Auto-Update: 2024-08-16T18:00:17.215682+00:00

This commit is contained in:
cad-safe-bot 2024-08-16 18:03:13 +00:00
parent 4e93a6d71f
commit 290ab88b79
58 changed files with 3651 additions and 337 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-6748",
"sourceIdentifier": "secalert@redhat.com",
"published": "2017-09-25T17:29:00.490",
"lastModified": "2020-01-27T00:15:10.553",
"vulnStatus": "Modified",
"lastModified": "2024-08-16T16:09:58.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -86,8 +86,24 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jsoup:jsoup:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.6.0",
"versionEndExcluding": "1.8.3",
"matchCriteriaId": "FE38C5CA-5335-4547-9564-72147FEF3A64"
"matchCriteriaId": "1C802FF9-AAAC-4AE3-9BAE-8E5F05B3CC1B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
@ -106,6 +122,7 @@
"url": "http://www.securityfocus.com/bid/76504",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -142,7 +159,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00021.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-20227",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-12-19T11:29:01.920",
"lastModified": "2019-01-07T14:38:22.633",
"lastModified": "2024-08-16T16:09:23.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eclipse:rdf4j:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "96E45985-FA15-4DB2-9BC1-CBAF8A7956A0"
"criteria": "cpe:2.3:a:eclipse:rdf4j:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.0",
"matchCriteriaId": "A87007A4-F9E4-4592-A805-6AEC9213AD43"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-29631",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-06T21:15:08.697",
"lastModified": "2022-06-14T17:03:37.153",
"lastModified": "2024-08-16T16:11:20.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,10 +85,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jodd:http:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:jodd:jodd_http:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndIncluding": "6.2.1",
"matchCriteriaId": "E86AA75D-BD93-4E0F-A196-CAF5A31ECB63"
"versionEndExcluding": "6.2.1",
"matchCriteriaId": "AA7523BB-2371-44AA-873B-3006F18A8653"
}
]
}
@ -101,6 +101,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
@ -109,6 +110,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46089",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T02:15:51.337",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-08-16T17:35:01.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) en Online Flight Booking Management System v1.0 permite a los atacantes ejecutar scripts web arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de la aerol\u00ednea."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2022-46089/blob/main/CVE-35",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-07T09:15:38.107",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-08-16T17:35:02.057",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Sourcecodester Lost and Found Information System's Version 1.0 es vulnerable a una inyecci\u00f3n SQL no autenticada en \"?page=items/view&id=*\" que puede escalarse a la ejecuci\u00f3n remota de comandos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2023-33676/blob/main/CVE-30",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40109",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.260",
"lastModified": "2024-02-16T13:37:55.033",
"lastModified": "2024-08-16T16:35:00.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En createFromParcel de UsbConfiguration.java, existe un posible inicio de actividad en segundo plano (BAL) debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/387d258cf10a30537fc48dc0e48d28071efa92e7",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:55.837",
"lastModified": "2024-03-13T12:33:51.697",
"lastModified": "2024-08-16T17:35:02.787",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross Site Scripting en My Food Recipe usando PHP con c\u00f3digo fuente v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el nombre de la receta, el procedimiento y los par\u00e1metros de los ingredientes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2023-43292/blob/main/CVE-8",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51141",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T01:22:43.520",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-08-16T16:35:01.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en ZKTeko BioTime v.8.5.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente Autenticaci\u00f3n y Autorizaci\u00f3n"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "http://biotime.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22543",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-27T01:15:06.980",
"lastModified": "2024-02-27T14:20:06.637",
"lastModified": "2024-08-16T17:35:03.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en Linksys Router E1700 1.0.04 (compilaci\u00f3n 3), que permite a atacantes autenticados escalar privilegios a trav\u00e9s de una solicitud GET manipulada al URI /goform/* o mediante la funci\u00f3n ExportSettings."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://mat4mee.notion.site/Leaked-SessionID-can-lead-to-authentication-bypass-on-the-Linksys-Router-E1700-f56f9c4b15e7443fa237bd1b101a18d2",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23755",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-23T22:15:07.827",
"lastModified": "2024-03-25T01:51:01.223",
"lastModified": "2024-08-16T17:35:04.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "ClickUp Desktop anterior a 3.3.77 en macOS y Windows permite la inyecci\u00f3n de c\u00f3digo debido a Electron Fuses espec\u00edficos. Existe una protecci\u00f3n inadecuada contra la inyecci\u00f3n de c\u00f3digo a trav\u00e9s de configuraciones como RunAsNode."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://clickup.com/security/disclosures",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24724",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T03:15:09.173",
