Auto-Update: 2024-08-13T16:00:17.073818+00:00

This commit is contained in:
cad-safe-bot 2024-08-13 16:03:13 +00:00
parent 7cb35bc388
commit 0f5750209f
67 changed files with 3685 additions and 449 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-3772",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:12.063",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:05:53.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +61,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.40.3154",
"matchCriteriaId": "A650CC4E-DCBC-4A77-9601-A0E672F7A8C8"
}
]
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/171959",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-6197",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:12.340",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:06:57.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +61,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.8.90.11211",
"matchCriteriaId": "AEF33AB8-198F-41E7-B39F-09CD01633072"
}
]
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/186945.html",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-6198",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:12.557",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:07:36.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,10 +36,40 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.8.90.11211",
"matchCriteriaId": "AEF33AB8-198F-41E7-B39F-09CD01633072"
}
]
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/186945.html",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33167",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-30T17:15:10.020",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:29:30.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +81,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_directory_integrator:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B2C187-CEC8-4991-94E2-058B6584A40A"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228587",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7161469",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4002",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:14.627",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:23:51.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +61,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:motorola:q14_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.0.16",
"matchCriteriaId": "183CFCDE-690B-4784-B961-529EE4458035"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:motorola:q14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4670A32D-FCA7-40E5-8EB3-18D4835A5C7F"
}
]
}
]
}
],
"references": [
{
"url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4003",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:14.850",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:23:48.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +81,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:motorola:q14_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.0.16",
"matchCriteriaId": "183CFCDE-690B-4784-B961-529EE4458035"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:motorola:q14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4670A32D-FCA7-40E5-8EB3-18D4835A5C7F"
}
]
}
]
}
],
"references": [
{
"url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1577",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-07-31T21:15:15.423",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:12:55.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +61,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:drivers_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.1.1307.1308",
"matchCriteriaId": "BD64B313-2EEC-4659-8D81-26CDB5C770FC"
}
]
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/dc_415202.html",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26288",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-30T17:15:11.720",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:23:53.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248477",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7161538",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26289",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-30T17:15:12.740",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:26:52.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248478",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7161537",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38001",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-30T17:15:13.000",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:24:53.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260206",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7161538",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-50809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:11.923",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T14:35:00.967",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five."
},
{
"lang": "es",
"value": "En ciertos productos Sonos anteriores a la versi\u00f3n S1 11.12 y S2 versi\u00f3n 15.9, el controlador inal\u00e1mbrico mt_7615.ko no valida correctamente un elemento de informaci\u00f3n durante la negociaci\u00f3n de un protocolo de enlace de cuatro v\u00edas WPA2. Esta falta de validaci\u00f3n provoca un desbordamiento del b\u00fafer de pila. Esto puede resultar en la ejecuci\u00f3n remota de c\u00f3digo dentro del kernel. Esto afecta a Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL y Five."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.sonos.com/en-us/security-advisory-2024-0001",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23787",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-14T10:15:08.780",
"lastModified": "2024-02-14T13:59:35.580",
"lastModified": "2024-08-13T14:35:10.747",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de path traversal en Energy Management Controller con servicios en la nube JH-RVB1 /JH-RV11 Ver.B0.1.9.1 y anteriores permite que un atacante no autenticado adyacente a la red obtenga un archivo arbitrario en el producto afectado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27355",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T23:15:08.553",
"lastModified": "2024-03-21T02:52:19.970",
"lastModified": "2024-08-13T14:35:13.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en phpseclib 1.x anterior a 1.0.23, 2.x anterior a 2.0.47 y 3.x anterior a 3.0.36. Al procesar el identificador de objeto ASN.1 de un certificado, se puede proporcionar un subidentificador que conduzca a una denegaci\u00f3n de servicio (consumo de CPU para decodeOID)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-27442",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T15:15:20.193",
"lastModified": "2024-08-12T18:57:29.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T15:35:02.263",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The zmmailboxdmgr binary, a component of ZCS, is intended to be executed by the zimbra user with root privileges for specific mailbox operations. However, an attacker can escalate privileges from the zimbra user to root, because of improper handling of input arguments. An attacker can execute arbitrary commands with elevated privileges, leading to local privilege escalation."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Zimbra Collaboration (ZCS) 9.0 y 10.0. El binario zmmailboxdmgr, un componente de ZCS, est\u00e1 manipulado para que lo ejecute el usuario de zimbra con privilegios de root para operaciones espec\u00edficas del buz\u00f3n. Sin embargo, un atacante puede escalar privilegios del usuario de zimbra al root debido al manejo inadecuado de los argumentos de entrada. Un atacante puede ejecutar comandos arbitrarios con privilegios elevados, lo que lleva a una escalada de privilegios locales."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.7#Security_Fixes",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29151",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T06:15:05.913",
"lastModified": "2024-03-18T12:38:25.490",
"lastModified": "2024-08-13T15:35:06.993",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Rocket.Chat.Audit hasta 5ad78e8 depende de filecachetools, que no existe en PyPI."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
],
"references": [
{
"url": "https://github.com/RocketChat/Rocket.Chat.Audit/blob/5ad78e8017a9e190602e8257c22500ded0d931a9/requirements.txt#L3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30622",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-29T13:15:15.870",
"lastModified": "2024-03-29T13:28:22.880",
"lastModified": "2024-08-13T15:35:09.960",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro mitInterface de la funci\u00f3n fromAddressNat."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31807",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T13:15:08.603",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-08-13T15:35:10.810",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro hostTime en la funci\u00f3n NTPSyncWithHost."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_2_NTPSyncWithHost/CI.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37129",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-31T09:15:04.290",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:26:46.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:inventory_collector:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.3.0.6",
"matchCriteriaId": "5D19C8C4-B9B1-46A9-8858-E690A76D86D3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225779/dsa-2024-263",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37635",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T19:15:52.630",
"lastModified": "2024-08-07T16:47:25.073",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:11.883",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-38688",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-13T10:15:06.677",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T15:15:17.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Igor Beni? Recipe Maker For Your Food Blog from Zip Recipes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.2.6."
"value": "Missing Authorization vulnerability in Igor Beni\u0107 Recipe Maker For Your Food Blog from Zip Recipes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.2.6."
}
],
"metrics": {

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-38989",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:24.333",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T14:35:23.670",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "izatop bunt v0.29.19 was discovered to contain a prototype pollution via the component /esm/qs.js. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que izatop bunt v0.29.19 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s del componente /esm/qs.js. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/5e9830fb180a34d65f04fafb52d2b94b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3938",
"sourceIdentifier": "security@dotcms.com",
"published": "2024-07-25T22:15:08.903",
"lastModified": "2024-07-26T14:15:02.773",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:09:14.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@dotcms.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@dotcms.com",
"type": "Secondary",
@ -51,10 +81,133 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.5",
"versionEndExcluding": "23.01.18",
"matchCriteriaId": "5D8CDD8C-0F92-4218-ACDB-C3E691F928AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.02",
"versionEndIncluding": "23.09.7",
"matchCriteriaId": "E85B4224-34E8-47CD-8F08-8B129868AF1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.12.21",
"versionEndIncluding": "24.04.23",
"matchCriteriaId": "6A6601A2-B008-44C9-A7C4-1DB2D613BD14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.05.13",
"versionEndExcluding": "24.05.31",
"matchCriteriaId": "379748A4-D76F-4402-9A4F-E509C6735285"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:1:*:*:lts:*:*:*",
"matchCriteriaId": "33DBCA2A-D4E2-4AE6-B6E0-FD0A277266F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:10:*:*:lts:*:*:*",
"matchCriteriaId": "DECC3919-5044-41AF-9AAA-A964027F51C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:2:*:*:lts:*:*:*",
"matchCriteriaId": "342C11DD-7760-42AE-8670-4461ECB51E4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:3:*:*:lts:*:*:*",
"matchCriteriaId": "90B73A81-7202-4B0B-822B-4F2EE4480663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:4:*:*:lts:*:*:*",
"matchCriteriaId": "0BFA7220-B846-451B-A7B2-C3DC87767575"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:5:*:*:lts:*:*:*",
"matchCriteriaId": "258813CA-66A7-4DCA-883D-884FB88430DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:6:*:*:lts:*:*:*",
"matchCriteriaId": "E69C8B72-A38C-4D97-83BB-DCE392D3ABD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:7:*:*:lts:*:*:*",
"matchCriteriaId": "B5309F19-2D65-4E87-87FD-2A0294008FF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:8:*:*:lts:*:*:*",
"matchCriteriaId": "CBAEE45C-234C-4E5C-86CF-4F71A457D6F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:9:*:*:lts:*:*:*",
"matchCriteriaId": "FD553D7C-158F-489D-8C4C-8E2E056D52BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24.0:*:*:*:lts:*:*:*",
"matchCriteriaId": "9692C9DB-6111-4EE6-8DE8-1614DF87F365"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:-:*:*:*:*:*:*",
"matchCriteriaId": "EB1AD7A4-1F60-493C-8BB2-E13F44F3CCD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:0:*:*:lts:*:*:*",
"matchCriteriaId": "EE62FB6F-DB41-47B4-B8F7-0B9C887781D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:1:*:*:lts:*:*:*",
"matchCriteriaId": "395197BB-2613-43BA-9223-195461F993D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:2:*:*:lts:*:*:*",
"matchCriteriaId": "72350E82-5B73-41A9-B3F1-8CA7BF389897"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:3:*:*:lts:*:*:*",
"matchCriteriaId": "478A668F-DD76-4C0C-A444-A760C1AA5623"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dotcms.com/security/SI-71",
"source": "security@dotcms.com"
"source": "security@dotcms.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41240",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T18:15:37.627",
"lastModified": "2024-08-08T15:11:06.067",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:13.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
"impactScore": 3.4
}
]
},

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41475",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T17:15:17.257",
"lastModified": "2024-08-12T18:57:17.383",
"lastModified": "2024-08-13T15:35:13.560",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gnuboard g6 6.0.7 is vulnerable to Session hijacking due to a CORS misconfiguration."
},
{
"lang": "es",
"value": "Gnuboard g6 6.0.7 es vulnerable al secuestro de sesi\u00f3n debido a una mala configuraci\u00f3n de CORS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/AkiaCode/7c878b1699931314246d6589d86b1e89",

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-41481",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:30.733",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:51:33.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the Mermaid component."
},
{
"lang": "es",
"value": "Typora anterior a 1.9.3 Markdown editor tiene una vulnerabilidad de cross site scripting (XSS) a trav\u00e9s del componente Mermaid."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.3",
"matchCriteriaId": "2D1EB795-93A4-4F48-8F3F-F1FEB48215A5"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.typora.io/What%27s-New-1.9/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-41482",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:31.000",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:51:43.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the MathJax component."
},
{
"lang": "es",
"value": "Typora anterior a 1.9.3 Markdown editor tiene una vulnerabilidad de cross site scripting (XSS) a trav\u00e9s del componente MathJax."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.3",
"matchCriteriaId": "2D1EB795-93A4-4F48-8F3F-F1FEB48215A5"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.typora.io/What%27s-New-1.9/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41623",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-13T14:15:12.203",
"lastModified": "2024-08-13T14:15:12.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in D3D Security D3D IP Camera (D8801) v.V9.1.17.1.4-20180428 allows a local attacker to execute arbitrary code via a crafted payload"
}
],
"metrics": {},
"references": [
{
"url": "http://d3d.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Anonymous120386/Anonymous",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42520",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T15:15:21.770",
"lastModified": "2024-08-13T13:19:29.207",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:16.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42545",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T18:15:12.540",
"lastModified": "2024-08-13T13:23:46.510",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:16.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42547",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T19:15:17.030",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T15:35:17.887",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "TOTOLINK A3100R V4.1.2cu.5050_B20200504 tiene una vulnerabilidad de desbordamiento del b\u00fafer en el par\u00e1metro http_host en la funci\u00f3n loginauth."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3100R/loginauth.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42626",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T17:15:18.257",
"lastModified": "2024-08-13T13:24:29.367",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:20.987",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42630",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T16:15:17.060",
"lastModified": "2024-08-13T13:20:39.450",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:22.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42632",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T16:15:17.223",
"lastModified": "2024-08-13T13:24:16.770",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-13T15:35:23.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42736",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-13T14:15:13.160",
"lastModified": "2024-08-13T14:15:13.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in addBlacklist. Authenticated Attackers can send malicious packet to execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/addBlacklist/addBlacklist.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42737",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-13T14:15:13.437",
"lastModified": "2024-08-13T14:15:13.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in delBlacklist. Authenticated Attackers can send malicious packet to execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/delBlacklist/delBlacklist.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42738",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-13T14:15:13.710",
"lastModified": "2024-08-13T14:15:13.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setDmzCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setDmzCfg/setDmzCfg.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-13T14:15:13.940",
"lastModified": "2024-08-13T14:15:13.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setAccessDeviceCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setAccessDeviceCfg/setAccessDeviceCfg.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-42740",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-13T14:15:14.203",
"lastModified": "2024-08-13T15:35:24.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setLedCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setLedCfg/setLedCfg.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-42741",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:08.820",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T14:15:14.447",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setL2tpServerCfg. Authenicated Attackers can send malicious packet to execute arbitary commands."
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setL2tpServerCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-42742",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:08.917",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T14:15:14.990",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUrlFilterRules. Authenicated Attackers can send malicious packet to execute arbitary commands."
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUrlFilterRules. Authenticated Attackers can send malicious packet to execute arbitrary commands."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-42743",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:09.027",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T14:15:15.247",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setSyslogCfg . Authenicated Attackers can send malicious packet to execute arbitary commands."
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setSyslogCfg . Authenticated Attackers can send malicious packet to execute arbitrary commands."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-42744",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:09.110",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T14:15:15.427",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setModifyVpnUser. Authenicated Attackers can send malicious packet to execute arbitary commands."
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setModifyVpnUser. Authenticated Attackers can send malicious packet to execute arbitrary commands."
},
{
"lang": "es",

View File

@ -2,20 +2,55 @@
"id": "CVE-2024-42745",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:09.203",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T15:35:25.590",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUPnPCfg. Authenicated Attackers can send malicious packet to execute arbitary commands."
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUPnPCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
},
{
"lang": "es",
"value": "En TOTOLINK X5000r v9.1.0cu.2350_b20230313, el archivo /cgi-bin/cstecgi.cgi contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en setUPnPCfg. Los atacantes autenticados pueden enviar paquetes maliciosos para ejecutar comandos arbitrarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setUPnPCfg/setUPnPCfg.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42748",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:09.367",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T15:35:27.100",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En TOTOLINK X5000r v9.1.0cu.2350_b20230313, el archivo /cgi-bin/cstecgi.cgi contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en setWiFiWpsCfg. Los atacantes autenticados pueden enviar paquetes maliciosos para ejecutar comandos arbitrarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setWiFiWpsCfg/setWiFiWpsCfg.md",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-6158",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-12T13:38:38.913",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-13T15:35:29.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Category Posts Widget WordPress plugin before 4.9.17, term-and-category-based-posts-widget WordPress plugin before 4.9.13 does not validate and escape some of its \"Category Posts\" widget settings before outputting them back in a page/post where the Widget is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Category Posts Widget de WordPress anterior a 4.9.17, el complemento term-and-category-based-posts-widget de WordPress anterior a 4.9.13 no valida ni escapa algunas de las configuraciones del widget de \"Publicaciones de categor\u00eda\" antes de devolverlas a una p\u00e1gina/ publicar donde est\u00e1 incrustado el widget, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/8adb219f-f0a6-4e87-8626-db26e300c220/",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6384",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-08-13T15:15:18.567",
"lastModified": "2024-08-13T15:15:18.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\"Hot\" backup files may be downloaded by underprivileged users, if they are capable of acquiring a unique backup identifier. This issue affects MongoDB Enterprise Server v6.0 versions prior to 6.0.16, MongoDB Enterprise Server v7.0 versions prior to 7.0.11 and MongoDB Enterprise Server v7.3 versions prior to 7.3.3"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-93516",
"source": "cna@mongodb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6724",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-13T06:15:04.083",
"lastModified": "2024-08-13T12:58:25.437",
"lastModified": "2024-08-13T15:35:30.033",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Generate Images WordPress plugin before 5.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6758",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-08-12T13:38:40.080",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:58:47.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management\u00a0in\u00a0Sprecher Automation SPRECON-E below version 8.71j allows a remote attacker with low privileges to save unauthorized protection assignments."
},
{
"lang": "es",
"value": "Gesti\u00f3n inadecuada de privilegios en Sprecher Automation SPRECON-E inferior a la versi\u00f3n 8.71j permite a un atacante remoto con privilegios bajos guardar asignaciones de protecci\u00f3n no autorizadas."
}
],
"metrics": {
@ -37,8 +41,18 @@
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,10 +61,351 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_cp-2500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "8250F623-0548-45E5-AEE9-0384AC8F84B9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_cp-2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D44AC0BE-34DD-44E9-AB95-BADAE1AB49EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dd6-2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "2FE1C8C6-77EC-474F-BF82-5F4C780F0333"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dd6-2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "336E2DC6-FBAD-416B-81DD-C0AA0C3CF228"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "A1DC4DEC-D793-4BBC-A59D-7D0FEEA8E6EF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE018DD-422E-441D-8096-0AA6DC308A2A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_ap-2200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "577FFC12-47A2-46EB-A584-4E5E7C30A277"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_ap-2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7598CCB-703B-4436-AA50-88BF881795E5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_cp-2131_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "358B2FC2-7802-4546-A7A1-C6E14D3DC71F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_cp-2131:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F6819C-A6B1-4897-89E5-E4F6E9F2D600"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_cp-2330_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "82736597-C68A-4391-9D75-DB2185805753"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_cp-2330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CEBC973-D8C2-4800-9049-C4CCA7EAF991"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "95F14A62-D1F3-47BB-A16B-262A0718CA88"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "664F4B0C-7EEE-4AAA-9C87-EA6FDAB9B10C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "9228D9BD-52C5-43F4-8DBC-F93806BB30FE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD753ACD-77BF-4F2D-AA06-5083082F9C00"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "D03B0660-8883-4998-AF11-E25F12773E80"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59815159-1AF0-4E23-94B1-040312259591"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-edir_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "D9DFF2D1-60D8-40B8-8A56-9FB6B06798EF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-edir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "898F8202-FE26-45C7-91DD-70422759058D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "7ADB2881-7413-48D8-ABC6-8D92B5DD676E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D74929-4546-441B-8D8D-3E9F0FA7EE7E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-t3_ax-3110_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.71j",
"matchCriteriaId": "5309389C-66C7-4E7A-8EA1-3ED03FC59856"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-t3_ax-3110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244451FB-7A72-4732-A7CB-654430723B5F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2407171_de.pdf",
"source": "info@cert.vde.com"
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6759",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-08-12T13:38:40.380",
"lastModified": "2024-08-12T15:35:05.710",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T15:08:27.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, \"/\". This allows readdir(3) and related functions to return filesystem entries with names containing additional path components.\n\nThe lack of validation described above gives rise to a confused deputy problem. For example, a program copying files from an NFS mount could be tricked into copying from outside the intended source directory, and/or to a location outside the intended destination directory."
