7d8658b6cd96b7599dd980b6c9f65d79b9a8996b730a397954fe9fd0d42b,2024-08-29T14:49:54.737000 -CVE-2024-8221,0,1,584227fe8ab90444d0f31d160d6c03407e5a5ae40db37bf3c9a2eaed655ef7e0,2024-08-29T15:32:11.397000 -CVE-2024-8222,0,1,8d9fa7c58ca8bdc0788d0ea9191f3e7e0b045a8238cc82c5bc079b96b023ea40,2024-08-29T15:13:09.227000 -CVE-2024-8223,0,1,fe884c5ca8ba03daed3304c1b870a734ae4c97c4b3757014b0dc450032c9ade3,2024-08-29T15:11:36.127000 +CVE-2024-8208,0,1,3f393cbce0f1d113de710d532681141cada8ef6f9dabc882bcef6792a38ba6dd,2024-08-29T17:27:02.397000 +CVE-2024-8209,0,1,011c93b978693cad1f1840a0255528b9ea24513efb93d121a5e919ef5bade0bf,2024-08-29T17:23:42.873000 +CVE-2024-8210,0,1,ac28e7311389cbf5c8425b33e7b199665a7b3d5ab76ba6a58fa3d14c45f9ee55,2024-08-29T16:04:45.310000 +CVE-2024-8211,0,0,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab5d,2024-08-29T15:54:56.390000 +CVE-2024-8212,0,0,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000 +CVE-2024-8213,0,0,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000 +CVE-2024-8214,0,0,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000 +CVE-2024-8216,0,0,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000 +CVE-2024-8217,0,0,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000 +CVE-2024-8218,0,0,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000 +CVE-2024-8219,0,0,8da7ad5f905df25476479f9a020f475db5ef1778247a297ab54e6d15cd2bd400,2024-08-29T15:35:28 +CVE-2024-8220,0,0,2f2f7d8658b6cd96b7599dd980b6c9f65d79b9a8996b730a397954fe9fd0d42b,2024-08-29T14:49:54.737000 +CVE-2024-8221,0,0,584227fe8ab90444d0f31d160d6c03407e5a5ae40db37bf3c9a2eaed655ef7e0,2024-08-29T15:32:11.397000 +CVE-2024-8222,0,0,8d9fa7c58ca8bdc0788d0ea9191f3e7e0b045a8238cc82c5bc079b96b023ea40,2024-08-29T15:13:09.227000 +CVE-2024-8223,0,0,fe884c5ca8ba03daed3304c1b870a734ae4c97c4b3757014b0dc450032c9ade3,2024-08-29T15:11:36.127000 CVE-2024-8224,0,0,95fec52f6c9625e460f8029e3f7573af1ea21487b80d7297957e6d41b36a1f50,2024-08-29T00:16:14.413000 CVE-2024-8225,0,0,d4b2d2ccb272432312e58651359d5df16c3e3434eacab3aae53ef4faa54c7744,2024-08-29T00:14:43.957000 CVE-2024-8226,0,0,dde9beb091cd0309f8a2603c2ffae674646580e1c9b72641fb6ca67812daca74,2024-08-29T00:13:44.260000 @@ -261468,11 +261481,12 @@ CVE-2024-8229,0,0,b4e82f248689c551a8c2d56510132af8816aa6c16d8f7b5aa18c38850899c5 CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb4e,2024-08-29T00:08:24.643000 CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000 CVE-2024-8250,0,0,74fb86f8fe2035c18dd497ff04e870378212b13108551159d2a1c3008bad35b8,2024-08-29T13:25:27.537000 +CVE-2024-8255,1,1,1ba22686992caf6d2b849b6835a0bffed1e0c071f8e2f2d7d811361b36c158e5,2024-08-29T16:15:10.140000 CVE-2024-8294,0,0,4dbc4ed3db14d85852b6f7a6aa39a58fb9813e3a468ce2496730622a4e7e8e20,2024-08-29T13:25:27.537000 CVE-2024-8295,0,0,f8b1eacce92adcda34eadca7b6a5f9b0537bcb1008b6d197cf25cbc03f38d464,2024-08-29T13:25:27.537000 CVE-2024-8296,0,0,66346d5f20138091aa1a5c7abd768c7cc1b063d98b4b8f55461cfa2a34a9e06b,2024-08-29T13:25:27.537000 CVE-2024-8297,0,0,be3630f7076c181ff3a7dd53d449891a972e9958d66bbbdeb816e8e8d932d822,2024-08-29T13:25:27.537000 CVE-2024-8301,0,0,a320b86a1c6d3602618f46f60fc09d8dff020322bb7a7b0e43fc9a496aef7f93,2024-08-29T13:25:27.537000 -CVE-2024-8302,1,1,6aa1d8b6c4a0f124c66574ced2f9e480e232ca912559bf0084d593981c6213c1,2024-08-29T14:15:09.530000 -CVE-2024-8303,1,1,df216f6ed6991ebfcd8d04a527576b3dbc34dfc62eb0afc850512e7710171894,2024-08-29T15:15:34.783000 -CVE-2024-8304,1,1,0b11e3bd31707139d665525dc7f3be4c5c9aa682a3f15d2ded6c49c9b5d9a51b,2024-08-29T15:15:35.070000 +CVE-2024-8302,0,0,6aa1d8b6c4a0f124c66574ced2f9e480e232ca912559bf0084d593981c6213c1,2024-08-29T14:15:09.530000 +CVE-2024-8303,0,0,df216f6ed6991ebfcd8d04a527576b3dbc34dfc62eb0afc850512e7710171894,2024-08-29T15:15:34.783000 +CVE-2024-8304,0,0,0b11e3bd31707139d665525dc7f3be4c5c9aa682a3f15d2ded6c49c9b5d9a51b,2024-08-29T15:15:35.070000