"lastModified": "2024-04-03T12:38:04.840",
"lastModified": "2024-08-16T16:35:03.010",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Gibbon hasta 26.0.00 permite /modules/School%20Admin/messengerSettings.php la inyecci\u00f3n de plantilla del lado del servidor que conduce a la ejecuci\u00f3n remota de c\u00f3digo porque la entrada se pasa al motor de plantilla Twig (messengerSettings.php) sin sanitizaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://gibbonedu.org/download/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25090",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-26T09:15:09.700",
"lastModified": "2024-07-26T12:38:41.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T17:56:31.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "La validaci\u00f3n de entrada y sanitizaci\u00f3n insuficientes de las funciones Profile name & screenname, Bookmark name & description and blogroll name en todas las versiones de Apache Roller en todas las plataformas permite que un usuario autenticado realice un ataque de XSS. Mitigaci\u00f3n: si no tiene Roller configurado para usuarios no confiables, entonces no necesita hacer nada porque conf\u00eda en que sus usuarios creen HTML sin formato y otro contenido web. Si est\u00e1 ejecutando con usuarios no confiables, entonces debe actualizar a Roller 6.1.3. Este problema afecta a Apache Roller: desde 5.0.0 hasta 6.1.3. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.1.3, que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -32,10 +55,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "6.1.3",
"matchCriteriaId": "34B9206D-CB9B-49BD-8162-CEFAE5C287E3"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/lb50jqyxwf8jrfpydl6dc5zpqtpgrrwd",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25164",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T00:15:52.400",
"lastModified": "2024-03-05T13:41:01.900",
"lastModified": "2024-08-16T16:35:03.903",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad iA Path Traversal existe en iDURAR v2.0.0, que permite a atacantes no autenticados exponer archivos confidenciales a trav\u00e9s de la funcionalidad de descarga."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/idurar/idurar-erp-crm/tree/2.0.0/routes/erpRoutes/erpDownloadRouter.js",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25288",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T17:15:09.817",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-16T17:35:05.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "SLIMS (Senayan Library Management Systems) 9 Bulian v9.6.1 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de pop-scope-vocabolary.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-pop_scope_vocabolary.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25386",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T06:15:48.390",
"lastModified": "2024-03-13T04:15:07.960",
"lastModified": "2024-08-16T17:35:06.100",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Directory Traversal en DICOM\u00ae Connectivity Framework de laurelbridge anterior a v.2.7.6b permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo format_logfile.pl."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25410",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-26T16:27:58.960",
"lastModified": "2024-04-03T21:15:31.220",
"lastModified": "2024-08-16T17:35:06.847",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "flusity-CMS 2.33 es vulnerable a la carga sin restricciones de archivos con tipo peligroso en update_setting.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/flusity/flusity-CMS/commit/b99de3bd05677e8b61c04a70235faa6001556b3b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27182",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-02T10:16:00.250",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:55:10.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,8 +15,41 @@
"value": "En Apache Linkis <= 1.5.0, la eliminaci\u00f3n arbitraria de archivos en los servicios de administraci\u00f3n b\u00e1sicos puede provocar que un usuario con una cuenta de administrador elimine cualquier archivo al que tenga acceso el usuario del sistema Linkis. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.6.0, que soluciona este problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
@ -28,10 +61,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.2",
"versionEndExcluding": "1.6.0",
"matchCriteriaId": "A34962F7-E33B-4593-99EE-B99AE33E5130"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/2of1p433h8rbq2bx525rtftnk19oz38h",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27497",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T15:15:08.580",
"lastModified": "2024-03-01T15:23:36.177",
"lastModified": "2024-08-16T16:35:04.793",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Linksys E2000 Ver.1.0.06 build 1 es vulnerable a la omisi\u00f3n de autenticaci\u00f3n a trav\u00e9s del archivo position.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-04T14:15:41.587",
"lastModified": "2024-03-04T15:35:25.673",
"lastModified": "2024-08-16T16:35:05.530",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cgi y seama.cgi en D-Link GORTAC750_A1_FW_v101b03 permite a atacantes remotos inyectar script web o HTML arbitrarios a trav\u00e9s del par\u00e1metro url."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1qu4iBQGeAwolTXjVOTXsAAusSHo2ie-Y/view",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-27730",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T19:15:18.663",
"lastModified": "2024-08-15T19:15:18.663",
"lastModified": "2024-08-16T16:35:06.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in Friendica v.2023.12 allows a remote attacker to obtain sensitive information and execute arbitrary code via the cid parameter of the calendar event feature."