},
{
"lang": "es",
"value": "Al montar un sistema de archivos remoto usando NFS, el kernel no desinfect\u00f3 los nombres de archivos proporcionados de forma remota para el car\u00e1cter separador de ruta, \"/\". Esto permite que readdir(3) y funciones relacionadas devuelvan entradas del sistema de archivos con nombres que contienen componentes de ruta adicionales. La falta de validaci\u00f3n descrita anteriormente da lugar a un confuso problema de diputados. Por ejemplo, se podr\u00eda enga\u00f1ar a un programa que copia archivos desde un montaje NFS para que los copie desde fuera del directorio de origen previsto y/o a una ubicaci\u00f3n fuera del directorio de destino previsto."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,10 +81,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "18A4E85D-70A5-4382-AAB7-4A531615613D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1",
"versionEndExcluding": "13.3",
"matchCriteriaId": "FEC367A5-24D1-414E-BC77-07968E787D01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "ABEA48EC-24EA-4106-9465-CE66B938635F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*",
"matchCriteriaId": "BC8C769C-A23E-4F61-AC42-4DA64421B096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p4:*:*:*:*:*:*",
"matchCriteriaId": "45B0589E-2E7D-4516-A8A0-88F30038EAB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "69A72B5A-2189-4700-8E8B-1E5E7CA86C40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "5771F187-281B-4680-B562-EFC7441A8F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "0A4437F5-9DDA-4769-974E-23BFA085E0DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "A9C3A3D4-C9F4-41EB-B532-821AF83470B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "878A1F0A-087F-47D7-9CA5-A54BB8D6676A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "50A5E650-31FB-45BE-8827-641B58A83E45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "D59CFDD3-AEC3-43F1-A620-0B1F0BAD9048"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "038E5B85-7F60-4D71-8D3F-EDBF6E036CE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*",
"matchCriteriaId": "BF309824-D379-4749-A1FA-BCB2987DD671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "AA813990-8C8F-4EE8-9F2B-9F73C510A7B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "D4DFA201-27D5-4C01-B90F-E24778943C3B"
}
]
}
]
}
],
"references": [
{
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:07.nfsclient.asc",
"source": "secteam@freebsd.org"
"source": "secteam@freebsd.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,172 @@
"id": "CVE-2024-6760",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-08-12T13:38:40.447",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T15:08:51.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs.\n\nThe bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database."
},
{
"lang": "es",
"value": "Un error l\u00f3gico en el c\u00f3digo que deshabilita el rastreo del kernel para programas setuid signific\u00f3 que el rastreo no se deshabilit\u00f3 cuando deber\u00eda haberlo hecho, permitiendo a los usuarios sin privilegios rastrear e inspeccionar el comportamiento de los programas setuid. Un usuario sin privilegios puede utilizar el error para leer el contenido de archivos a los que de otro modo no tendr\u00eda acceso, como la base de datos de contrase\u00f1as local."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "18A4E85D-70A5-4382-AAB7-4A531615613D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1",
"versionEndExcluding": "13.3",
"matchCriteriaId": "FEC367A5-24D1-414E-BC77-07968E787D01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "ABEA48EC-24EA-4106-9465-CE66B938635F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*",
"matchCriteriaId": "BC8C769C-A23E-4F61-AC42-4DA64421B096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p4:*:*:*:*:*:*",
"matchCriteriaId": "45B0589E-2E7D-4516-A8A0-88F30038EAB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "69A72B5A-2189-4700-8E8B-1E5E7CA86C40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "5771F187-281B-4680-B562-EFC7441A8F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "0A4437F5-9DDA-4769-974E-23BFA085E0DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "A9C3A3D4-C9F4-41EB-B532-821AF83470B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "878A1F0A-087F-47D7-9CA5-A54BB8D6676A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "50A5E650-31FB-45BE-8827-641B58A83E45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "D59CFDD3-AEC3-43F1-A620-0B1F0BAD9048"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "038E5B85-7F60-4D71-8D3F-EDBF6E036CE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*",
"matchCriteriaId": "BF309824-D379-4749-A1FA-BCB2987DD671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "AA813990-8C8F-4EE8-9F2B-9F73C510A7B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "D4DFA201-27D5-4C01-B90F-E24778943C3B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:06.ktrace.asc",
"source": "secteam@freebsd.org"
"source": "secteam@freebsd.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6788",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-08-13T14:15:16.457",
"lastModified": "2024-08-13T14:15:16.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user \u201cuser-app\u201d to the default password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2024-022",
"source": "info@cert.vde.com"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-7006",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-12T13:38:40.577",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T15:14:35.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla de desreferencia de puntero nulo en Libtiff a trav\u00e9s de `tif_dirinfo.c`. Este problema puede permitir que un atacante desencadene fallas de asignaci\u00f3n de memoria a trav\u00e9s de ciertos medios, como restringir el tama\u00f1o del espacio del mont\u00f3n o inyectar fallas, lo que provoca una falla de segmentaci\u00f3n. Esto puede provocar un fallo de la aplicaci\u00f3n y, en \u00faltima instancia, provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -37,8 +61,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,14 +81,57 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libtiff:libtiff:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8246A12-73A8-4171-847E-D894E0B17DAE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7006",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302996",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7106",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-25T21:15:12.090",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:15:31.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:denkgroot:spina:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.18.0",
"matchCriteriaId": "063D6292-761E-4CD0-8C84-B170DEBC4869"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/blob/main/cve3/README.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272431",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272431",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.376769",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-26T05:15:10.857",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:06:57.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,146 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A"
}
]
}
]
}
],
"references": [
{
"url": "https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272451",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272451",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.380167",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7225",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T09:15:05.287",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:17:10.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:munyweki:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "826B7388-F683-45AE-908E-A26D1D12CCAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xu-Mingming/cve/blob/main/xss2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272805",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272805",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.380967",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7226",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T09:15:05.597",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:19:04.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:medicine_tracker_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44A35599-C92F-4A69-B7B1-C768223118FD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xu-Mingming/cve/blob/main/CSRF2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.272806",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.272806",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.380981",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7272",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-12T13:38:40.850",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T15:16:23.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en FFmpeg hasta 5.1.5 y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n fill_audiodata del archivo /libswresample/swresample.c. La manipulaci\u00f3n conduce a un desbordamiento del b\u00fafer basado en el mont\u00f3n. Es posible iniciar el ataque de forma remota. Este problema fue solucionado en la versi\u00f3n 6.0 por 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 pero se olvid\u00f3 un backport para 5.1. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a las versiones 5.1.6 y 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 puede solucionar este problema. Se recomienda actualizar el componente afectado."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -116,26 +150,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.6",
"matchCriteriaId": "FCB80EE7-6F12-4A81-93BD-EF05F94AC15B"
}
]
}
]
}
],
"references": [
{
"url": "https://ffmpeg.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://vuldb.com/?ctiid.273945",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273945",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7289",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T06:15:06.313",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:53:09.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/7f65e9704b8650e6bee74190f96d21e3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273158",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273158",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.381471",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7290",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T06:15:07.533",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T14:53:34.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/e40f691866138ea1abf3ca452c4ae3ac",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273159",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273159",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.381487",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7307",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T09:15:05.120",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:55:05.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/df642bf14cce32c58d4805b6f6cf44e0",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273199",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273199",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.382328",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T09:15:05.690",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T14:57:18.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/topsky979/c11fd2c1b9027831031de2e58cbf5ff3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273200",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273200",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.382329",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T10:15:02.893",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:00:09.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "457BEE12-29ED-48B8-8C96-E181F0E80B56"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zw-a11y/VUL/blob/main/Record-Management-System-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.382506",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T10:15:03.550",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:01:01.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "457BEE12-29ED-48B8-8C96-E181F0E80B56"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zw-a11y/VUL/blob/main/Record-Management-System-2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273202",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273202",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.382507",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-31T11:15:11.233",
"lastModified": "2024-07-31T12:57:02.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-13T15:03:33.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +150,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/23588hk/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.273203",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.273203",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.383201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-7399",
"sourceIdentifier": "PSIRT@samsung.com",
"published": "2024-08-12T13:38:41.550",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-13T15:30:52.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority."
},
{
"lang": "es",
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido en la versi\u00f3n Samsung MagicINFO 9 Server anterior a la 21.1050 permite a los atacantes escribir archivos arbitrarios como autoridad del sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "PSIRT@samsung.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "PSIRT@samsung.com",
"type": "Secondary",
@ -51,10 +85,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samsung:magicinfo_9_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.1050",
"matchCriteriaId": "3FD91423-8065-4E70-B31A-7C1F5D00EAEE"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungtv.com/securityUpdates",
"source": "PSIRT@samsung.com"
"source": "PSIRT@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-13T14:00:18.248461+00:00
2024-08-13T16:00:17.073818+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-13T13:53:29.533000+00:00
2024-08-13T15:35:30.033000+00:00
```
### Last Data Feed Release
@ -33,56 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259718
259726
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `8`
- [CVE-2024-35124](CVE-2024/CVE-2024-351xx/CVE-2024-35124.json) (`2024-08-13T12:15:06.163`)
- [CVE-2024-37287](CVE-2024/CVE-2024-372xx/CVE-2024-37287.json) (`2024-08-13T12:15:06.433`)
- [CVE-2024-38501](CVE-2024/CVE-2024-385xx/CVE-2024-38501.json) (`2024-08-13T13:15:12.130`)
- [CVE-2024-38502](CVE-2024/CVE-2024-385xx/CVE-2024-38502.json) (`2024-08-13T13:15:12.460`)
- [CVE-2024-3913](CVE-2024/CVE-2024-39xx/CVE-2024-3913.json) (`2024-08-13T13:15:12.750`)
- [CVE-2024-43138](CVE-2024/CVE-2024-431xx/CVE-2024-43138.json) (`2024-08-13T12:15:06.657`)
- [CVE-2024-43140](CVE-2024/CVE-2024-431xx/CVE-2024-43140.json) (`2024-08-13T12:15:06.887`)
- [CVE-2024-43141](CVE-2024/CVE-2024-431xx/CVE-2024-43141.json) (`2024-08-13T12:15:07.150`)
- [CVE-2024-43153](CVE-2024/CVE-2024-431xx/CVE-2024-43153.json) (`2024-08-13T12:15:07.383`)
- [CVE-2024-43160](CVE-2024/CVE-2024-431xx/CVE-2024-43160.json) (`2024-08-13T12:15:07.617`)
- [CVE-2024-43165](CVE-2024/CVE-2024-431xx/CVE-2024-43165.json) (`2024-08-13T12:15:07.833`)
- [CVE-2024-5849](CVE-2024/CVE-2024-58xx/CVE-2024-5849.json) (`2024-08-13T13:15:13.067`)
- [CVE-2024-41623](CVE-2024/CVE-2024-416xx/CVE-2024-41623.json) (`2024-08-13T14:15:12.203`)
- [CVE-2024-42736](CVE-2024/CVE-2024-427xx/CVE-2024-42736.json) (`2024-08-13T14:15:13.160`)
- [CVE-2024-42737](CVE-2024/CVE-2024-427xx/CVE-2024-42737.json) (`2024-08-13T14:15:13.437`)
- [CVE-2024-42738](CVE-2024/CVE-2024-427xx/CVE-2024-42738.json) (`2024-08-13T14:15:13.710`)
- [CVE-2024-42739](CVE-2024/CVE-2024-427xx/CVE-2024-42739.json) (`2024-08-13T14:15:13.940`)
- [CVE-2024-42740](CVE-2024/CVE-2024-427xx/CVE-2024-42740.json) (`2024-08-13T14:15:14.203`)
- [CVE-2024-6384](CVE-2024/CVE-2024-63xx/CVE-2024-6384.json) (`2024-08-13T15:15:18.567`)
- [CVE-2024-6788](CVE-2024/CVE-2024-67xx/CVE-2024-6788.json) (`2024-08-13T14:15:16.457`)
### CVEs modified in the last Commit
Recently modified CVEs: `147`
Recently modified CVEs: `57`
- [CVE-2024-43220](CVE-2024/CVE-2024-432xx/CVE-2024-43220.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43224](CVE-2024/CVE-2024-432xx/CVE-2024-43224.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43225](CVE-2024/CVE-2024-432xx/CVE-2024-43225.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43226](CVE-2024/CVE-2024-432xx/CVE-2024-43226.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43227](CVE-2024/CVE-2024-432xx/CVE-2024-43227.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43231](CVE-2024/CVE-2024-432xx/CVE-2024-43231.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43233](CVE-2024/CVE-2024-432xx/CVE-2024-43233.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43358](CVE-2024/CVE-2024-433xx/CVE-2024-43358.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43359](CVE-2024/CVE-2024-433xx/CVE-2024-43359.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-43360](CVE-2024/CVE-2024-433xx/CVE-2024-43360.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-6558](CVE-2024/CVE-2024-65xx/CVE-2024-6558.json) (`2024-08-13T13:53:29.533`)
- [CVE-2024-6724](CVE-2024/CVE-2024-67xx/CVE-2024-6724.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-6768](CVE-2024/CVE-2024-67xx/CVE-2024-6768.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-6823](CVE-2024/CVE-2024-68xx/CVE-2024-6823.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7094](CVE-2024/CVE-2024-70xx/CVE-2024-7094.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7247](CVE-2024/CVE-2024-72xx/CVE-2024-7247.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7388](CVE-2024/CVE-2024-73xx/CVE-2024-7388.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7590](CVE-2024/CVE-2024-75xx/CVE-2024-7590.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7704](CVE-2024/CVE-2024-77xx/CVE-2024-7704.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7705](CVE-2024/CVE-2024-77xx/CVE-2024-7705.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7706](CVE-2024/CVE-2024-77xx/CVE-2024-7706.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7707](CVE-2024/CVE-2024-77xx/CVE-2024-7707.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7709](CVE-2024/CVE-2024-77xx/CVE-2024-7709.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-13T12:58:25.437`)
- [CVE-2024-42741](CVE-2024/CVE-2024-427xx/CVE-2024-42741.json) (`2024-08-13T14:15:14.447`)
- [CVE-2024-42742](CVE-2024/CVE-2024-427xx/CVE-2024-42742.json) (`2024-08-13T14:15:14.990`)
- [CVE-2024-42743](CVE-2024/CVE-2024-427xx/CVE-2024-42743.json) (`2024-08-13T14:15:15.247`)
- [CVE-2024-42744](CVE-2024/CVE-2024-427xx/CVE-2024-42744.json) (`2024-08-13T14:15:15.427`)
- [CVE-2024-42745](CVE-2024/CVE-2024-427xx/CVE-2024-42745.json) (`2024-08-13T15:35:25.590`)
- [CVE-2024-42748](CVE-2024/CVE-2024-427xx/CVE-2024-42748.json) (`2024-08-13T15:35:27.100`)
- [CVE-2024-6158](CVE-2024/CVE-2024-61xx/CVE-2024-6158.json) (`2024-08-13T15:35:29.740`)
- [CVE-2024-6724](CVE-2024/CVE-2024-67xx/CVE-2024-6724.json) (`2024-08-13T15:35:30.033`)
- [CVE-2024-6758](CVE-2024/CVE-2024-67xx/CVE-2024-6758.json) (`2024-08-13T14:58:47.857`)
- [CVE-2024-6759](CVE-2024/CVE-2024-67xx/CVE-2024-6759.json) (`2024-08-13T15:08:27.780`)
- [CVE-2024-6760](CVE-2024/CVE-2024-67xx/CVE-2024-6760.json) (`2024-08-13T15:08:51.977`)
- [CVE-2024-7006](CVE-2024/CVE-2024-70xx/CVE-2024-7006.json) (`2024-08-13T15:14:35.167`)
- [CVE-2024-7106](CVE-2024/CVE-2024-71xx/CVE-2024-7106.json) (`2024-08-13T14:15:31.030`)
- [CVE-2024-7120](CVE-2024/CVE-2024-71xx/CVE-2024-7120.json) (`2024-08-13T14:06:57.033`)
- [CVE-2024-7225](CVE-2024/CVE-2024-72xx/CVE-2024-7225.json) (`2024-08-13T14:17:10.833`)
- [CVE-2024-7226](CVE-2024/CVE-2024-72xx/CVE-2024-7226.json) (`2024-08-13T14:19:04.147`)
- [CVE-2024-7272](CVE-2024/CVE-2024-72xx/CVE-2024-7272.json) (`2024-08-13T15:16:23.837`)
- [CVE-2024-7289](CVE-2024/CVE-2024-72xx/CVE-2024-7289.json) (`2024-08-13T14:53:09.637`)
- [CVE-2024-7290](CVE-2024/CVE-2024-72xx/CVE-2024-7290.json) (`2024-08-13T14:53:34.777`)
- [CVE-2024-7307](CVE-2024/CVE-2024-73xx/CVE-2024-7307.json) (`2024-08-13T14:55:05.840`)
- [CVE-2024-7308](CVE-2024/CVE-2024-73xx/CVE-2024-7308.json) (`2024-08-13T14:57:18.157`)
- [CVE-2024-7309](CVE-2024/CVE-2024-73xx/CVE-2024-7309.json) (`2024-08-13T15:00:09.397`)
- [CVE-2024-7310](CVE-2024/CVE-2024-73xx/CVE-2024-7310.json) (`2024-08-13T15:01:01.970`)
- [CVE-2024-7311](CVE-2024/CVE-2024-73xx/CVE-2024-7311.json) (`2024-08-13T15:03:33.910`)
- [CVE-2024-7399](CVE-2024/CVE-2024-73xx/CVE-2024-7399.json) (`2024-08-13T15:30:52.337`)
## Download and Usage

View File

@ -104128,7 +104128,7 @@ CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c
CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000
CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000
CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000
CVE-2017-3772,0,0,8b3462e912b704c8334102ca2f6146e34b45d67ff30aa1a649b18fe52c032d4f,2024-08-01T12:42:36.933000
CVE-2017-3772,0,1,2e722b87e0f8ca305504dfde19929c74cc3c224944db4660b751bbedcd9d8d09,2024-08-13T15:05:53.983000
CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000
CVE-2017-3774,0,0,d409d3f34db015c7daec361952a5a6d7fd1d6f73296ee3273429d749d1d764fa,2018-05-24T16:27:03.247000
CVE-2017-3775,0,0,ab41f4023b00bda26c97ad0eb99ef0d3cb35ca29d6e3b05ce617672fe8d191ca,2018-06-13T15:58:17.390000
@ -141081,8 +141081,8 @@ CVE-2019-6193,0,0,5252032daec5c50053e0084e41e72ddc126830441b5cd9f1bc5d3b51ad6fae
CVE-2019-6194,0,0,c68604ccf954a52cb6716566256a77cd3db53ede5f3a06738e8986c8de4ff505,2020-02-21T20:35:11.513000
CVE-2019-6195,0,0,b8ca041cf524a8af2c264b56ac34b349c13f470cc74fcc154488e5c74e7c9b20,2020-03-04T18:26:14.687000
CVE-2019-6196,0,0,4e909cb41ad592ca4f9d4234fb8effc0e79b826acdde1c26c8be3b2a71ed819a,2020-06-22T15:12:23.177000
CVE-2019-6197,0,0,109a6d05896ddd6e083690d3bbf9e6bceca5319b863a567dd16dc5646e4325d0,2024-08-01T12:42:36.933000
CVE-2019-6198,0,0,8f2e90b247f49341e94f300e13cdc77413fbd473b1e691c6e70a8c99f0554408,2024-08-01T12:42:36.933000
CVE-2019-6197,0,1,afd32a81bda2e4934b327ce773753165732cf7e314afca7ea45e7c3d6d90cd72,2024-08-13T15:06:57.167000
CVE-2019-6198,0,1,9f56ac4c2fac6f22df9934bbbb003d0041fbd1cda6e7135e8772dc6f6ea840e9,2024-08-13T15:07:36.843000
CVE-2019-6200,0,0,dc5aae0492d24fa91b4536b3552981c383b9d63f882441062844dbbfff411875,2019-03-06T13:28:02.637000
CVE-2019-6201,0,0,6886bf3befefe8be6891d8a439f88c625009f9073fcc0b27ce550b3121034599,2020-08-24T17:37:01.140000
CVE-2019-6202,0,0,657c4129d3c19fe26b6472cba4a044c11a1227aa706b62bc264b8678126b92c7,2019-03-06T14:10:11.387000
@ -200698,7 +200698,7 @@ CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f2
CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000
CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000
CVE-2022-33166,0,0,e85541c384b746b96b9d33eb0263e975b828602e7416a357919e72b62444ef10,2023-06-21T01:22:50.790000
CVE-2022-33167,0,0,eaa382e0d0b569b110b838afbd019a38dc92fe0e3970d74e0dbd643e48303a41,2024-07-31T12:57:02.300000
CVE-2022-33167,0,1,18d3940f4b3a033b2683470794a015707f9c8159d307d4487abd40d54dc300d2,2024-08-13T14:29:30.387000
CVE-2022-33168,0,0,d8fdb94492ba6489154f8aca9c0eecd94de3711393c324c6e4d851bce05e2b6f,2023-06-21T01:21:46.097000
CVE-2022-33169,0,0,cfc3df51be78adce6bbadea63b270a04fdd7dbca24937beb040dac0cf32cf08d,2022-08-05T03:33:42.300000
CVE-2022-3317,0,0,88f73658b7867db677c6a97ed0d6c5ff67cd67599f695f80a21307846e2cb628,2023-08-08T14:22:24.967000
@ -202793,7 +202793,7 @@ CVE-2022-35914,0,0,ab61ad9a74db4a971f1200a3bfc23914d0ddc6a81c657bdaba834c9abe706
CVE-2022-35915,0,0,de4fbf25711d5342c0392442284193090edffe1a9795b37b9a2fd785fd305665,2023-07-21T20:48:55.340000
CVE-2022-35916,0,0,a7838cfadb3188dc6c460073145cd175fa1116793ee15e870d7f1af0d849bfab,2022-12-06T19:51:44.790000
CVE-2022-35917,0,0,354ffb13cf8a439f33efe96c96950ac12cfd8f2c5e41a170c4c5ec778449bbd1,2023-05-16T11:00:41.427000
CVE-2022-35918,0,1,713b4659d5608c193c90ed812958f9b37deda3c80d133429f3108ef2974ebe8d,2024-08-13T12:51:00.147000
CVE-2022-35918,0,0,713b4659d5608c193c90ed812958f9b37deda3c80d133429f3108ef2974ebe8d,2024-08-13T12:51:00.147000
CVE-2022-35919,0,0,0f1e4dfb8fdb7245a36164cc98eb7a0ed7e8bd31fdaaa33e5ddfd80b96368be2,2023-10-10T17:15:10.940000
CVE-2022-3592,0,0,81ba521d76b43e15e97007326d1f7873dd03af6bc8c822817c2f00d935df0582,2023-09-17T09:15:11.483000
CVE-2022-35920,0,0,1c1813a9d0398a1fb5b4c49376e7476a058f5190680d2a7a0f16c0c336269989,2022-08-10T15:16:29.100000
@ -204727,7 +204727,7 @@ CVE-2022-38379,0,0,9eb70de0c72565c49201ab1fc48e6de31cbb23bd0ef17c431d4cd96f5e78e
CVE-2022-3838,0,0,b6c87f6371b3c42529104fa7683905834b7f4d26db23a4d8470e1e7da69bdcdb,2023-11-07T03:51:51.887000
CVE-2022-38380,0,0,bd883f9c774317159de2534f7103c0f6276317266728ea8b96d8dc126654e307,2022-11-04T14:56:46.817000
CVE-2022-38381,0,0,33ab62a56155391eb2d41b3ba9666f38dda60cd0a3cd9ef1e728baa24c1b8bac,2022-11-04T15:03:40.800000
CVE-2022-38382,0,1,2785873c728d42d322e825bd3b8d8f7bf6954b65c86015ec9b67a8d6359b9015,2024-08-13T12:58:25.437000
CVE-2022-38382,0,0,2785873c728d42d322e825bd3b8d8f7bf6954b65c86015ec9b67a8d6359b9015,2024-08-13T12:58:25.437000
CVE-2022-38383,0,0,c6f707ee147e1c14c9059720db840b81389d2405c75180fb0f2c0e4d4d08569f,2024-08-01T17:57:30.093000
CVE-2022-38385,0,0,e5ce73aa67e344471446b9267cebeab2bedbacce8ae377f39c844e85d6dedb4e,2023-11-07T03:50:07.243000
CVE-2022-38386,0,0,cd5b6a6598df693531015e8583f683aad3b24e500fbcaa6ba22ce0152abd819c,2024-05-01T19:50:25.633000
@ -205850,7 +205850,7 @@ CVE-2022-4001,0,0,39e00833890a7e901d0618677cbe7c015974d8ce8b3fdf8bf76b065f6484f8
CVE-2022-40010,0,0,e4ca794be921efc2a54ccc228989c9f920859f75c1b81f110a445bfe4d43d096,2023-07-03T19:22:31.680000
CVE-2022-40011,0,0,e0a7836f1f6caf5aaa0d1e732024ed4ec13801bc1a9feee6d639fca30c8c0a6d,2022-12-31T02:46:55.660000
CVE-2022-40016,0,0,4293ce2e94fa998b63d2973615f26a794c4e99e338b5386d7fd92fabc930a9b4,2023-02-24T18:00:30.037000
CVE-2022-4002,0,0,75c0f2013fec27b05b5b97b366f295720c9bf99041fd3477b78c9b67389d1f94,2024-08-01T12:42:36.933000
CVE-2022-4002,0,1,0cae3894490719187d0709e5650029ea9e416e14cd234f99092e3211958c7cc5,2024-08-13T15:23:51.097000
CVE-2022-40021,0,0,55495082a7e8fc42c46524fdc4cee33425e125ba7b8e79f799714cd824fe1e66,2023-03-01T13:25:18.070000
CVE-2022-40022,0,0,359622a2487ae7d5c9d1eb92d527a2b82b1805cff5f50680a87e6c0cbf3db6c7,2023-06-14T07:15:08.870000
CVE-2022-40023,0,0,317fae2e5472d2e61e852b0d952fabbaf592f8f971a366ffa8994d62e922648d,2023-08-08T14:22:24.967000
@ -205858,7 +205858,7 @@ CVE-2022-40026,0,0,52559a29a375df8685cfac6399fe291a8d354c1ff8e84d0a4321b0a4e9fdf
CVE-2022-40027,0,0,eff062cfff51df7f2d813d05e3dca5f0765df4a5be02cb57c50281f02478e582,2022-09-22T16:14:04.963000
CVE-2022-40028,0,0,280b1f9db19790d0026a8471ba9b82c539c1fbe37ff9db98ad39fcc7de98c4ea,2022-09-22T16:13:20.320000
CVE-2022-40029,0,0,f53cea960ac0734496cceb5b801cdeb46b65691454ac6da85ea7731bc20047c4,2022-09-22T16:12:30.937000
CVE-2022-4003,0,0,f7964d7defcd3d42b2db8b58b9ef6856b9348b3c7bb8eac93323f0475dabdb49,2024-08-01T12:42:36.933000
CVE-2022-4003,0,1,13e07d31a356e4db8560a7e4ca1d956b13545f5f4f6192f3350053f8fa104540,2024-08-13T15:23:48.580000
CVE-2022-40030,0,0,aa0bde9d2db758f20e54811a13859d5076699b2a7600b82157dce996cc74adcb,2022-09-22T16:11:05.273000
CVE-2022-40032,0,0,854b9692f1f37c61f06e3e33a5e50fef722063a372572d033a137af029be6682,2023-04-06T17:15:09.507000
CVE-2022-40034,0,0,298fbec15b4b696efb3008c20dd71d86f5fe2e6ce3c5512bf5bea0d9eef6af57,2023-02-01T02:41:40.263000
@ -213927,7 +213927,7 @@ CVE-2023-1573,0,0,7939398951a41cde776a82a2882d5d2fec4e3bcfafab8a6bab93479600d715
CVE-2023-1574,0,0,bb4ada258e527262ec9c1e564ff1ea3eabd2509806f1a474326cc753548f7d1f,2023-11-07T04:04:10.400000
CVE-2023-1575,0,0,f811fd520e2db6c6e57e3d4509f960ffa8a39e7841c7bdfcaeab3867649bffdd,2023-11-07T04:04:10.567000
CVE-2023-1576,0,0,ef2f2d7ef5f003955027a9696c660724e0afac7b8354b8ee997b1c99faa02c4b,2023-11-07T04:04:10.800000
CVE-2023-1577,0,0,360c95020e55b05c0f0a0fea18524acd8d08c610cbf7b565dc5ed8f6f29e2333,2024-08-01T12:42:36.933000
CVE-2023-1577,0,1,85c1b7c3498bfa7e0f395c31ef5c2126a933641f5ab88940e096f1c40598bbf8,2024-08-13T15:12:55.303000
CVE-2023-1578,0,0,6263cebcfb388a666b983b865652ac01e5982368805925e75cfd9baf8b0148b0,2023-03-24T20:59:40.380000
CVE-2023-1579,0,0,8a5351cdb9caa5543c406229031bc98908bc9da8ce9c96b58cbfd6b128ff7404,2023-11-07T04:04:10.970000
CVE-2023-1580,0,0,45d0177157acfe9e834e03f4bd4c6174aac525767ec0c54d75bffa92c7ddabcb,2023-11-07T04:04:11.487000
@ -219545,8 +219545,8 @@ CVE-2023-26283,0,0,e2064453ef2858146e69fe81df96344f4104450fa7f97beea6cf1e61b0996
CVE-2023-26284,0,0,073b510f28598cf859c51864d3d5cb28a2670fa73a47d6359231a92a2ad99632,2023-11-07T04:09:33.223000
CVE-2023-26285,0,0,69e6dc88fcd70dc78045a5db1289708f9ca9a570c9301acb9ca5f4642eea2a04,2023-05-11T22:53:08.387000
CVE-2023-26286,0,0,cab2929777eabe42a9ecf50972c3c56d1004ade86317ce69ed1a003338ca9299,2023-05-12T05:15:17.507000
CVE-2023-26288,0,0,a7b8c27184f2e26e607c00aba540e6c90f49a1ccaab172702a8f86417ee1c514,2024-07-31T12:57:02.300000
CVE-2023-26289,0,0,332bc3e1728fadbb6b7d31a33e639ece4a7b14ca5b346b8e7c9f2d688d20386d,2024-07-31T12:57:02.300000
CVE-2023-26288,0,1,f2869e76227de564a0113af6c6ad87a6c5e6eaffb10694a55ca8f76ee4105c1c,2024-08-13T14:23:53.863000
CVE-2023-26289,0,1,7ef812ddba8802c101d5db1dc9521b204d1beac1bd32c5c94cde45d729720d74,2024-08-13T14:26:52.933000
CVE-2023-2629,0,0,21397e525ac41df26b8c18bc0045d1b7263f8621bfadf0b1224b0c2fbfedb9fb,2023-05-31T14:02:09.597000
CVE-2023-26290,0,0,b45b134fbb8059d4d4a1ebae8fcfa511a842f92cfbbd7470a968c4d99358ab04,2023-11-07T04:09:33.393000
CVE-2023-26291,0,0,06cc66dbb2bc40c140a9d706389f20fb4cb58bd9ff5dd353e4433818c6edbc38,2023-11-07T04:09:33.470000
@ -220422,7 +220422,7 @@ CVE-2023-27490,0,0,ca3437415bf8331660796a9240085567a0fbaedc8c65bf8612e4bcba39c33
CVE-2023-27491,0,0,2a7ea7473c4037abaf2a145188b4330526de548be6c26518e312c6e33f7810f0,2023-04-11T14:43:10.780000
CVE-2023-27492,0,0,9eb542046bdb9290a0236a241103175e3e601c5cad76bec1cc2db619ff723480,2023-11-07T04:09:57.800000
CVE-2023-27493,0,0,22df22e98decf2a70897ce04d49101ed3039857ce785a94a23c35ec2c4f361f2,2023-04-11T14:44:07.990000
CVE-2023-27494,0,1,4d1866015ca21c59c2ba7808796573f73c1f9a3a96d7887fe610bc0fc9a71b92,2024-08-13T12:51:00.147000
CVE-2023-27494,0,0,4d1866015ca21c59c2ba7808796573f73c1f9a3a96d7887fe610bc0fc9a71b92,2024-08-13T12:51:00.147000
CVE-2023-27495,0,0,4b48503a1b9b56ebcb5f76464654f3a298ab17c3912749dc3298d91d4f6c8785,2023-05-02T02:07:27.720000
CVE-2023-27496,0,0,9f364590cb1803b580beac3d290ff6dec8fe21acca1220eda420d89c4a075904,2023-11-07T04:09:58
CVE-2023-27497,0,0,b358b18c9043c43bec925c3af04e8e9325635d280fb532bf26824eaa9dcc015c,2023-04-18T16:11:16.100000