},
{
"lang": "es",
"value": " La vulnerabilidad de permisos inseguros en Friendica v.2023.12 permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro cid de la funci\u00f3n de eventos del calendario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/friendica/friendica/pull/13927",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27744",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T22:15:47.870",
"lastModified": "2024-03-13T07:15:36.410",
"lastModified": "2024-08-16T16:35:07.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross-Site Scripting en Petrol Pump Mangement Software v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro de imagen en el componente profile.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27881",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.807",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T17:37:25.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,120 @@
"value": " Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda acceder a informaci\u00f3n sobre los contactos de un usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7.6",
"matchCriteriaId": "EA924D87-8FAE-4E34-83F7-A5E25C7450E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13",
"versionEndExcluding": "13.6.8",
"matchCriteriaId": "389354D3-A504-48B7-A379-B894963B2B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14",
"versionEndExcluding": "14.6",
"matchCriteriaId": "3A459550-0BAE-4843-96F0-39780516D4A9"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28418",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T13:15:53.833",
"lastModified": "2024-03-14T14:21:20.217",
"lastModified": "2024-08-16T16:35:08.140",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Webedition CMS 9.2.2.0 tiene una vulnerabilidad de carga de archivos a trav\u00e9s de /webEdition/we_cmd.php"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://gitee.com/shavchen214/pwn/issues/I94VI3",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28964",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-12T15:15:50.647",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:44:09.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:common_event_enabler:*:*:*:*:*:windows:*:*",
"versionEndIncluding": "8.9.10.0",
"matchCriteriaId": "F0DBDBFB-2C27-4F9A-BEB8-D591BDE733B5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000224987/dsa-2024-179-security-update-for-dell-emc-common-event-enabler-windows-for-cavatools-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29157",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:15:31.520",
"lastModified": "2024-05-14T16:13:02.773",
"lastModified": "2024-08-16T16:35:08.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5HG_read, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32316",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T16:15:09.013",
"lastModified": "2024-04-17T16:51:07.347",
"lastModified": "2024-08-16T16:35:09.793",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El firmware Tenda AC500 V2.0.1.9(1307) tiene una vulnerabilidad de desbordamiento de pila en la funci\u00f3n fromDhcpListClient."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32609",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:36:45.683",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-16T16:35:10.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La librer\u00eda HDF5 hasta 1.14.3 permite el consumo de pila en la funci\u00f3n H5E_printf_stack en H5Eint.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"references": [
{
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32860",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-13T13:15:49.517",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:46:36.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,631 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.26.0",
"matchCriteriaId": "6D3E1671-D766-4BEE-A382-3F9950540382"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D355D92F-71AB-4D6D-9D3D-85A0BF4133E5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.24",
"matchCriteriaId": "09B0F2CD-223E-4C11-896E-E0D2AED3D7CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C32F25E-2F1F-409D-85DF-15CCAB423DD5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.25",
"matchCriteriaId": "6D3892D1-FA31-4E08-8C4A-B233A7E6166E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F0C34FD-6A6D-43BF-B548-13D57532AF8C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.19",
"matchCriteriaId": "2BA98A09-CEC8-4765-9F67-1B8E31A403BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*",
"matchCriteriaId": "486DCCF7-79D9-45C1-8CBD-26FB78705F91"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.12",
"matchCriteriaId": "502B41A3-DA11-4F02-ADBA-12BAEB90E9D9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2943649A-0559-4184-AE43-B6FCEDF3BF98"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.13.0",
"matchCriteriaId": "34DF7BEA-2EF9-47A8-965D-C045C793F834"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "503027CC-7D9B-4F00-9728-48C12B18BD7B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.18.0",
"matchCriteriaId": "2C2FE0D4-FEFE-4E9D-BFCA-5EAC643E47A1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66B64687-CF02-414E-B961-84A011DC49E6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.27.0",
"matchCriteriaId": "CBC6538F-95F5-411B-9AEE-E330D33F765E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCCE762E-FB6C-4493-A21F-347DE5CB57E0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.21.0",