@ -228356,7 +228356,7 @@ CVE-2023-37998,0,0,b235ebc4dfb9ccf88c1ccca0a67b26b1e77751f80e2e1faaef2f3a2c5008f
CVE-2023-37999,0,0,0ffe5370e8d38da9bb953723ad926e1f3493ef3ca0779b6a9480408ff8b47933,2024-05-17T18:36:05.263000
CVE-2023-3800,0,0,9adb1d1466c7c08548f0b20099e401daef224cd81c97907d28a5225c2b6e13a0,2024-05-17T02:27:49.107000
CVE-2023-38000,0,0,9ba3b6ec3d4ae6f319e5b267a1938b9242dfbd7353650738c1d9f78858e009da,2023-10-16T17:04:06.637000
CVE-2023-38001,0,0,e4569a6f272b2d72f239fb54f7412fab5c0d6f490e2ae6f809788712aa166f86,2024-07-31T12:57:02.300000
CVE-2023-38001,0,1,2e442ef5d1f9ada2569bffe28a8811d3833d9e464b2a836cb72bac6db743da80,2024-08-13T14:24:53.523000
CVE-2023-38002,0,0,1540466a828ca09fbbbfd3a7d1fa6f341816e6e7a4b7eb520ebe82fd4c1ac11f,2024-04-30T17:52:35.057000
CVE-2023-38003,0,0,4ddd805b10542d9494e91de28e072619549d2912a77654914b8456fbaea47381,2024-01-19T16:15:09.013000
CVE-2023-3801,0,0,138ee77b03ceaffda7a612b3ad2047ee632ca7ad988ceac5a51bc864960549cf,2024-05-17T02:27:49.220000
@ -231449,7 +231449,7 @@ CVE-2023-4188,0,0,02bdd9b28d14019797b80b4cc5df451386a82a80f733da8bea1956088fab9e
CVE-2023-41880,0,0,7ed910c9d4f01b1902f35663b6042b31054ac64abf6c55d1b7e28837c12897a6,2023-09-21T16:17:54.780000
CVE-2023-41881,0,0,0bdbb4f3531382d9a4a926ee8a16bf05d17c5e6a810b992f2ef95026448df259,2023-10-18T02:24:31.603000
CVE-2023-41882,0,0,ca3e1ca4dc86a7e49b5a7bd3f247f3c0bf7f2e72ed3f12d8d793c605a48572c9,2023-10-18T02:27:00.507000
CVE-2023-41884,0,1,d751620e0ef9d429211e58f54cbece96ef665f16e0a19f066b68e780d9e654d0,2024-08-13T12:58:25.437000
CVE-2023-41884,0,0,d751620e0ef9d429211e58f54cbece96ef665f16e0a19f066b68e780d9e654d0,2024-08-13T12:58:25.437000
CVE-2023-41885,0,0,be107ca196d4b0abaab8f683443a7a481225cf6a409999379cc95fd0cbdc426b,2023-09-15T19:45:09.877000
CVE-2023-41886,0,0,9c4b962bb1496334638c310840b0c680755f73e99e64df07e0a31509d7e9d302,2023-09-20T19:18:08.340000
CVE-2023-41887,0,0,3cc3e1f4502c4acc6094dc4d649ae81deed3e39e18e709776293574c7db7e9e9,2023-09-20T19:20:19.920000
@ -235658,7 +235658,7 @@ CVE-2023-4816,0,0,90b20067076355462cea63668d7d1f70b5bce794b9c85a4b5247192748c982
CVE-2023-48161,0,0,5f227f88224a25f0981451dc3f6576e18f3ab0aeb112343704f86ed43d2a330d,2023-11-29T18:48:53.683000
CVE-2023-48166,0,0,64c113268e4ebd6cc8fb3ea7fc24c3bce04e60808f1e16bf9f7c84cc706bd030,2024-01-22T19:21:48.260000
CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d15,2023-10-05T00:55:56.257000
CVE-2023-48171,0,1,3b90eeb3bfcb911a9d9481be5562efc21e8c49d6ff8c2937232d65d92b3663c2,2024-08-13T12:58:25.437000
CVE-2023-48171,0,0,3b90eeb3bfcb911a9d9481be5562efc21e8c49d6ff8c2937232d65d92b3663c2,2024-08-13T12:58:25.437000
CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000
CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000
CVE-2023-4818,0,0,c99fef0e43e54a7e397a1f19b3703f45e3876ee2d790b03b384938f06570625f,2024-01-19T16:35:49.683000
@ -237505,7 +237505,7 @@ CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9
CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000
CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000
CVE-2023-50808,0,0,fdda8b2a0cfebb77f7058e23eb97529dc58109b1d79d83d871b7079f7d6bdb52,2024-02-13T18:23:02.393000
CVE-2023-50809,0,0,c22d5d6a64b0f7146b83bbce68d802394ff6fde1ce54f8bfa0f84597869fedfe,2024-08-12T13:41:36.517000
CVE-2023-50809,0,1,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000
CVE-2023-5081,0,0,7787e17d39eb5438b4b32a6bbefdad7b23a6aea7d5f6a904017d2dc838411573,2024-01-26T16:02:59.793000
CVE-2023-50810,0,0,6492bdf75c2b301fa0f50100d35e9e142bc6ab9b4353ae99c6ec739a1c5fa54b,2024-08-12T13:41:36.517000
CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000
@ -240724,7 +240724,7 @@ CVE-2023-7062,0,0,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c
CVE-2023-7063,0,0,a70eaf68fc7417ce794998ee774eb52a272a3335bd687053e59996226f95eaaa,2024-01-30T23:02:10.287000
CVE-2023-7064,0,0,893764021ac36e56fb425978b9c0fe444e7d7382c4148ca0b308b12be70459a1,2024-05-02T18:00:37.360000
CVE-2023-7065,0,0,56ad85a9f778da0dacae256a17e9f54a48bb66bb1d9f0de63c0c37a650069950,2024-05-06T12:44:56.377000
CVE-2023-7066,0,1,181b0e2db4bef7040a5ad2177e3a4f250cd2ec237c266777a3a5b0286224d52b,2024-08-13T12:58:25.437000
CVE-2023-7066,0,0,181b0e2db4bef7040a5ad2177e3a4f250cd2ec237c266777a3a5b0286224d52b,2024-08-13T12:58:25.437000
CVE-2023-7067,0,0,d251fedac3953c556b2fae675b30174d6cef931689e18f0c7f5dabce8da9f8a8,2024-05-02T18:00:37.360000
CVE-2023-7068,0,0,7cd804daabb13f07758b06c47cadf4e49acc509b298d07d52e072e7d9588adca,2024-01-09T20:19:48.597000
CVE-2023-7069,0,0,348519c1ee085e4d109b6f90b6ff63f6d5a582ce97e3f91d1eb069ee9d1eaaa4,2024-02-07T16:28:40.250000
@ -244498,7 +244498,7 @@ CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
CVE-2024-22588,0,0,8bc5ffa2d82b0a2b5c7a4f7b05618c8edfe047109115070d834077f2cb63d9ca,2024-05-24T18:09:20.027000
CVE-2024-2259,0,1,14d7a6b9721c26155e4e21edfbbb41ab963b75fcc50cc74d9ca4a181311a82a6,2024-08-13T12:58:25.437000
CVE-2024-2259,0,0,14d7a6b9721c26155e4e21edfbbb41ab963b75fcc50cc74d9ca4a181311a82a6,2024-08-13T12:58:25.437000
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
CVE-2024-22592,0,0,268d0bb3e8d404d0087cf60d681467b452c81f0d7e52d485caa72c08138c2725,2024-01-20T18:49:41.750000
@ -245251,7 +245251,7 @@ CVE-2024-23783,0,0,2c0409c271891c8b08fc0b86218ac68ee6ac63f922ef98f9f9226ccdf7685
CVE-2024-23784,0,0,4ead0c5591846e9c87c142cd846bdd72001bf8674c58560c0ebdae712e566e4b,2024-02-14T13:59:35.580000
CVE-2024-23785,0,0,b583a59740121c714014d2b1b574a387569e6a96d1cba1ed447b99f7aac2879a,2024-02-14T13:59:35.580000
CVE-2024-23786,0,0,a4843821edc7301dc3896b1dc41942f9a7cad1c9811616d65b63499b1903e8f5,2024-02-14T13:59:35.580000
CVE-2024-23787,0,0,1cebbe4231b42e35699eed5d7dba409232d884bafafb6cdea00ae172adf3e7de,2024-02-14T13:59:35.580000
CVE-2024-23787,0,1,7a8ddce6195bf931c799fcf4083a75cf1b9842febd9c3da44a75515daf822e08,2024-08-13T14:35:10.747000
CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000
CVE-2024-23789,0,0,eb24c8fd06c4dc0c79533f62c1520b9bd32813c0e2c7e43d74bbd067c1f01e08,2024-02-14T13:59:35.580000
CVE-2024-2379,0,0,0712844accba64ea814c5017a1af61ea7caadbf030deed7db72ba68c9fce60bc,2024-07-30T02:15:05.397000
@ -247801,7 +247801,7 @@ CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e
CVE-2024-27351,0,0,5a36bd6e7f8b98dc30dfca7d22b6d4573152d80044f0f10dfc41d8abe078fc7e,2024-07-03T01:50:33.137000
CVE-2024-27353,0,0,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900afec8,2024-07-03T01:50:33.967000
CVE-2024-27354,0,0,d82002382bb8c882f81f7c5f3df1132e97e156b8b32d6b2112503b29eab24b21,2024-08-01T13:48:23.907000
CVE-2024-27355,0,0,cbfd71f3fb28d8933e5fd0b89a2619127b39a508cc85ac5bc00d2b3fcc2d06dd,2024-03-21T02:52:19.970000
CVE-2024-27355,0,1,8551a6434afc8c47e636ee231a79cbded85fb3c87c4c313040d69bae1c506157,2024-08-13T14:35:13.783000
CVE-2024-27356,0,0,5e1e6b4a87a348e93c4f8d15c6264439e6f20147f41074ef597440f312cdad1d,2024-08-07T18:35:02.437000
CVE-2024-27357,0,0,6ee89ff91325c350d71ee2f1e2989c0a7f53dc5f1e7749e13c0b8f7a99e8663e,2024-08-01T13:48:24.737000
CVE-2024-27358,0,0,5e34f9802b6658af7911918b28409df8cc6ee23a8e8f5cc0b36cd181238f67f8,2024-07-29T14:12:08.783000
@ -247886,7 +247886,7 @@ CVE-2024-27439,0,0,812b79355c05b1839f0b5adf30fc93a3b50c4e89eeb5494b84c7e9f25e1fc
CVE-2024-2744,0,0,188126b761d1adc13d3573db2ecaebf3ad9dc6b00f329483cd98111bb221e3a5,2024-05-17T18:36:05.263000
CVE-2024-27440,0,0,222fe401370c5e6b38f7e38b434f6e7cc6adedc4a2417abf87261721e80970d8,2024-08-05T14:35:06.543000
CVE-2024-27441,0,0,8627ee176bbd8db9047f0ac2824f85227251736cca8356f59d7164883e7165ed,2024-03-13T15:15:52.083000
CVE-2024-27442,0,0,b23a32a5b599bc15cd7e40b8740995435dcc9d36f43c74bd3b1c38fc6874bedc,2024-08-12T18:57:29.247000
CVE-2024-27442,0,1,01ba9da507a8da6b3628686f94f9e3fbd5e9f8529984a07aae1809c4228953a9,2024-08-13T15:35:02.263000
CVE-2024-27443,0,0,fd5ca632d2fae3363b8de30d4df2c7ed4a3d1ae6e0341dcce2b3340ad6a731c9,2024-08-12T18:57:29.247000
CVE-2024-27444,0,0,54cb997d6d9cda9b1d04431678fffc2ca7174de8974a9b13ccc3a98ef52117ae,2024-08-06T16:35:07.500000
CVE-2024-27447,0,0,3b7773fd2d03c5e4f17776fc3b7436eb3cc739bfd15835b19977b12318864384,2024-08-05T16:35:07.727000
@ -248372,7 +248372,7 @@ CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bd
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
CVE-2024-28166,0,1,458f27950df8f0e0dd31b765d72deb518af919b2845725b404c07ee4a505eb2a,2024-08-13T12:58:25.437000
CVE-2024-28166,0,0,458f27950df8f0e0dd31b765d72deb518af919b2845725b404c07ee4a505eb2a,2024-08-13T12:58:25.437000
CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000
CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000
CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000
@ -248979,7 +248979,7 @@ CVE-2024-29143,0,0,ed69b2d9180032c6bcf01e4d99bd2a1b22e1518c20ff0cda172d21a651ffd
CVE-2024-29149,0,0,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000
CVE-2024-2915,0,0,808373913d708061ffb2844243b7a7451d06a7a71f2d96bab824bae64e6e845d,2024-08-06T16:35:11.173000
CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000
CVE-2024-29151,0,0,cdb128027413297a9064be468654de5e28115491fa3df0b557997bb5f608af6f,2024-03-18T12:38:25.490000
CVE-2024-29151,0,1,41273283144e72ced9aa4305d0684c62c423c9d1765bb649f90e55578f8c6464,2024-08-13T15:35:06.993000
CVE-2024-29152,0,0,6494eb520227446d6d245c5a4d673a99692904bc67e1a2221cdb6494798efeb7,2024-06-25T20:15:11.353000
CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000
CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c77b,2024-03-18T12:38:25.490000
@ -250057,7 +250057,7 @@ CVE-2024-30613,0,0,ec7980af57ce21f0caa7be201315bcd79301675671829a9c0350efcb6a7c5
CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000
CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000
CVE-2024-30621,0,0,f1fe1ced472b52b5106f4bb104d36eea881b5ba60acb8d11a8d4b770ef9cd4b9,2024-04-08T22:48:53.950000
CVE-2024-30622,0,0,39f3e190be508e988271a0de2e47f955a00ce78f04194117f88d022070c82f32,2024-03-29T13:28:22.880000
CVE-2024-30622,0,1,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
@ -250758,7 +250758,7 @@ CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f
CVE-2024-31804,0,0,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000
CVE-2024-31805,0,0,4b7b61f3abeb4068501d3afa621c8120c12d0bdb6f8c1629f0f6ba829ac02f8f,2024-04-08T18:48:40.217000
CVE-2024-31806,0,0,0d23d3a16c910921a17f301055f98f9b17ff477b46facd9fbf2663ed7a6ab3c1,2024-08-01T13:51:09.630000
CVE-2024-31807,0,0,ea04fa5dc5969cf90a606fd0ba3180cd04c064ccb96f864a8d73af8533d6a049,2024-04-08T18:48:40.217000
CVE-2024-31807,0,1,f1a9413060f21c220e1cb5e48db6f606b506243c0f13c9e1b8f8ac68e26c4bf4,2024-08-13T15:35:10.810000
CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda829f7,2024-08-01T13:51:09.823000
CVE-2024-31809,0,0,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000
CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000
@ -251700,9 +251700,9 @@ CVE-2024-3300,0,0,5ed420ceec7dd67c7a8c90e2661f4216c9dcb91251ff120ca64b2c4babcfd8
CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528578,2024-05-14T19:17:55.627000
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
CVE-2024-33003,0,1,dd32f9e2b017d1d2778c509fd270213d8b81db7f81f9b2a633e19aa3a7f490d2,2024-08-13T12:58:25.437000
CVE-2024-33003,0,0,dd32f9e2b017d1d2778c509fd270213d8b81db7f81f9b2a633e19aa3a7f490d2,2024-08-13T12:58:25.437000
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
CVE-2024-33005,0,1,45577f2751db7520286884c554d276bf239f32d659b0b85f5b8941be8dbdeea8,2024-08-13T12:58:25.437000
CVE-2024-33005,0,0,45577f2751db7520286884c554d276bf239f32d659b0b85f5b8941be8dbdeea8,2024-08-13T12:58:25.437000
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000
@ -252968,7 +252968,7 @@ CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9
CVE-2024-35116,0,0,7ab540c112b9010ca6d0b63139ef05bf7c8cdbd0e3d9c37e6db26ca5392b2ae4,2024-07-01T12:37:24.220000
CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
CVE-2024-35124,1,1,eebade4e344820896ada54a221712227782e55a7cb2e2d641368b18349f7b717,2024-08-13T12:58:25.437000
CVE-2024-35124,0,0,eebade4e344820896ada54a221712227782e55a7cb2e2d641368b18349f7b717,2024-08-13T12:58:25.437000
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
@ -253385,7 +253385,7 @@ CVE-2024-35771,0,0,da094131a898160f7d7534ebd658d9f6c0a47dcb5974f75d3d7653ce22b76
CVE-2024-35772,0,0,67c04a52c2580bba2b2143b8a9e3a147188afdddd51ee8f46047ed6b048599a3,2024-06-24T19:26:14.460000
CVE-2024-35773,0,0,edf644c32dc0e69969a2e651ff67d0bafccf9621547e03428fff35ea895725bb,2024-07-12T16:34:58.687000
CVE-2024-35774,0,0,eade8c8b3f01bcf230b9a96162b1334f062933da0f10549431055a0386eca873,2024-06-24T18:43:57.633000
CVE-2024-35775,0,1,4461e177c0224a573cd5ada523e12d44b88d8d62e4ec7cdb59c46b6177e897e8,2024-08-13T12:58:25.437000
CVE-2024-35775,0,0,4461e177c0224a573cd5ada523e12d44b88d8d62e4ec7cdb59c46b6177e897e8,2024-08-13T12:58:25.437000
CVE-2024-35776,0,0,e4d3227671df814d3a4852e5c0b87fcdc40bc918afeafb90df6afc52f9dfd1c7,2024-06-24T18:49:09.500000
CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000
CVE-2024-35778,0,0,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000
@ -253919,7 +253919,7 @@ CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b
CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
CVE-2024-36396,0,0,6296e5e5abad58fd92610447f6d594c40593fdd339b1a18f1de671640ea0ec15,2024-08-07T17:40:12.830000
CVE-2024-36397,0,0,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
CVE-2024-36398,0,1,27729f15935e4ab5e4407082ad0cce419a8fb386c8425bf4da258593e2893a14,2024-08-13T12:58:25.437000
CVE-2024-36398,0,0,27729f15935e4ab5e4407082ad0cce419a8fb386c8425bf4da258593e2893a14,2024-08-13T12:58:25.437000
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
CVE-2024-3640,0,0,634a3a61b60e4b6447ed9849adb2e8bddc05031ce5f2169a17d54b538992fc1b,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,47a38d468bfeafda14a4695dfbafb860220a66750f81a96f50551b5447b95aa6,2024-06-10T19:39:21.660000
@ -254356,7 +254356,7 @@ CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec
CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000
CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000
CVE-2024-37127,0,0,80266d7603ba84619cf83925e2bd696016d21affd2f6df9fc168f7e6704b5a73,2024-07-31T12:57:02.300000
CVE-2024-37129,0,0,f8926f8685bed687aa68c5f4ce1ca396bdbbe48ef35c808c3281a64c9d77dd67,2024-07-31T12:57:02.300000
CVE-2024-37129,0,1,1bda6b021f1f7698674c595a8a84e9d380a54f5551f6ad0383f5d9c8c50d327f,2024-08-13T15:26:46.890000
CVE-2024-37130,0,0,cbd9dfc340def95265d907da6835c0ba032c0f95252bb398ce7a3b8c9a6f4189,2024-06-11T13:54:12.057000
CVE-2024-37131,0,0,1b53fe6698cfc8662ae4f6c0ed3f87f760fe2128440fb0619b7f2633753262fb,2024-06-13T18:35:19.777000
CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbaca95,2024-07-03T18:01:07.500000
@ -254477,7 +254477,7 @@ CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e786480
CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000
CVE-2024-37283,0,0,43778d29654f3a784f1d881c1b776f9f47eb39a9a44700b37d8fb12a22882627,2024-08-12T13:41:36.517000
CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14628,2024-08-05T12:41:45.957000
CVE-2024-37287,1,1,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000
CVE-2024-37287,0,0,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
CVE-2024-37293,0,0,efa095b0cfa3ac59ab9798514bc41970933da504bf684c09bb20230e55ad7e3a,2024-06-13T18:36:09.013000
@ -254703,7 +254703,7 @@ CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74
CVE-2024-37632,0,0,d01b52b8e66490156eb3a16ca33b4814211737a83815b462a53e59e26de8e387,2024-08-07T16:43:37.570000
CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000
CVE-2024-37634,0,0,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000
CVE-2024-37635,0,0,94b9a9eaaf9f4f0430c4a088c9016123755d05c131d9f0e2d65bb40f9febfd91,2024-08-07T16:47:25.073000
CVE-2024-37635,0,1,bc407e83f05b7c8f9bd8802eae4a82a8e6966063def27bcc1e49acc27f521f01,2024-08-13T15:35:11.883000
CVE-2024-37637,0,0,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000
CVE-2024-37639,0,0,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000
CVE-2024-3764,0,0,db341581177558129620666288ffbac018878c49ee9401bc4b7ea0ca7e6fd397,2024-08-01T21:15:32.793000
@ -254838,15 +254838,15 @@ CVE-2024-3792,0,0,b2d7f7e579eff1bf3cc457c41f5782185342411a77aac1022f0e4393ef1fd1
CVE-2024-37920,0,0,841ece9aa1ea243835cd263b19315e4e373408e20d05486ce82b531c5a2511e0,2024-07-22T13:00:31.330000
CVE-2024-37922,0,0,2f4d0819be87ffb0bb4af4138b7ceba5a758a2030a859f8658eef95358ab0782,2024-07-22T13:00:31.330000
CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000
CVE-2024-37924,0,1,e05433fc709b37508e94a979863f088e86329405c0ba7992beb3eda7701321af,2024-08-13T12:58:25.437000
CVE-2024-37924,0,0,e05433fc709b37508e94a979863f088e86329405c0ba7992beb3eda7701321af,2024-08-13T12:58:25.437000
CVE-2024-37927,0,0,560584f6e7ef315723501d3c62881a4e0c9b3ad1204b52ebcac93863b05e014f,2024-07-12T16:34:58.687000
CVE-2024-37928,0,0,d7c23cfa28358062117e75a096fd1b2a1412e40b95d290b44dda94129c8901b3,2024-07-12T16:34:58.687000
CVE-2024-3793,0,0,45180ff35ea2c7285cdd371de1244c7a4424d1261f14c1bf7f3ac3169f3ba4b9,2024-05-14T16:11:39.510000
CVE-2024-37930,0,1,cbe1ca2f4e81dccdfaf7fff22555d3553037284f1beae7ae93fad01af7748a5a,2024-08-13T12:58:25.437000
CVE-2024-37930,0,0,cbe1ca2f4e81dccdfaf7fff22555d3553037284f1beae7ae93fad01af7748a5a,2024-08-13T12:58:25.437000
CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000
CVE-2024-37933,0,0,89aadc1bfbd864beebf6ce61583dd3e0e43426698e502bc5c6a9b9f602b29135,2024-07-12T16:34:58.687000
CVE-2024-37934,0,0,20d80f75e222e93cd8bf312483db42a7dd2efce13206dab8e3080dada5a4be9e,2024-07-09T18:19:14.047000
CVE-2024-37935,0,1,87ab16224963b2ffcaa184d23b7129376f4f47dc7928afcf629f5debe7a0db5b,2024-08-13T12:58:25.437000
CVE-2024-37935,0,0,87ab16224963b2ffcaa184d23b7129376f4f47dc7928afcf629f5debe7a0db5b,2024-08-13T12:58:25.437000
CVE-2024-37936,0,0,70e5dbee812b290ecca86e6d5cbebf144efe57fbc385415862eb03c9a3bb1e50,2024-07-22T13:00:31.330000
CVE-2024-37938,0,0,7b3a6d6420f31bf37b355b942f855aefd8f1648c6acabb976e80a1736b113df5,2024-07-12T16:34:58.687000
CVE-2024-37939,0,0,1e975f14d60abc3972d891d3881ac6dad4a79e9e4d07ca7d20f27c798e79422a,2024-07-12T16:34:58.687000
@ -254996,7 +254996,7 @@ CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd
CVE-2024-38182,0,0,b4d26c4f4cbe1c2272cffdb42dee316497d9ebef820b6332d9e510a850c3591f,2024-08-02T04:17:24.853000
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
CVE-2024-38200,0,1,9c8cc66a1f50b75708742d46d8c50dc698049462a03889a12013758dd3bcaa00,2024-08-13T13:43:16.403000
CVE-2024-38200,0,0,9c8cc66a1f50b75708742d46d8c50dc698049462a03889a12013758dd3bcaa00,2024-08-13T13:43:16.403000
CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000
CVE-2024-38206,0,0,cb12af303c16bd7b14ab90d82849698a892f6215e2a01ea7e92b5cbb9057d49d,2024-08-12T18:33:38.273000
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
@ -255024,9 +255024,9 @@ CVE-2024-38282,0,0,0b84325e8423ee1d927b510486c46be47f1c2c84d1f4cca17c487d6f5ea39
CVE-2024-38283,0,0,797ece42e985c33b58c5d43ea734dda88927de464a1a03ca93cecae13e751b09,2024-06-13T18:35:19.777000
CVE-2024-38284,0,0,165d8c293dff7206e2957622c811a8e8219577c81f47e9f75916b28f253c3103,2024-06-13T18:35:19.777000
CVE-2024-38285,0,0,7e28442ebee8b34d71e5708e3d778f155bb5ea07375678fa14265f29cc1dda8d,2024-06-13T18:35:19.777000
CVE-2024-38287,0,1,f05b7fe0906459cf21ff7b461dcdceaa70975d18e173be2ad9f797e07b4a35d2,2024-08-13T13:34:22.057000
CVE-2024-38288,0,1,9625e03ff55ef3f55d7b160d3881cd5b2a0d9065388436159679245b127f8026,2024-08-13T13:25:45.940000
CVE-2024-38289,0,1,7a51444ea1dff38d99c02380eda64a7954072700dbb55d2148136165d941abe0,2024-08-13T13:28:13.263000
CVE-2024-38287,0,0,f05b7fe0906459cf21ff7b461dcdceaa70975d18e173be2ad9f797e07b4a35d2,2024-08-13T13:34:22.057000
CVE-2024-38288,0,0,9625e03ff55ef3f55d7b160d3881cd5b2a0d9065388436159679245b127f8026,2024-08-13T13:25:45.940000
CVE-2024-38289,0,0,7a51444ea1dff38d99c02380eda64a7954072700dbb55d2148136165d941abe0,2024-08-13T13:28:13.263000
CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c981597,2024-06-03T14:46:24.250000
CVE-2024-38293,0,0,2af5660de21ea537f089380c69d608dd10ea2321053bca42c4352602d7ee9678,2024-08-01T13:54:46.393000
CVE-2024-38294,0,0,f88948441f6418893f991fd0ef34dfd45f0e02ebcb8e39fd787f2f64385d53d8,2024-08-02T18:11:19.757000
@ -255147,8 +255147,8 @@ CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a3
CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000
CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000
CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000
CVE-2024-38501,1,1,5d05f0c312a291757c65cf104a7904891fb00cd19e32d000e69218e3766700c7,2024-08-13T13:15:12.130000
CVE-2024-38502,1,1,4fcf7bba62489040cb0aca50a60ccaeb7b00087535338eb5bca48b7737f6821b,2024-08-13T13:15:12.460000
CVE-2024-38501,0,0,5d05f0c312a291757c65cf104a7904891fb00cd19e32d000e69218e3766700c7,2024-08-13T13:15:12.130000
CVE-2024-38502,0,0,4fcf7bba62489040cb0aca50a60ccaeb7b00087535338eb5bca48b7737f6821b,2024-08-13T13:15:12.460000
CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000
CVE-2024-38504,0,0,4c5e9d4e31ce363d990483052f136d892b9e9d476c16b9ba9ffe4f7ab7d68bdb,2024-06-20T12:44:01.637000
CVE-2024-38505,0,0,b17f43381c815e52625008a26f98d511f617e1d606d0689fa471d4457a2ae811,2024-06-20T12:44:01.637000
@ -255325,7 +255325,7 @@ CVE-2024-38684,0,0,de2604bb564cc434d07df81940a8260c4b3d699e13c5c4b0afa4745c84869
CVE-2024-38685,0,0,59bac4b8404d77f8fc1c0cdc9fe4021b8e96d3d207cf1a68dc260c160fc894d5,2024-07-22T13:00:53.287000
CVE-2024-38686,0,0,ca8f4f25ca8d3ba06f67bdacb6029bd19890f07767fdf9ef77f98e4bafb70469,2024-07-22T13:00:53.287000
CVE-2024-38687,0,0,f0cff34686afd44d154a8ccd7570e1d62449845a805d2513aece2d14a15ffa23,2024-07-22T13:00:53.287000
CVE-2024-38688,0,1,b75089e930442ca5f1c1668b22bf60b59494df8ca4c258acf80924a542ea70e8,2024-08-13T12:58:25.437000
CVE-2024-38688,0,1,c66cce34d5489d314265d72bde4b15a74e154f1f779489c1765f47a816617839,2024-08-13T15:15:17.783000
CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000
CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000
CVE-2024-38692,0,0,fc33d68523c1b621e2e40da51c2b133dfc056e5efe69c93d78ca937f5e04fb48,2024-07-22T13:00:31.330000
@ -255333,7 +255333,7 @@ CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa0
CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000
CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000
CVE-2024-38698,0,0,1edde839f5f793082457812b7b588da594d6a461cdc498477c0986a7fe004fb1,2024-07-22T13:00:53.287000
CVE-2024-38699,0,1,2787d535945bc38e31ef9fac1487b68525e365e94e4cce66e3589caa09216e86,2024-08-13T12:58:25.437000
CVE-2024-38699,0,0,2787d535945bc38e31ef9fac1487b68525e365e94e4cce66e3589caa09216e86,2024-08-13T12:58:25.437000
CVE-2024-3870,0,0,0a94fe58f68a2a55a9a615e303c503c3189a8068ab169c2fe45504536e49912a,2024-05-02T18:00:37.360000
CVE-2024-38700,0,0,5e4bd50c4e7369161e2cd3ff2af0ba7e11eedddf0da3736808759ae69637e2f7,2024-07-12T16:34:58.687000
CVE-2024-38701,0,0,b514886e191b9c90792a71620990b9cd4dface8ab97ed8527ed77f16347cfe3e,2024-07-22T13:00:31.330000
@ -255356,7 +255356,7 @@ CVE-2024-3872,0,0,e0746b0ccf3c2bc5c1cf6b271b7bc58e10aa7c45ec1e77f360e4d291ead633
CVE-2024-38720,0,0,f9b8c8ed2efe93225496b04ed9fba739cb8ba9d99b25a127d2bb4233a5d4753d,2024-07-22T13:00:31.330000
CVE-2024-38722,0,0,ac4063575d52a48f994e5dc466d71dd1e5a91f3a1145c47a0fe2a10e4850fe33,2024-07-22T13:00:31.330000
CVE-2024-38723,0,0,c163e156ec3ebbc80fa4644640c2ef22e9b0f04e4301b0d8bf8152e210ebd688,2024-07-22T13:00:31.330000
CVE-2024-38724,0,1,af5886f9a9eb5e88a27772842f77bd8104fd67a2ec47397c8961fd602aa4e617,2024-08-13T12:58:25.437000
CVE-2024-38724,0,0,af5886f9a9eb5e88a27772842f77bd8104fd67a2ec47397c8961fd602aa4e617,2024-08-13T12:58:25.437000
CVE-2024-38725,0,0,7ebdb10d062cd40a3fc7776e923871f38820bab7217d8965a48109a6cbce5191,2024-07-22T13:00:31.330000
CVE-2024-38728,0,0,6f2a2ec6a9158917795eaaf8412abd254d72d505e1d76ed823aaaaa26c24c1f5,2024-07-22T13:00:31.330000
CVE-2024-3873,0,0,9f41cb948a87fde9385789dcbf920beb2d5b41b44037ffd26229becab16e904c,2024-05-17T02:40:09.627000
@ -255368,20 +255368,20 @@ CVE-2024-38738,0,0,bc587636026bafbf557ab7ba8ec07e058c1701d82e90dc0010a07705f8e61
CVE-2024-38739,0,0,e943ba897b18a5e605971ababc29ec37d438434e3cdbca441e7fccf03f6560b8,2024-07-22T13:00:31.330000
CVE-2024-3874,0,0,f386620c295e4adf2d0e1bcb131bf4999519006b93485a0a9655b1dc65db42b9,2024-06-04T19:20:25.697000
CVE-2024-38741,0,0,ba8ea7a8f0396a64e75e460984ae328b0142ace4ad761010bd9470b3238b8238,2024-07-22T13:00:31.330000
CVE-2024-38742,0,1,dcb886f7ad65925e302828cf2ab6eba5bcdcb5d7a6ec0c5c463665c7b2117dfb,2024-08-13T12:58:25.437000
CVE-2024-38742,0,0,dcb886f7ad65925e302828cf2ab6eba5bcdcb5d7a6ec0c5c463665c7b2117dfb,2024-08-13T12:58:25.437000
CVE-2024-38746,0,0,988faa32e10f00cdfc73197d6a4b5a9effdd55c479491e986d878e425b43dc75,2024-08-02T12:59:43.990000
CVE-2024-38747,0,1,387e10e1227ced6dbe298dd74e1eb68f01b4bc57677f9cc77ec50032ae33c463,2024-08-13T12:58:25.437000
CVE-2024-38749,0,1,da8ea877f0e11f703cd19caeae95603f9f13a5a9592eab258b9f5c14a7c6d146,2024-08-13T12:58:25.437000
CVE-2024-38747,0,0,387e10e1227ced6dbe298dd74e1eb68f01b4bc57677f9cc77ec50032ae33c463,2024-08-13T12:58:25.437000
CVE-2024-38749,0,0,da8ea877f0e11f703cd19caeae95603f9f13a5a9592eab258b9f5c14a7c6d146,2024-08-13T12:58:25.437000
CVE-2024-3875,0,0,089beeefeb959936719f61ddb82cb79408bd763795142eb9b4bb9ae3be3050ea,2024-06-04T19:20:25.807000
CVE-2024-38750,0,0,222ab97d7171c5f5aa490a3c05e43069eeeb208df63406b1a04c82e08ae0bf5a,2024-07-22T13:00:31.330000
CVE-2024-38752,0,1,65b9b9b528cf7d93baa0ae852a80f46f0d0b074f8dc8ad6f6601b0be682e8f97,2024-08-13T12:58:25.437000
CVE-2024-38752,0,0,65b9b9b528cf7d93baa0ae852a80f46f0d0b074f8dc8ad6f6601b0be682e8f97,2024-08-13T12:58:25.437000
CVE-2024-38755,0,0,c1eb4fbc941f067570b6df47700dceae56b94124f3422699ef8660741d53e6d7,2024-07-22T13:00:31.330000
CVE-2024-38756,0,1,1811eb27f20d94e2d5e1196b57fe267d7059f56de6e325c9b2cd70d7eed832b2,2024-08-13T12:58:25.437000
CVE-2024-38756,0,0,1811eb27f20d94e2d5e1196b57fe267d7059f56de6e325c9b2cd70d7eed832b2,2024-08-13T12:58:25.437000
CVE-2024-38757,0,0,421e25aafaa8f24ca203f7704697e053a3b4c9c58e7bb7a0a06fc6226027ccb1,2024-07-22T13:00:31.330000
CVE-2024-38758,0,0,01ca07e85b1f1438d40acc21dae8bc4e8a4e622d1f60d60a02b659505eb185f9,2024-07-22T13:00:31.330000
CVE-2024-38759,0,0,b9fa7ce22eebb94e2617e669160f4e670eabfdcde229d0ec6de28ef0c8571a32,2024-07-22T13:00:31.330000
CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000
CVE-2024-38760,0,1,dac50188f33dada03970bf025537a5a8d31ad50b678d6578763f501df6145fa3,2024-08-13T12:58:25.437000
CVE-2024-38760,0,0,dac50188f33dada03970bf025537a5a8d31ad50b678d6578763f501df6145fa3,2024-08-13T12:58:25.437000
CVE-2024-38761,0,0,163d643979adbf8920122e6726130a646970ec33787f98daf4f56c619ee9308f,2024-08-02T12:59:43.990000
CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000
CVE-2024-38768,0,0,95304e2a98b024fab4e11f928777fafec4b510f27612acafcf61c70a99635beb,2024-08-02T12:59:43.990000
@ -255398,7 +255398,7 @@ CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61
CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
CVE-2024-38787,0,1,d4d55f16def567d86062490d92839c6f1ff0077b1d1aab515a1f48b31f8f77d4,2024-08-13T12:58:25.437000
CVE-2024-38787,0,0,d4d55f16def567d86062490d92839c6f1ff0077b1d1aab515a1f48b31f8f77d4,2024-08-13T12:58:25.437000
CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
@ -255466,7 +255466,7 @@ CVE-2024-38983,0,0,b4007717ba4ecdcb9f705c2dcea6a2ebbf6e393e28ab95db12566748e8954
CVE-2024-38984,0,0,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000
CVE-2024-38986,0,0,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
CVE-2024-38989,0,0,d752938c80deda5b171af5c6086cf96369e2425c421824e4ddf9e14cf0940e2a,2024-08-12T13:41:36.517000
CVE-2024-38989,0,1,7001f996e8750f893c91dddad8450a9cd0a74e958414e4c24caf0d467ae89875,2024-08-13T14:35:23.670000
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000
CVE-2024-38992,0,0,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000
@ -255523,7 +255523,7 @@ CVE-2024-39124,0,0,074b2440134f96fcb5e6403766335cbe851c245882b5084251dfb9a87ee9d
CVE-2024-39125,0,0,ea222508082dda2f4140fd8cec40ec4cb568aeac21b16bf5850e5de1b8ed9df9,2024-08-02T19:45:07.057000
CVE-2024-39126,0,0,02a0af5813c985b7ccaba2afbb0690bd72e15528f1d0e97017c88410c682ae2a,2024-08-02T19:45:17.417000
CVE-2024-39129,0,0,e13cd843f644991726516520189fbff2f72df7163be6b1c91e840488eab8e98f,2024-06-28T10:27:00.920000
CVE-2024-3913,1,1,3b1abc5a6b17d1ac7a04e5054f16f5e92d8424b6909d6c40dc1ae01c592f9bc4,2024-08-13T13:15:12.750000
CVE-2024-3913,0,0,3b1abc5a6b17d1ac7a04e5054f16f5e92d8424b6909d6c40dc1ae01c592f9bc4,2024-08-13T13:15:12.750000
CVE-2024-39130,0,0,df5f818c69686396dd3eb68339897ebffa1b11bf7906d37001b874abe3136d64,2024-07-03T02:05:38.450000
CVE-2024-39132,0,0,f1e2ae8a4f82ac6b3eb2b1f084ee47ef357e0b4364889cfb0a92803ee3d26262,2024-08-12T18:35:40.733000
CVE-2024-39133,0,0,c0b156e43b5b006fb8a1a63a92ff8df19a3b9334b5434845fe916818d8f721fc,2024-07-03T02:05:39.283000
@ -255645,7 +255645,7 @@ CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef261
CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000
CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000
CVE-2024-39379,0,0,eea4124c5ea93e0750c53c7242ccfa255eb0eb94ed4c7c3ac1070e74f2655db4,2024-08-01T12:42:36.933000
CVE-2024-3938,0,0,65ce7ff82c49f65d2634b6daf25e98c9672c7f84a53fd4675899c0451a398720,2024-07-26T14:15:02.773000
CVE-2024-3938,0,1,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000
CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000
CVE-2024-39392,0,0,66cfce17bd8b1475fbe1823e0e269e958974fa5e662af0c38bd8aae43df2ebb5,2024-08-02T12:59:43.990000
CVE-2024-39396,0,0,35651f26387fec82c0dfb279ff129f06faad55e21497397f655b21318cdf6ddc,2024-08-02T12:59:43.990000
@ -255774,7 +255774,7 @@ CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39591,0,1,aa73d6aa3e6f1fd7945356d9037cdf653184a2a0d3e6ffe5084020e855fe2845,2024-08-13T12:58:25.437000
CVE-2024-39591,0,0,aa73d6aa3e6f1fd7945356d9037cdf653184a2a0d3e6ffe5084020e855fe2845,2024-08-13T12:58:25.437000
CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000
CVE-2024-39593,0,0,51f4661ccbaba7452aac7223f24d0b1eb585ba800f6962a627249fa8658c86e6,2024-07-09T18:19:14.047000
CVE-2024-39594,0,0,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000
@ -255803,7 +255803,7 @@ CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c
CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
CVE-2024-39642,0,1,77fe294d5b16a2b61249926534151028f491eb3bed8731298d02b17ea0bf385c,2024-08-13T12:58:25.437000
CVE-2024-39642,0,0,77fe294d5b16a2b61249926534151028f491eb3bed8731298d02b17ea0bf385c,2024-08-13T12:58:25.437000
CVE-2024-39643,0,0,ab690f644bd8107c9b6f111fea454f517942fa99d057356f81485b17fdbb7467,2024-08-02T12:59:43.990000
CVE-2024-39644,0,0,d3581da15e50573fdc66cccf372916528eaf253913bd99dd7ea69d512d0d7709,2024-08-02T12:59:43.990000
CVE-2024-39646,0,0,bb182e2388ee05be62a2bee46707e3cedd648df938bee18d71dc058292ae064e,2024-08-02T12:59:43.990000
@ -255811,7 +255811,7 @@ CVE-2024-39647,0,0,6e1f994aff430711e600420bf7a77dd8b1f3e358bedde7107dd7e4563194f
CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000
CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56ebe,2024-08-02T12:59:43.990000
CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000
CVE-2024-39651,0,1,8c87f55abc8672c9f439da2ca1b9ea17f383816e1e22e404169d5f0048ec96e1,2024-08-13T12:58:25.437000
CVE-2024-39651,0,0,8c87f55abc8672c9f439da2ca1b9ea17f383816e1e22e404169d5f0048ec96e1,2024-08-13T12:58:25.437000
CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
@ -255969,7 +255969,7 @@ CVE-2024-39918,0,0,a01d13ae0b603735ac5bf07d7a2e68692283e08ddeecd7e6f7dcec848231b
CVE-2024-39919,0,0,ef22e6bc228ea2cf3764fb5e5dab9f5aabfb0f60858f62004efb01879ab42cf0,2024-07-16T13:43:58.773000
CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe7336d,2024-08-07T19:08:22.713000
CVE-2024-39920,0,0,6bef49e28b0964791fd5773db4da2a4c4749e9b59fc7a5ce56343d0a0b5eb623,2024-08-05T19:35:13.550000
CVE-2024-39922,0,1,a11f540f7ae637eeb23d9dbe5f41e0a82295584884fed42d4d4682f877ddfeca,2024-08-13T12:58:25.437000
CVE-2024-39922,0,0,a11f540f7ae637eeb23d9dbe5f41e0a82295584884fed42d4d4682f877ddfeca,2024-08-13T12:58:25.437000
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
@ -256187,7 +256187,7 @@ CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f
CVE-2024-40689,0,0,b737e3a1f88271d05934916a1e9611bb299eb972b578fcd1907e65284f8f8a13,2024-07-29T14:12:08.783000
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
CVE-2024-40697,0,1,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
CVE-2024-40697,0,0,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
@ -256287,8 +256287,8 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
CVE-2024-40892,0,1,f4b3d30cee3dbead5f513a470d6b7589a9f6fca1880298ea9f624486c63e7014,2024-08-13T12:58:25.437000
CVE-2024-40893,0,1,75c648235a6f1fcfb2addb5d3726647373dc511b9170f6c03d285bfcb70f1cd1,2024-08-13T12:58:25.437000
CVE-2024-40892,0,0,f4b3d30cee3dbead5f513a470d6b7589a9f6fca1880298ea9f624486c63e7014,2024-08-13T12:58:25.437000
CVE-2024-40893,0,0,75c648235a6f1fcfb2addb5d3726647373dc511b9170f6c03d285bfcb70f1cd1,2024-08-13T12:58:25.437000
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
@ -256562,7 +256562,7 @@ CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
CVE-2024-41240,0,1,d3e33d561272d83576d26975ab2c3d7593213b6e30b5373619538759272a67a5,2024-08-13T15:35:13.190000
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
CVE-2024-41242,0,0,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
CVE-2024-41243,0,0,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
@ -256644,11 +256644,11 @@ CVE-2024-41465,0,0,f323d3ff7dfebe22b9a686e1b54d79f6e139e7ff43c0da4ee794ccc9ea305
CVE-2024-41466,0,0,cab2b0ce626d04e7a0d17b559b41b44cbb63464fd58881e5118e54554df587f2,2024-08-01T13:58:49.187000
CVE-2024-41468,0,0,723917e91ffa0b2faf983099b56bc2d3f0cf2685feaca850f60e0aa2cedc4e5d,2024-08-02T21:09:28.420000
CVE-2024-41473,0,0,425ac543ae035b27f256c6d74a172a9469ff894b2097490bb556616203f6fd87,2024-08-02T21:09:40.267000
CVE-2024-41475,0,0,630e4caaf9a41fa6a3f534e91e7daf993f863aa16f310e9c2054a2f10349bf91,2024-08-12T18:57:17.383000
CVE-2024-41475,0,1,8d4e76d5f6b9c6b2651f3cfd5d0066dacec1028bf396f99ea2880314b899072f,2024-08-13T15:35:13.560000
CVE-2024-41476,0,0,11908f38d518fbcd5181831e3e003273cc2be1192f541645fa97092f97e6faf5,2024-08-12T14:35:13.627000
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
CVE-2024-41481,0,0,8aba19ab3da8a482dd9dfabe052be8c2c112aa692f0117579e187673fe5172d6,2024-08-12T13:41:36.517000
CVE-2024-41482,0,0,9ed803d4862cda019e0f1d7d5f2f187fc334f909a159ec38deb6a90beebfa038,2024-08-12T13:41:36.517000
CVE-2024-41481,0,1,c147890df622632e17fb447f6a188c3cc30b5351b710684282e2b6d4b3a225db,2024-08-13T14:51:33.017000
CVE-2024-41482,0,1,dfc93ec02e2f907ca19eab1b6c73eb7ff3ad5a41e0a2b82a7b3f2c2dda8c066e,2024-08-13T14:51:43.163000
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
CVE-2024-41492,0,0,b1335de0436b7c8900c341d1fdd3cf687e177ea6dd90614e9aac145917e5dee5,2024-08-01T13:58:52.487000
CVE-2024-4150,0,0,6620986a45cd70dd6d417a583c6a5ddd7d1307e119d46c0f4cd76fea931ab7e8,2024-05-14T16:11:39.510000
@ -256680,6 +256680,7 @@ CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1a
CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000
CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
CVE-2024-41623,1,1,61d2c73df6ab5313852a706ec00036c5ab1fed8f6dcd72c6ab9cbc478c6660de,2024-08-13T14:15:12.203000
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
@ -256709,9 +256710,9 @@ CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbc
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
CVE-2024-41681,0,1,b2cd2fc2f90e1627c93dc847451357a090125aa4661a1c2fa242960aa02ca602,2024-08-13T12:58:25.437000
CVE-2024-41682,0,1,caccaed8762da030de3252454908de3b48a9309c8dd8ff6683fc054c4ae7b87e,2024-08-13T12:58:25.437000
CVE-2024-41683,0,1,9f7506454096ec000c94121bd9786d23d57d25cf377074520243d95316573df8,2024-08-13T12:58:25.437000
CVE-2024-41681,0,0,b2cd2fc2f90e1627c93dc847451357a090125aa4661a1c2fa242960aa02ca602,2024-08-13T12:58:25.437000
CVE-2024-41682,0,0,caccaed8762da030de3252454908de3b48a9309c8dd8ff6683fc054c4ae7b87e,2024-08-13T12:58:25.437000
CVE-2024-41683,0,0,9f7506454096ec000c94121bd9786d23d57d25cf377074520243d95316573df8,2024-08-13T12:58:25.437000
CVE-2024-41684,0,0,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
CVE-2024-41685,0,0,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
CVE-2024-41686,0,0,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
@ -256736,24 +256737,24 @@ CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f087
CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-41710,0,1,f336d2f5d200a47c4471d9c080e2d6a49e0138bf18ad68bcd7b2f59c7c60e2a4,2024-08-13T12:58:25.437000
CVE-2024-41710,0,0,f336d2f5d200a47c4471d9c080e2d6a49e0138bf18ad68bcd7b2f59c7c60e2a4,2024-08-13T12:58:25.437000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
CVE-2024-41730,0,1,7031676875d9605aa9320a41018bc13d9621aeef7d21298e6e06361ee723c9b7,2024-08-13T12:58:25.437000
CVE-2024-41731,0,1,02a91c833df63e6c564516dc52c189d6e6b8e457157a426dcd27b10bf6f81700,2024-08-13T12:58:25.437000
CVE-2024-41732,0,1,cfd988683c162ccaff500a181357f2cfd9b2ad883947c45fd383db56c6c7334f,2024-08-13T12:58:25.437000
CVE-2024-41733,0,1,43d7ece2923afa067b97cc5b8856ad98fe23c3003f391f111b302eac94143d6b,2024-08-13T12:58:25.437000
CVE-2024-41734,0,1,cf23317e467965fbcd7918bb01313aad782041e00274083b64d4e716c1b129e8,2024-08-13T12:58:25.437000
CVE-2024-41735,0,1,ccb6bd2c9caf1993f5f6606b875293f47b1c0f4cb08b8a4d210808558d16d312,2024-08-13T12:58:25.437000
CVE-2024-41736,0,1,e5545754fc84bd96371d2b3ed28ca7ba052a1e51781753e0c72027f3bf7ab1f7,2024-08-13T12:58:25.437000
CVE-2024-41737,0,1,a408108dc5071d044be54a438ed3a867965aef83e49043fa4c85cce4946ad825,2024-08-13T12:58:25.437000
CVE-2024-41730,0,0,7031676875d9605aa9320a41018bc13d9621aeef7d21298e6e06361ee723c9b7,2024-08-13T12:58:25.437000
CVE-2024-41731,0,0,02a91c833df63e6c564516dc52c189d6e6b8e457157a426dcd27b10bf6f81700,2024-08-13T12:58:25.437000
CVE-2024-41732,0,0,cfd988683c162ccaff500a181357f2cfd9b2ad883947c45fd383db56c6c7334f,2024-08-13T12:58:25.437000
CVE-2024-41733,0,0,43d7ece2923afa067b97cc5b8856ad98fe23c3003f391f111b302eac94143d6b,2024-08-13T12:58:25.437000
CVE-2024-41734,0,0,cf23317e467965fbcd7918bb01313aad782041e00274083b64d4e716c1b129e8,2024-08-13T12:58:25.437000
CVE-2024-41735,0,0,ccb6bd2c9caf1993f5f6606b875293f47b1c0f4cb08b8a4d210808558d16d312,2024-08-13T12:58:25.437000
CVE-2024-41736,0,0,e5545754fc84bd96371d2b3ed28ca7ba052a1e51781753e0c72027f3bf7ab1f7,2024-08-13T12:58:25.437000
CVE-2024-41737,0,0,a408108dc5071d044be54a438ed3a867965aef83e49043fa4c85cce4946ad825,2024-08-13T12:58:25.437000
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-41774,0,1,c4a5c6e5643b743eec59a3fa13dc7f6056cb35865a4a11a40e9565620b2ebfcf,2024-08-13T12:58:25.437000
CVE-2024-41774,0,0,c4a5c6e5643b743eec59a3fa13dc7f6056cb35865a4a11a40e9565620b2ebfcf,2024-08-13T12:58:25.437000
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000
@ -256764,8 +256765,8 @@ CVE-2024-41804,0,0,1eb20b79a205e234d02bd19bc2ee6fc8b7a374c6f3282ae0ce6727f5dc603
CVE-2024-41805,0,0,d25981eca346da6da343ee3e5d5d95b55972138683a74ea987fda864ae2895de,2024-07-29T14:12:08.783000
CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000
CVE-2024-41807,0,0,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000
CVE-2024-41808,0,1,86e573e10148db5aa9add6d5ace29d7cf6e53a0a7cc2061842040f4fa6f34f79,2024-08-13T13:40:02.497000
CVE-2024-41809,0,1,70303d2e0413c949907cbf888f2f0a84d6dd93d023a162166c01e97f9b1b2afd,2024-08-13T13:43:51.613000
CVE-2024-41808,0,0,86e573e10148db5aa9add6d5ace29d7cf6e53a0a7cc2061842040f4fa6f34f79,2024-08-13T13:40:02.497000
CVE-2024-41809,0,0,70303d2e0413c949907cbf888f2f0a84d6dd93d023a162166c01e97f9b1b2afd,2024-08-13T13:43:51.613000
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
CVE-2024-41810,0,0,099a0ba0bd576293cb0ce77966a6fd680adec1ed22994792ed20d2deaa7afc28,2024-07-29T16:21:52.517000
CVE-2024-41811,0,0,9f58aea58828abbba8408114667ccf0c9b7ba580252558bb335b961e28e91b34,2024-08-06T16:30:24.547000
@ -256797,17 +256798,17 @@ CVE-2024-41888,0,0,732035365d9dca966bbb01cf0554f084d6d5446f352b0bfbfd05d657e62c4
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
CVE-2024-41890,0,0,db9be7aaec3f0e305c1425d168e81c684e69b3cb2cbbd809f74a130e7ea87d73,2024-08-12T13:41:36.517000
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
CVE-2024-41903,0,1,1181475f4133d5ae08476a8215ef2fdf0be5ba7ee32414c4421b04469fee257b,2024-08-13T12:58:25.437000
CVE-2024-41904,0,1,c24394fe38355d9c34795a3d211e1175ec964bebdd4143def11c99cb853500bf,2024-08-13T12:58:25.437000
CVE-2024-41905,0,1,6eb52eab9211992fb767f07636a6ac052b456047d6f5d6b400eb75bcb15fd5aa,2024-08-13T12:58:25.437000
CVE-2024-41906,0,1,2092a767a29071d6ecff32b45dcabde06ca0f5fdfbf41c8f42a8f1dc8f031510,2024-08-13T12:58:25.437000
CVE-2024-41907,0,1,b7efda31c122e0f8ec7b482eed688e8286a8b42c021fdb8c0dbd88296b6b37ac,2024-08-13T12:58:25.437000
CVE-2024-41908,0,1,c763b72a948957ca3795b5d513dd686bb6b7a643bd91162afafe756b69cc31f8,2024-08-13T12:58:25.437000
CVE-2024-41903,0,0,1181475f4133d5ae08476a8215ef2fdf0be5ba7ee32414c4421b04469fee257b,2024-08-13T12:58:25.437000
CVE-2024-41904,0,0,c24394fe38355d9c34795a3d211e1175ec964bebdd4143def11c99cb853500bf,2024-08-13T12:58:25.437000
CVE-2024-41905,0,0,6eb52eab9211992fb767f07636a6ac052b456047d6f5d6b400eb75bcb15fd5aa,2024-08-13T12:58:25.437000
CVE-2024-41906,0,0,2092a767a29071d6ecff32b45dcabde06ca0f5fdfbf41c8f42a8f1dc8f031510,2024-08-13T12:58:25.437000
CVE-2024-41907,0,0,b7efda31c122e0f8ec7b482eed688e8286a8b42c021fdb8c0dbd88296b6b37ac,2024-08-13T12:58:25.437000
CVE-2024-41908,0,0,c763b72a948957ca3795b5d513dd686bb6b7a643bd91162afafe756b69cc31f8,2024-08-13T12:58:25.437000
CVE-2024-41909,0,0,337038a3b5c59abd8e55d975739739e11455537d62050bba02f94002d048f34d,2024-08-12T18:57:29.247000
CVE-2024-41910,0,1,06fef1a1746e307a7b6963424f9e76401a3fb6190b3818fc37dc793d73a60b2e,2024-08-13T13:06:13.467000
CVE-2024-41911,0,1,b542ab6549d1a6ba75d487319609cd34daa1d1d30a8cdf77ef05c27a0b475654,2024-08-13T13:06:50.707000
CVE-2024-41910,0,0,06fef1a1746e307a7b6963424f9e76401a3fb6190b3818fc37dc793d73a60b2e,2024-08-13T13:06:13.467000
CVE-2024-41911,0,0,b542ab6549d1a6ba75d487319609cd34daa1d1d30a8cdf77ef05c27a0b475654,2024-08-13T13:06:50.707000
CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
CVE-2024-41913,0,1,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000
CVE-2024-41913,0,0,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000
@ -256816,11 +256817,11 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-41936,0,0,3e7584de3119384718885fa91426c70960b6e9df5afd267fe806c0b221ea60dd,2024-08-12T13:41:36.517000
CVE-2024-41938,0,1,f6ea7377f5903c94a26194e30cb8905d07a042f29023d1508032bafa602773a6,2024-08-13T12:58:25.437000
CVE-2024-41939,0,1,585554327560a9ef16dfd9d24386414dc61a036e9dba95784bceef03129a4266,2024-08-13T12:58:25.437000
CVE-2024-41938,0,0,f6ea7377f5903c94a26194e30cb8905d07a042f29023d1508032bafa602773a6,2024-08-13T12:58:25.437000
CVE-2024-41939,0,0,585554327560a9ef16dfd9d24386414dc61a036e9dba95784bceef03129a4266,2024-08-13T12:58:25.437000
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
CVE-2024-41940,0,1,e9fda83096c561d3d7d08aabce8a9d61d1b32cdd895b9a6262b149545cdec550,2024-08-13T12:58:25.437000
CVE-2024-41941,0,1,dbc99c925e521a1ce47a9e78073d667c15b23967f067fde9e7fd9d2b993c8e34,2024-08-13T12:58:25.437000
CVE-2024-41940,0,0,e9fda83096c561d3d7d08aabce8a9d61d1b32cdd895b9a6262b149545cdec550,2024-08-13T12:58:25.437000
CVE-2024-41941,0,0,dbc99c925e521a1ce47a9e78073d667c15b23967f067fde9e7fd9d2b993c8e34,2024-08-13T12:58:25.437000
CVE-2024-41942,0,0,7923ac40921d31d0296434cafefbd05115f6a6de46c0d45a5dcdea9f8a32742f,2024-08-12T15:53:27.457000
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
@ -256846,9 +256847,9 @@ CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9
CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-41976,0,1,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000
CVE-2024-41977,0,1,0c2d5a9b940ac3b2f101a09039e3b3ffcc295821fbaba95911207e4f295d7a11,2024-08-13T12:58:25.437000
CVE-2024-41978,0,1,dc2ffcdc2a80435ea52331fe1c824316e83565d620c604a25748290cbc8e9e81,2024-08-13T12:58:25.437000
CVE-2024-41976,0,0,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000
CVE-2024-41977,0,0,0c2d5a9b940ac3b2f101a09039e3b3ffcc295821fbaba95911207e4f295d7a11,2024-08-13T12:58:25.437000
CVE-2024-41978,0,0,dc2ffcdc2a80435ea52331fe1c824316e83565d620c604a25748290cbc8e9e81,2024-08-13T12:58:25.437000
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
@ -257070,11 +257071,11 @@ CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbe
CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
CVE-2024-42370,0,0,bc0a8d588f536f34911e68724023599a65528bc23b4d4f6cda3f1a23005982af,2024-08-12T13:41:36.517000
CVE-2024-42373,0,1,18dd42961fa2d0b0505b48728396162fc09701384477634e9d1214826f63234e,2024-08-13T12:58:25.437000
CVE-2024-42374,0,1,4f9e67fe0e45e6c22255a61426641b37923fca9c432c3f6d2f1761c49666faa8,2024-08-13T12:58:25.437000
CVE-2024-42375,0,1,5654d76364f1af624f08ff190617240d425bd0d560f40d5a5a020d5ded54fef5,2024-08-13T12:58:25.437000
CVE-2024-42376,0,1,4a1c078dd7f4e49cb6f2d30be161ebed50d623bb17d120d6379cadfe3464d2fb,2024-08-13T12:58:25.437000
CVE-2024-42377,0,1,5709b4c524ddcaa1e01bca83d0b065b42eef2f7ee6b9b35dafaad46ffbe2871d,2024-08-13T12:58:25.437000
CVE-2024-42373,0,0,18dd42961fa2d0b0505b48728396162fc09701384477634e9d1214826f63234e,2024-08-13T12:58:25.437000
CVE-2024-42374,0,0,4f9e67fe0e45e6c22255a61426641b37923fca9c432c3f6d2f1761c49666faa8,2024-08-13T12:58:25.437000
CVE-2024-42375,0,0,5654d76364f1af624f08ff190617240d425bd0d560f40d5a5a020d5ded54fef5,2024-08-13T12:58:25.437000
CVE-2024-42376,0,0,4a1c078dd7f4e49cb6f2d30be161ebed50d623bb17d120d6379cadfe3464d2fb,2024-08-13T12:58:25.437000
CVE-2024-42377,0,0,5709b4c524ddcaa1e01bca83d0b065b42eef2f7ee6b9b35dafaad46ffbe2871d,2024-08-13T12:58:25.437000
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
@ -257120,13 +257121,13 @@ CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0c
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
CVE-2024-42520,0,1,d0245ce44a5eacd94c8e6fe6728d861f4f7562ca5d568b3c3ebae59531d80c70,2024-08-13T13:19:29.207000
CVE-2024-42520,0,1,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
CVE-2024-4253,0,0,c9c68d543bb45de2537aab443ac18ac0d0ac2996dd48a0a792630e0df378eb1e,2024-06-04T16:57:41.053000
CVE-2024-4254,0,0,3b60c29b2fffc26e81ef054aaff64665b1e9fde72fa8de5968c25c437cecbbf1,2024-06-04T16:57:41.053000
CVE-2024-42543,0,1,6ee50d274b8eef597024a9c9175c5d4c80a1fe2616bb4fe4bff27c10e0a6311a,2024-08-13T13:24:03.060000
CVE-2024-42545,0,1,a61a98cc83a9b9cc50be66b12421da3fc485c23ec7e2674e0c6e2660afcd71b2,2024-08-13T13:23:46.510000
CVE-2024-42546,0,1,11bda558fb35041b8e39b22c874ec7cc2b62af68322f94c532d558b8592d2887,2024-08-13T12:58:25.437000
CVE-2024-42547,0,1,898f132b4e115631f63c01e15eef580b903d25c9260242031968af619bed5733,2024-08-13T12:58:25.437000
CVE-2024-42543,0,0,6ee50d274b8eef597024a9c9175c5d4c80a1fe2616bb4fe4bff27c10e0a6311a,2024-08-13T13:24:03.060000
CVE-2024-42545,0,1,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956ff0,2024-08-13T15:35:16.993000
CVE-2024-42546,0,0,11bda558fb35041b8e39b22c874ec7cc2b62af68322f94c532d558b8592d2887,2024-08-13T12:58:25.437000
CVE-2024-42547,0,1,a09c7bbfb50fa5c4f41d5a4ad41bec7851c53010a05ba8ae30901a6fe9fd0537,2024-08-13T15:35:17.887000
CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000
CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000
CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000
@ -257134,17 +257135,17 @@ CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000
CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000
CVE-2024-42623,0,1,99a6aaf6801397834ccadcfb03d3715137de2aa0dd38613e1baf274f894ff205,2024-08-13T13:24:59.710000
CVE-2024-42624,0,1,ec841bafb7e9aeedb21c49859383b729fbe686d2ed7814525f5ad995afa66c4b,2024-08-13T13:24:48.877000
CVE-2024-42623,0,0,99a6aaf6801397834ccadcfb03d3715137de2aa0dd38613e1baf274f894ff205,2024-08-13T13:24:59.710000
CVE-2024-42624,0,0,ec841bafb7e9aeedb21c49859383b729fbe686d2ed7814525f5ad995afa66c4b,2024-08-13T13:24:48.877000
CVE-2024-42625,0,0,3b45097890bb975ba779c5fd86f6aaf0249b0f933babd1e52b024372c2d87a71,2024-08-12T18:57:17.383000
CVE-2024-42626,0,1,a577a76a6e4251b5887ad0ebc30981fc2398ed5abda45bf6ba13715904b26032,2024-08-13T13:24:29.367000
CVE-2024-42627,0,1,dc791f47059eb1d24e79dd8e86fcf1207e5c824c40b28dc7346c3e407b50043d,2024-08-13T13:24:39.387000
CVE-2024-42628,0,1,ae77e6dbb0fb6b78416c59be322943b3e27d1177389d59cf5f49d0df9ff8842d,2024-08-13T13:18:32.317000
CVE-2024-42626,0,1,2719b95cb2b2da8055e44b617f6bc8b518937c6439f02bf103b37b68507f4891,2024-08-13T15:35:20.987000
CVE-2024-42627,0,0,dc791f47059eb1d24e79dd8e86fcf1207e5c824c40b28dc7346c3e407b50043d,2024-08-13T13:24:39.387000
CVE-2024-42628,0,0,ae77e6dbb0fb6b78416c59be322943b3e27d1177389d59cf5f49d0df9ff8842d,2024-08-13T13:18:32.317000
CVE-2024-42629,0,0,2543b79305ee45292e39f871306680657516f37d9201c47bebc007532a83578f,2024-08-12T18:57:17.383000
CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000
CVE-2024-42630,0,1,44c938f5989206eb919f1fe129636637015c7376addb4db91ae2928c1a35fd9c,2024-08-13T13:20:39.450000
CVE-2024-42631,0,1,f1ea0c17046a6f6d297c1add3f27908219f87fa9c102984850c5a597fb24dc01,2024-08-13T13:20:29.147000
CVE-2024-42632,0,1,31ba44503eacc768507b9bd230db43f1f68c96b37084afad29240526916597c0,2024-08-13T13:24:16.770000
CVE-2024-42630,0,1,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000
CVE-2024-42631,0,0,f1ea0c17046a6f6d297c1add3f27908219f87fa9c102984850c5a597fb24dc01,2024-08-13T13:20:29.147000
CVE-2024-42632,0,1,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000
@ -257155,14 +257156,19 @@ CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b1
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
CVE-2024-4273,0,0,5b125871d487c3efbe3e6c153d4b19bf711348e838f76308254a9b0be85a18c9,2024-06-04T16:57:41.053000
CVE-2024-42736,1,1,29ca2de21b4a1d8d6fe7bce41e20687c6b05f060b6ea1e88e3be410d1c9c42a0,2024-08-13T14:15:13.160000
CVE-2024-42737,1,1,6c5dd559a94060758148a4054f6a5cba7ea1b8869c02a5ccc751f6d65f248a1b,2024-08-13T14:15:13.437000
CVE-2024-42738,1,1,35aeb13766aaae2e35259e98665e3cea7216f50f37fca36244ab32a40fb9bea9,2024-08-13T14:15:13.710000
CVE-2024-42739,1,1,3609281e01ebd9e500ec87dbb7960003e00b8544cfedd233ef8f1780464d1b45,2024-08-13T14:15:13.940000
CVE-2024-4274,0,0,75b03607f21ad1e6106012193c68fc94ebbedd9ebdaa49b327f299429c0ef078,2024-06-04T16:57:41.053000
CVE-2024-42741,0,1,66d076747a9a43d7cb0206ce7bbfcbae8b1365e7fbb7872f942e6649b2474a53,2024-08-13T12:58:25.437000
CVE-2024-42742,0,1,53a3fcdb3d98e5160ef45970e8fcba0fbaee4712de15f35507347f04587d01fc,2024-08-13T12:58:25.437000
CVE-2024-42743,0,1,125c2dee19a8b599a9ab0c088cd5312b29d2da5f07ff954b1261c9e56ab33970,2024-08-13T12:58:25.437000
CVE-2024-42744,0,1,3f5148aca917437cb3ff7455e4d19c3cb29bcbe48424e657fcbd0dd71b206ede,2024-08-13T12:58:25.437000
CVE-2024-42745,0,1,603fff72f6c87eead28d43aa1dc62b0df11a3ddee70aeaa93d35e7e86210fa78,2024-08-13T12:58:25.437000
CVE-2024-42747,0,1,df241a4f36be8ea34424cca08fabfd772d3b17ab30b84030301c5950899bf985,2024-08-13T12:58:25.437000
CVE-2024-42748,0,1,6ddbd35b3e6cf17440977ef366d574022c7e5e10e1b970b86b3cb394702d7a48,2024-08-13T12:58:25.437000
CVE-2024-42740,1,1,caaf409c27469d497c0ceda8a6e803745cd50ecf02c0e936a634534be1222f47,2024-08-13T15:35:24.410000
CVE-2024-42741,0,1,d8b9de98e1c6a2db5e3071d14e4a8ec942b3e76e67e7bfa07141d542bae6e170,2024-08-13T14:15:14.447000
CVE-2024-42742,0,1,e941f3ec0711b97c1b69beb8f51c9dd900a7e3acfaba3ad5f4f6ec8fbfe7b7f1,2024-08-13T14:15:14.990000
CVE-2024-42743,0,1,f1e0d68ab6ea6c43a343a772918cbc335f367b54ddd9adc130987a5e721f8f48,2024-08-13T14:15:15.247000
CVE-2024-42744,0,1,7fc132e5b0db5a24d1b9406297f00389cd2dc183033cebd51dacf934afedf6fa,2024-08-13T14:15:15.427000
CVE-2024-42745,0,1,cc0e4661f5a8efada715b28f6b8666bc35246a4b1f4ae32ef64a88fc3847ac89,2024-08-13T15:35:25.590000
CVE-2024-42747,0,0,df241a4f36be8ea34424cca08fabfd772d3b17ab30b84030301c5950899bf985,2024-08-13T12:58:25.437000
CVE-2024-42748,0,1,3518863a220907d111c9e54afe7d2c4a3c5f0a1ecb4ad57cfefe00aefe6bd075,2024-08-13T15:35:27.100000
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
@ -257201,41 +257207,41 @@ CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca
CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000
CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
CVE-2024-43121,0,1,306f70702e1cd11183b4ec663f2ed6fa3bf76a0f3da56b911e3dbd26bd0854a2,2024-08-13T12:58:25.437000
CVE-2024-43123,0,1,56876666ae658c842a5d1b625514c422e9e2935c9269e6647bb2f5fab7a96ace,2024-08-13T12:58:25.437000
CVE-2024-43124,0,1,bffaadacf01084de40d35f1795f8918456957490e4d932616ab963af0dbb5cd0,2024-08-13T12:58:25.437000
CVE-2024-43125,0,1,498d2a254bf07e23d10fd0050fdac59e5bbcce170d143d572071cc8eb6c3d173,2024-08-13T12:58:25.437000
CVE-2024-43126,0,1,6fc85d5c5b6d858b5d04ee86ed23f67d88cbb8069cf0a7b625c4dbafc0d264c0,2024-08-13T12:58:25.437000
CVE-2024-43127,0,1,c0c1b171335edb4ceda4549b55da23ef10a53af989286f2323c7124e4f91d03e,2024-08-13T12:58:25.437000
CVE-2024-43128,0,1,d787b2864eda3b9a77f3adb166e1445e7353c726dd4fbde56a2c310918ff07a3,2024-08-13T12:58:25.437000
CVE-2024-43129,0,1,d25cac6f4730b8c5a4203d421ede1a3489c7c9b067066bd5165577d52fdd353b,2024-08-13T12:58:25.437000
CVE-2024-43121,0,0,306f70702e1cd11183b4ec663f2ed6fa3bf76a0f3da56b911e3dbd26bd0854a2,2024-08-13T12:58:25.437000
CVE-2024-43123,0,0,56876666ae658c842a5d1b625514c422e9e2935c9269e6647bb2f5fab7a96ace,2024-08-13T12:58:25.437000
CVE-2024-43124,0,0,bffaadacf01084de40d35f1795f8918456957490e4d932616ab963af0dbb5cd0,2024-08-13T12:58:25.437000
CVE-2024-43125,0,0,498d2a254bf07e23d10fd0050fdac59e5bbcce170d143d572071cc8eb6c3d173,2024-08-13T12:58:25.437000
CVE-2024-43126,0,0,6fc85d5c5b6d858b5d04ee86ed23f67d88cbb8069cf0a7b625c4dbafc0d264c0,2024-08-13T12:58:25.437000
CVE-2024-43127,0,0,c0c1b171335edb4ceda4549b55da23ef10a53af989286f2323c7124e4f91d03e,2024-08-13T12:58:25.437000
CVE-2024-43128,0,0,d787b2864eda3b9a77f3adb166e1445e7353c726dd4fbde56a2c310918ff07a3,2024-08-13T12:58:25.437000
CVE-2024-43129,0,0,d25cac6f4730b8c5a4203d421ede1a3489c7c9b067066bd5165577d52fdd353b,2024-08-13T12:58:25.437000
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
CVE-2024-43130,0,1,7b12332a5a5c57afcdf5a03a426b617961b993f5344d40ab80fe628ff1a12ff9,2024-08-13T12:58:25.437000
CVE-2024-43131,0,1,cb5a314bde629cf8085400badd8863535f98d6eb19e88234f6b2550e391e687b,2024-08-13T12:58:25.437000
CVE-2024-43133,0,1,42feabd3bfceaa0db2dad0f9322fc7e062b45d9844706ba726898920c7cb4fdc,2024-08-13T12:58:25.437000
CVE-2024-43135,0,1,64afa730595b83905683e46a96ea8bcf2626010bd2f8ab810f81e027b8457e40,2024-08-13T12:58:25.437000
CVE-2024-43137,0,1,ce4f7094db1d08dea639b8b61d7a0df170b78007284ce26ecaf2a9081b9a9b9c,2024-08-13T12:58:25.437000
CVE-2024-43138,1,1,918b3eb5fec9200a8e09c897046b118343977ea029a0ad48abf2861738614a18,2024-08-13T12:58:25.437000
CVE-2024-43139,0,1,240da60a6ff20c5f01060fb025f0d963adc1cde384a92ed8e365d2b34aed2472,2024-08-13T12:58:25.437000
CVE-2024-43130,0,0,7b12332a5a5c57afcdf5a03a426b617961b993f5344d40ab80fe628ff1a12ff9,2024-08-13T12:58:25.437000
CVE-2024-43131,0,0,cb5a314bde629cf8085400badd8863535f98d6eb19e88234f6b2550e391e687b,2024-08-13T12:58:25.437000
CVE-2024-43133,0,0,42feabd3bfceaa0db2dad0f9322fc7e062b45d9844706ba726898920c7cb4fdc,2024-08-13T12:58:25.437000
CVE-2024-43135,0,0,64afa730595b83905683e46a96ea8bcf2626010bd2f8ab810f81e027b8457e40,2024-08-13T12:58:25.437000
CVE-2024-43137,0,0,ce4f7094db1d08dea639b8b61d7a0df170b78007284ce26ecaf2a9081b9a9b9c,2024-08-13T12:58:25.437000
CVE-2024-43138,0,0,918b3eb5fec9200a8e09c897046b118343977ea029a0ad48abf2861738614a18,2024-08-13T12:58:25.437000
CVE-2024-43139,0,0,240da60a6ff20c5f01060fb025f0d963adc1cde384a92ed8e365d2b34aed2472,2024-08-13T12:58:25.437000
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
CVE-2024-43140,1,1,5e2c7e9ca68ff144a082c07be5cf1050df81c79a2cfb8eb4aea90f60cd6c5f00,2024-08-13T12:58:25.437000
CVE-2024-43141,1,1,07cf91a6f6b03ac407a5ff227a66d02d63745b41bdda3ec79dd8f269cab58d42,2024-08-13T12:58:25.437000
CVE-2024-43147,0,1,c590bf89cf6a5202fe89338056290cf01662a1b1b6ac4de852c04263e46b87d4,2024-08-13T12:58:25.437000
CVE-2024-43148,0,1,367042c20a60328d9d239172f6df937e1376a3a36734970e2537ff52eb859952,2024-08-13T12:58:25.437000
CVE-2024-43149,0,1,4a12e51a055bbca031f7aa3201c71436e594dbf795e44424d2192e4062f7955a,2024-08-13T12:58:25.437000
CVE-2024-43140,0,0,5e2c7e9ca68ff144a082c07be5cf1050df81c79a2cfb8eb4aea90f60cd6c5f00,2024-08-13T12:58:25.437000
CVE-2024-43141,0,0,07cf91a6f6b03ac407a5ff227a66d02d63745b41bdda3ec79dd8f269cab58d42,2024-08-13T12:58:25.437000
CVE-2024-43147,0,0,c590bf89cf6a5202fe89338056290cf01662a1b1b6ac4de852c04263e46b87d4,2024-08-13T12:58:25.437000
CVE-2024-43148,0,0,367042c20a60328d9d239172f6df937e1376a3a36734970e2537ff52eb859952,2024-08-13T12:58:25.437000
CVE-2024-43149,0,0,4a12e51a055bbca031f7aa3201c71436e594dbf795e44424d2192e4062f7955a,2024-08-13T12:58:25.437000
CVE-2024-4315,0,0,392e78ede02028792ceca327e706bfb19bc55163d6718415b77f2fda1df1c705,2024-06-13T18:36:09.013000
CVE-2024-43150,0,1,6de4950b12d6cacfb1965ef3dda188cb2d2fd1906585dc37036c6fc8755e47fb,2024-08-13T12:58:25.437000
CVE-2024-43151,0,1,de011bf78cae48f3194648cbfaa347da48f20f07ed241954f6efc8ae6aed36db,2024-08-13T12:58:25.437000
CVE-2024-43152,0,1,a78d2db561be2842fd7056b42a96064c469ae00d9923ec0be32d48eea18bfc99,2024-08-13T12:58:25.437000
CVE-2024-43153,1,1,d6892b2b2707b41547817a98fd9f774585fc8cb160e42b88233cc1bc03bc2631,2024-08-13T12:58:25.437000
CVE-2024-43155,0,1,287c4999c54607cdbbaa6c567e6363a70fdd399a322f10d7bfb8de455c54e4a1,2024-08-13T12:58:25.437000
CVE-2024-43156,0,1,209e25af7e43869a61a661bc9aa68a5e80bad47fac1a3024ca4c508103bd4328,2024-08-13T12:58:25.437000
CVE-2024-43150,0,0,6de4950b12d6cacfb1965ef3dda188cb2d2fd1906585dc37036c6fc8755e47fb,2024-08-13T12:58:25.437000
CVE-2024-43151,0,0,de011bf78cae48f3194648cbfaa347da48f20f07ed241954f6efc8ae6aed36db,2024-08-13T12:58:25.437000
CVE-2024-43152,0,0,a78d2db561be2842fd7056b42a96064c469ae00d9923ec0be32d48eea18bfc99,2024-08-13T12:58:25.437000
CVE-2024-43153,0,0,d6892b2b2707b41547817a98fd9f774585fc8cb160e42b88233cc1bc03bc2631,2024-08-13T12:58:25.437000
CVE-2024-43155,0,0,287c4999c54607cdbbaa6c567e6363a70fdd399a322f10d7bfb8de455c54e4a1,2024-08-13T12:58:25.437000
CVE-2024-43156,0,0,209e25af7e43869a61a661bc9aa68a5e80bad47fac1a3024ca4c508103bd4328,2024-08-13T12:58:25.437000
CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000
CVE-2024-43160,1,1,8a5c8492a8d623f9a841a809d338f2656ca38bc5054281ab69390eee01059b3f,2024-08-13T12:58:25.437000
CVE-2024-43161,0,1,5b3fe19a9477408210ad923793f5bbcba429c44c3cb16bc529d7faaebeda5495,2024-08-13T12:58:25.437000
CVE-2024-43163,0,1,caa3cdf113a3ab11749554863a7db8d8587aef6c5cb5f0606f3aecf1a29ec064,2024-08-13T12:58:25.437000
CVE-2024-43164,0,1,d8a5575e66507ebe4caef8238d01294d815454b5d00120d795b26842155b8bc2,2024-08-13T12:58:25.437000
CVE-2024-43165,1,1,321f22f7889f57803944fd7e4c404e6f09a5e8964938ace0ac9a3eaed739b09f,2024-08-13T12:58:25.437000
CVE-2024-43160,0,0,8a5c8492a8d623f9a841a809d338f2656ca38bc5054281ab69390eee01059b3f,2024-08-13T12:58:25.437000
CVE-2024-43161,0,0,5b3fe19a9477408210ad923793f5bbcba429c44c3cb16bc529d7faaebeda5495,2024-08-13T12:58:25.437000
CVE-2024-43163,0,0,caa3cdf113a3ab11749554863a7db8d8587aef6c5cb5f0606f3aecf1a29ec064,2024-08-13T12:58:25.437000
CVE-2024-43164,0,0,d8a5575e66507ebe4caef8238d01294d815454b5d00120d795b26842155b8bc2,2024-08-13T12:58:25.437000
CVE-2024-43165,0,0,321f22f7889f57803944fd7e4c404e6f09a5e8964938ace0ac9a3eaed739b09f,2024-08-13T12:58:25.437000
CVE-2024-43167,0,0,01f17fcd63c756d83b948d0875b4414e12688ba0576962ac27da499c54ee819d,2024-08-12T13:41:36.517000
CVE-2024-43168,0,0,6f1ce3e85e6cec75b3ae8101a2990b1aa3eb274cac98a0b799813d7d71452062,2024-08-12T13:41:36.517000
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
@ -257244,20 +257250,20 @@ CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
CVE-2024-43210,0,1,eaeb77da4fa7d4f4bd565f5ca7f4fe0937fdd8b99f5a61fcafda9fc48e4b5e27,2024-08-13T12:58:25.437000
CVE-2024-43213,0,1,809bb94fac9c0d77af6591a688be403cdc593318aea99b9501a335be7cbd8159,2024-08-13T12:58:25.437000
CVE-2024-43216,0,1,4363ee4c98c9d015db91fbe608570b7ac978a865f1ff69c0fde570d952f1cf5e,2024-08-13T12:58:25.437000
CVE-2024-43217,0,1,d3d721f30d15d3252b1b09e66538ef581017d89aaefc29321cd23188b4fc2d3d,2024-08-13T12:58:25.437000
CVE-2024-43218,0,1,cb315203c2f8a98c0d0babe8746ee0cb24990721585e1ba396b454836d7ecb36,2024-08-13T12:58:25.437000
CVE-2024-43210,0,0,eaeb77da4fa7d4f4bd565f5ca7f4fe0937fdd8b99f5a61fcafda9fc48e4b5e27,2024-08-13T12:58:25.437000
CVE-2024-43213,0,0,809bb94fac9c0d77af6591a688be403cdc593318aea99b9501a335be7cbd8159,2024-08-13T12:58:25.437000
CVE-2024-43216,0,0,4363ee4c98c9d015db91fbe608570b7ac978a865f1ff69c0fde570d952f1cf5e,2024-08-13T12:58:25.437000
CVE-2024-43217,0,0,d3d721f30d15d3252b1b09e66538ef581017d89aaefc29321cd23188b4fc2d3d,2024-08-13T12:58:25.437000
CVE-2024-43218,0,0,cb315203c2f8a98c0d0babe8746ee0cb24990721585e1ba396b454836d7ecb36,2024-08-13T12:58:25.437000
CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000
CVE-2024-43220,0,1,f3355b713e580dc80cbc20f0e810bb58da59d198936f60a9564d1cfa3f0d2979,2024-08-13T12:58:25.437000
CVE-2024-43224,0,1,a7b98564e040578b06f18e4ada3adb79f920860ba1a87e7d1e5de68b7fd4de88,2024-08-13T12:58:25.437000
CVE-2024-43225,0,1,7a5171f9cba75abbf653bf140e38e2754e37beb3e36b420daac64e99f63ad584,2024-08-13T12:58:25.437000
CVE-2024-43226,0,1,10b1ce847240264524adf496cd3c09f9cf2edfa6d46f7d7dea0a599473b9f5e2,2024-08-13T12:58:25.437000
CVE-2024-43227,0,1,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000
CVE-2024-43220,0,0,f3355b713e580dc80cbc20f0e810bb58da59d198936f60a9564d1cfa3f0d2979,2024-08-13T12:58:25.437000
CVE-2024-43224,0,0,a7b98564e040578b06f18e4ada3adb79f920860ba1a87e7d1e5de68b7fd4de88,2024-08-13T12:58:25.437000
CVE-2024-43225,0,0,7a5171f9cba75abbf653bf140e38e2754e37beb3e36b420daac64e99f63ad584,2024-08-13T12:58:25.437000
CVE-2024-43226,0,0,10b1ce847240264524adf496cd3c09f9cf2edfa6d46f7d7dea0a599473b9f5e2,2024-08-13T12:58:25.437000
CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000
CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000
CVE-2024-43231,0,1,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000
CVE-2024-43233,0,1,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000
CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000
CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000
@ -257270,10 +257276,10 @@ CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000
CVE-2024-4335,0,0,0ca058a6a5d3d4471e4538114fc6d3ccf52ed0e69923cf2c5461b8aef31c87bc,2024-05-14T16:11:39.510000
CVE-2024-43358,0,1,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000
CVE-2024-43359,0,1,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000
CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
CVE-2024-43360,0,1,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
@ -258563,7 +258569,7 @@ CVE-2024-5844,0,0,cb741198deb8b5f70d2d0ce9c33e3416f6a940b998b67b99e17d7bffff2c68
CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f75,2024-07-03T02:09:29.493000
CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000
CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000
CVE-2024-5849,1,1,1bc3dc3a318032710b114945324dcb1d298c8713932a88ae69ddd48463f799be,2024-08-13T13:15:13.067000
CVE-2024-5849,0,0,1bc3dc3a318032710b114945324dcb1d298c8713932a88ae69ddd48463f799be,2024-08-13T13:15:13.067000
CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000
CVE-2024-5852,0,0,17ae123c3ebaa5002b861453d278a4e3499e2a8a6baca11a20783ec79d4cdcf1,2024-08-07T22:19:34.977000
CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000
@ -258779,7 +258785,7 @@ CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d7
CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000
CVE-2024-6153,0,0,aefe9e23b8ed1d87e58382d973bdf0f329fa76bb8df894b701324ee041e253eb,2024-06-21T11:22:01.687000
CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda24384133e,2024-06-21T11:22:01.687000
CVE-2024-6158,0,0,ea462e929b181c85e24cd7a7a53cc9232157f7c818e5330b2e1c85115dde10f0,2024-08-12T13:41:36.517000
CVE-2024-6158,0,1,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
@ -258956,6 +258962,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
CVE-2024-6384,1,1,4d10b0f4a926ba3e2f92dd58623da1d2eb5638f43adc9a02940aa11e3c53539e,2024-08-13T15:15:18.567000
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
@ -259064,7 +259071,7 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d8b,2024-07-16T13:43:58.773000
CVE-2024-6558,0,1,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a702,2024-08-13T13:53:29.533000
CVE-2024-6558,0,0,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a702,2024-08-13T13:53:29.533000
CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000
CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000
CVE-2024-6562,0,0,4822995966677dab6da0f49d7f93786d3fcd323a4db6975ffff3f5978def603b,2024-08-12T13:41:36.517000
@ -259163,7 +259170,7 @@ CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c
CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
CVE-2024-6724,0,1,3e590d6e630d9269f1c064b71cf443bf2aa25c0a348b7959e4c2235e45da2e20,2024-08-13T12:58:25.437000
CVE-2024-6724,0,1,ef7cb6dd8a9fd26c655444fe0832cb6904dfb569c6b212206b0491ce3f557e3f,2024-08-13T15:35:30.033000
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
@ -259194,13 +259201,13 @@ CVE-2024-6753,0,0,79cd533ef788d1e388d91ad96dd06c23d644eb06446486c79597aa813abb65
CVE-2024-6754,0,0,bc8cde0e84d8997b1c75c8ce06ab5236a2f6d5b64ebe5ed2b11b2213361d556f,2024-07-24T12:55:13.223000
CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d4845c,2024-07-24T12:55:13.223000
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
CVE-2024-6758,0,0,8e0c8009cd76a9d4bc65a9116d366555cd008b71f0b28146b5ec5f874a85e601,2024-08-12T13:41:36.517000
CVE-2024-6759,0,0,6bdbf877165c4e693ddef2893b5c211e9fe2f04eb7b673528a8d950ccc2f083c,2024-08-12T15:35:05.710000
CVE-2024-6760,0,0,8375f9a099e5cbb4862dd7553e9d084f12b71d9ecc9e58b816e97e99161fe8e4,2024-08-12T13:41:36.517000
CVE-2024-6758,0,1,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82fe4,2024-08-13T14:58:47.857000
CVE-2024-6759,0,1,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
CVE-2024-6760,0,1,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
CVE-2024-6768,0,1,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000
CVE-2024-6768,0,0,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
CVE-2024-6772,0,0,f0ffeebc9a92372629de2eb0378ed8854f5d1b95881919ea662c83ca59f4b1a0,2024-08-06T19:35:10.307000
CVE-2024-6773,0,0,1bdc9e628b27751c087418245f6e220f86984c0c8a171e81c36efa661e11acef,2024-08-06T19:35:11.320000
@ -259214,6 +259221,7 @@ CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a
CVE-2024-6781,0,0,e24636cf8aa31acaa4171fe3fd81abcf69649ed380806bfafc0afca571326c8f,2024-08-06T16:30:24.547000
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
CVE-2024-6788,1,1,311a406131c552bba9972653d5a5960e37994669cd41448aa057a1c1acdcba2c,2024-08-13T14:15:16.457000
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
@ -259225,7 +259233,7 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
CVE-2024-6823,0,1,52c574561947d227152f00e4d9c6a8988c5a1a72d80ae8bafb80bd8bbb1cf3bc,2024-08-13T12:58:25.437000
CVE-2024-6823,0,0,52c574561947d227152f00e4d9c6a8988c5a1a72d80ae8bafb80bd8bbb1cf3bc,2024-08-13T12:58:25.437000
CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
@ -259331,7 +259339,7 @@ CVE-2024-7001,0,0,c36cc44ed743aca43eac7951b6662bd893691f9a45d57142d09098c4fe318e
CVE-2024-7003,0,0,c2f51c1b71164a15818ef9209a48a467e859077ffdde417023c4b7a222f91993,2024-08-07T19:52:18.500000
CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa444,2024-08-07T21:32:44.190000
CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000
CVE-2024-7006,0,0,d9b22c9d2489a41f77077e91587898b3e051ca6f21314114fd319370a63daa3c,2024-08-12T13:41:36.517000
CVE-2024-7006,0,1,e6fa209ac0713e033e0ece6a5e36f45d5c69970bc1d46f1daeb274aa6fa96cd4,2024-08-13T15:14:35.167000
CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000
CVE-2024-7008,0,0,ff87d478ca9fb0d6caf6b0aaa7fee862b967b7c728a593ac30af375f28788cbc,2024-08-06T16:30:24.547000
CVE-2024-7009,0,0,922a39893536ffa7ba5eb09abd072489ca61d5474d3ecc496a4eea933227f8f1,2024-08-06T16:30:24.547000
@ -259357,20 +259365,20 @@ CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb
CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000
CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
CVE-2024-7092,0,1,9030e5869b3304fe7dc9c949d83c78ae02d5009d293df488c4e00b5311be7254,2024-08-13T12:58:25.437000
CVE-2024-7092,0,0,9030e5869b3304fe7dc9c949d83c78ae02d5009d293df488c4e00b5311be7254,2024-08-13T12:58:25.437000
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
CVE-2024-7094,0,1,b526dd0911dfd9daed075da4e35dab126ea18489318abfa41d36277d3b51e52c,2024-08-13T12:58:25.437000
CVE-2024-7094,0,0,b526dd0911dfd9daed075da4e35dab126ea18489318abfa41d36277d3b51e52c,2024-08-13T12:58:25.437000
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
CVE-2024-7106,0,0,4f79551bb831c41c367c51b2f81bdf75eb9c94a2549b6a3ae035069141d77523,2024-07-26T12:38:41.683000
CVE-2024-7106,0,1,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
CVE-2024-7116,0,0,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
CVE-2024-7117,0,0,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
CVE-2024-7118,0,0,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
CVE-2024-7120,0,1,dd88c4d4f5099fe6bbb2fa59d0942931f85db230d235608307fdbb069312e6ec,2024-08-13T14:06:57.033000
CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
CVE-2024-7127,0,0,6b292748e8421eae2ee17ad044bc14a6084b68762b6284b02f94a1dd672b3c81,2024-07-30T13:32:45.943000
@ -259448,10 +259456,10 @@ CVE-2024-7221,0,0,02cd03e9ef3ccd1f72402ea0e75f79a9dec8b0d0078985051014154600786d
CVE-2024-7222,0,0,85ba08369eda71d16b07ac17d1af0b3986f6f47434f835c28f727fa262a05b37,2024-07-30T13:32:45.943000
CVE-2024-7223,0,0,fb4ad2671317976e5224b8b90488cd911f8b35bdfcac7bcf593fd9864e14b346,2024-07-30T13:32:45.943000
CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e85,2024-07-30T13:32:45.943000
CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000
CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000
CVE-2024-7225,0,1,f6b7a5a2ac3e59704ed6ff994e447ad38c84eed49d8cb19f1c1208cd01aab3b3,2024-08-13T14:17:10.833000
CVE-2024-7226,0,1,7be6f6e57b1777b742474ebcd204597686d04a1987b04bb682ec599818c11481,2024-08-13T14:19:04.147000
CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000
CVE-2024-7247,0,1,eb5e75877fc91cdfa22ecde75bfd097e2a5623f360394e2fce143a5a857b5335,2024-08-13T12:58:25.437000
CVE-2024-7247,0,0,eb5e75877fc91cdfa22ecde75bfd097e2a5623f360394e2fce143a5a857b5335,2024-08-13T12:58:25.437000
CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000
CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
@ -259464,7 +259472,7 @@ CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee6358
CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000
CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000
CVE-2024-7267,0,0,e8d85bd26709e9a7a3dc4e8006f3b5201faefcb4aaf4ea4c1f6b8820dbe896ef,2024-08-07T15:17:46.717000
CVE-2024-7272,0,0,0f67148a9aeb9690a6127129eb8401c0ea94a7712c477502b006aff587074ccf,2024-08-12T13:41:36.517000
CVE-2024-7272,0,1,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000
CVE-2024-7273,0,0,c54f0201f662353be4c71178ecb2b70feeb3be7ae1969d571fa06d849250755c,2024-07-31T12:57:02.300000
CVE-2024-7274,0,0,220f148f22e0cdfff330f0ce278ee81a3638cc1ec9363d1b8e0bf68b06a6b216,2024-07-31T12:57:02.300000
CVE-2024-7275,0,0,74aabb34c99755fa1fb9c0f4de607d1cfcf582865a86e88bc2523c63afbfed31,2024-07-31T12:57:02.300000
@ -259481,8 +259489,8 @@ CVE-2024-7285,0,0,1588f00f62b622cbfe8e88ee83ac742c519c9cf7e893a632f8c10ba375a45e
CVE-2024-7286,0,0,faf5f04a7f582a69db088974c15a9d76aed7a5cd16aa3e7b0bbf476907a53b79,2024-08-12T17:35:47.387000
CVE-2024-7287,0,0,93289282af448153bcdbd5dfb7b4392092f8580ba2a45cc433658e8ca1c7086d,2024-08-12T17:35:25.170000
CVE-2024-7288,0,0,ce128fba82f710d2fd0c96fce3ed58ae6ba7550cb19d04b8a2d7b8e427ff3a89,2024-08-12T17:35:06.740000
CVE-2024-7289,0,0,a709df24f87a0f503a11766c66b03ca94607de4e52c2ab315e56364f32619286,2024-07-31T12:57:02.300000
CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2bdb,2024-07-31T12:57:02.300000
CVE-2024-7289,0,1,6b18fe26b5b26ad6475bd507b3c2a7b6582d96d6d346bf45be6ab6646e91fd65,2024-08-13T14:53:09.637000
CVE-2024-7290,0,1,b7cc572b30062b1b5d10bc08d69cddffa31fb5f05e0fc8c35fce33ff6506b95c,2024-08-13T14:53:34.777000
CVE-2024-7291,0,0,298cd3a818c66e9bf797d2d090f42649293656283b8daab213f19385b28931e8,2024-08-05T12:41:45.957000
CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000
CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000
@ -259490,11 +259498,11 @@ CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799a
CVE-2024-7302,0,0,3e3978a555cf8f7617492d06d41673a59c5323c552cb9b37b079247ec7c0af88,2024-08-01T12:42:36.933000
CVE-2024-7303,0,0,9520f852975600abd145b384cdd7bd5ee8f54af62f4a78fc6dcf9ca25a845304,2024-08-12T16:47:04.740000
CVE-2024-7306,0,0,3c865c91ac7fc6c8c32a68429064dd89f6391277f467a5bdc571f15092dbadd4,2024-08-12T16:33:51.090000
CVE-2024-7307,0,0,8476095e81ec710e7e9c3722c19632483eaa5873e650b0691bf646c8feee1673,2024-07-31T12:57:02.300000
CVE-2024-7308,0,0,7e62114ea2d3b6c1a5a8ade9366399ea87a812a2d0e1a6a097a837e22fa3ec32,2024-07-31T12:57:02.300000
CVE-2024-7309,0,0,5ccfece9a195af2bcab33eeb76ed6d8e998f45daf1218b4a428e39ed3952e4a4,2024-07-31T12:57:02.300000
CVE-2024-7310,0,0,c85c13e977bb78ddae23c7df7677c3a96f9884de3a7996e4498df3ced955ce83,2024-07-31T12:57:02.300000
CVE-2024-7311,0,0,049be7cb97674b9bc8fe5857eef44c6cbc0ed5d4b959c108694f8fb2cd9e1f95,2024-07-31T12:57:02.300000
CVE-2024-7307,0,1,480862c25d62bf3086f9355b511b9f3605564a857f38684f6972ff45c488e191,2024-08-13T14:55:05.840000
CVE-2024-7308,0,1,ff0d49d6715bec6a8fa55cef81ae277660d9ae735dc8eb5d8914001060fb3804,2024-08-13T14:57:18.157000
CVE-2024-7309,0,1,0631cf8eb1a47dc64ba800513d438efa35db01116b03be489171df88adabbf79,2024-08-13T15:00:09.397000
CVE-2024-7310,0,1,47e814cc1f6c23f028dc19cfddb4fbb249afc7dd33c54329c346df582cc3dfbb,2024-08-13T15:01:01.970000
CVE-2024-7311,0,1,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda21,2024-08-13T15:03:33.910000
CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000
@ -259549,13 +259557,13 @@ CVE-2024-7377,0,0,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f
CVE-2024-7378,0,0,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000
CVE-2024-7382,0,0,01c5212f4fa00121002fa8baa527f3a77d1bda25dc068526094d170157a300b3,2024-08-12T13:41:36.517000
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
CVE-2024-7388,0,1,bb72044a27986ef0580bf78cdca606f48dbe32542e4985653f4ae8cb4f4bae98,2024-08-13T12:58:25.437000
CVE-2024-7388,0,0,bb72044a27986ef0580bf78cdca606f48dbe32542e4985653f4ae8cb4f4bae98,2024-08-13T12:58:25.437000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7394,0,0,29459446676ebb07a97678c0a588cd4da58f4cf687ed192aec71d6f9cff45400,2024-08-08T18:55:19.180000
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
CVE-2024-7399,0,0,d30b708a498ec985717002912d6f2ea5c7e57732418cf84055f23239b601747d,2024-08-12T13:41:36.517000
CVE-2024-7399,0,1,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000
CVE-2024-7408,0,0,728d92cb3e4bd7993413f2cb9d202dd3d05ca4e90a7d6c8b19000edc1b4dbe7d,2024-08-12T13:41:36.517000
CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000
CVE-2024-7410,0,0,247c090cb12333e31f3a0efea00d18747dfe5a3d5c256e6005fe0d4e1c4d1667,2024-08-12T13:41:36.517000
@ -259663,7 +259671,7 @@ CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cd
CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000
CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000
CVE-2024-7589,0,0,ec264cfa06d74adc18884d15f0bb08d50afb3ff7b46d5f725f942909f4b4dc96,2024-08-12T16:35:05.763000
CVE-2024-7590,0,1,c52a6d4cf8dfd970a8fe3a13dd0d7de54ec6ad3618ea0cc5513929656d029f44,2024-08-13T12:58:25.437000
CVE-2024-7590,0,0,c52a6d4cf8dfd970a8fe3a13dd0d7de54ec6ad3618ea0cc5513929656d029f44,2024-08-13T12:58:25.437000
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
CVE-2024-7613,0,0,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000
CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000
@ -259711,9 +259719,9 @@ CVE-2024-7693,0,0,21750a5e6660c45557c197a1268fead46b4ed04e41025b7b6ec8827e0452be
CVE-2024-7694,0,0,7eb01f663f1a6ae6fa8d343bc54dd9427e90e5a6b166e3bddc2347c03fdce95f,2024-08-12T13:41:36.517000
CVE-2024-7697,0,0,509c155762486c19cfc0dceb2044f7d5dc23072793fd0a597d3f1e860d0ba6cd,2024-08-12T15:35:07.293000
CVE-2024-7700,0,0,a9f0ec07b98990fe42b46daef65c8e0b5a8fa0712121f2027b841fccbefa3e8e,2024-08-12T18:57:17.383000
CVE-2024-7704,0,1,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000
CVE-2024-7705,0,1,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b52f,2024-08-13T12:58:25.437000
CVE-2024-7706,0,1,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
CVE-2024-7707,0,1,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
CVE-2024-7709,0,1,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000
CVE-2024-7715,0,1,643ae05734832b0ffcf6472f2acff2b54708732000601789527e246cea7413e5,2024-08-13T12:58:25.437000
CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000
CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b52f,2024-08-13T12:58:25.437000
CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000
CVE-2024-7715,0,0,643ae05734832b0ffcf6472f2acff2b54708732000601789527e246cea7413e5,2024-08-13T12:58:25.437000

Can't render this file because it is too large.