"matchCriteriaId": "7EE1A9B5-8534-4DAE-957E-FF670060C35A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B084185F-1C0D-47D9-9F72-A79095462428"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.27.0",
"matchCriteriaId": "626441E2-E195-4E18-B5CF-093CE2706827"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.21.0",
"matchCriteriaId": "3E92F1AF-4259-40FA-BD64-2B5E36DB815B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C631E678-90F0-4DB2-8AB8-7378EC32FAC0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.18.0",
"matchCriteriaId": "84A10F10-F9C8-4FF0-8F28-BCBDABE8C8EA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05928944-E647-4A4D-AEA1-B67804BC7DB5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.22.0",
"matchCriteriaId": "69E828F7-2199-470B-B3F3-251704F4BAA4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.20.0",
"matchCriteriaId": "D9A38198-F80D-4D7C-B660-8B5B44C95751"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A254E353-E519-401F-8657-76C7625F9A0C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.22.0",
"matchCriteriaId": "AF468943-A697-46B0-A8DF-3D9F329E87D6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.20.0",
"matchCriteriaId": "07378EE2-F446-4E05-A6C3-42532865C664"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C0272BD-DAFD-47EC-9B70-F72B686032B8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "F084A15D-0C77-4AC7-A2E8-CCE5B638C968"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A86161-7209-4DC6-9315-66C37C1807DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.19.0",
"matchCriteriaId": "2CB354C9-725F-41D3-A514-C61D1E2C6DD9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B4D72F-BF7F-4AE3-825E-394DF12F0482"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:inspiron_15_352_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.14.0",
"matchCriteriaId": "AF372BE7-5B95-4DF7-A85A-22B92D3931BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:inspiron_15_352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "807B8FFB-4AB1-43B3-B2E6-BA53D1244437"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.16.0",
"matchCriteriaId": "36119F09-7608-4DD7-A5BC-297D015F9FE8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52628A84-FEE1-4194-A13F-4139A3A0AE9F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.19.0",
"matchCriteriaId": "54398C42-AD80-4365-8F44-F3B6F44D33F5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5944D668-16F9-4098-A99E-811F02C65B2A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.0",
"matchCriteriaId": "4C42BB7D-2380-4FA9-8C5C-FE0F594B3A7F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E75E14FE-EDC4-43F8-960C-F135EDFFBDCB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000223440/dsa-2024-125",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32918",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-06-13T21:15:55.683",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T17:49:01.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,66 @@
"value": "Omisi\u00f3n de permiso que permite a los atacantes desactivar el cifrado HDCP 2.2 al no completar los pasos de inicializaci\u00f3n del intercambio de claves HDCP"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-06-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33212",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-23T15:15:50.090",
"lastModified": "2024-04-24T13:39:42.883",
"lastModified": "2024-08-16T16:35:11.323",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro funcpara1 en ip/goform/setcfm."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://palm-vertebra-fe9.notion.site/formSetCfm-7d199da0fd0740988a498304905e2dd1",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34686",
"sourceIdentifier": "cna@sap.com",
"published": "2024-06-11T03:15:11.080",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T17:54:46.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@sap.com",
"type": "Secondary",
@ -51,14 +71,108 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:103:*:*:*:*:*:*:*",
"matchCriteriaId": "D84BD4DE-15D9-4201-9A31-0A20F36D19AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:104:*:*:*:*:*:*:*",
"matchCriteriaId": "E5511CFF-7BEF-46FE-BE5B-2445BC540BAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:105:*:*:*:*:*:*:*",
"matchCriteriaId": "5295DFAB-ACDA-49DD-B2E6-07F6D4F3DC85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:106:*:*:*:*:*:*:*",
"matchCriteriaId": "99A1D12E-2E49-4C4A-9732-CCB2328AD838"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:107:*:*:*:*:*:*:*",
"matchCriteriaId": "FE65B3D9-B97C-4016-B432-CD79F104BE6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*",
"matchCriteriaId": "2F220D25-9344-482A-A36C-9D743EA55DE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:730:*:*:*:*:*:*:*",
"matchCriteriaId": "B0075805-C6FC-4E0D-9E1B-6ABA3A69F6C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*",
"matchCriteriaId": "48791122-7265-4C51-8AEB-DEBC199F9A7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EEA160-B4B4-45E9-84C8-C26E52D6F329"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*",
"matchCriteriaId": "8BDBE717-ADB6-4080-A198-E468080F82B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8775BD-EAB8-4F08-B65D-35B704C0E36B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*",
"matchCriteriaId": "2BFCEADC-7359-470F-A412-5B2808CF6069"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*",
"matchCriteriaId": "A387786F-F4F6-44FC-B969-6FB92A1AA096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:s4fnd_102:*:*:*:*:*:*:*",
"matchCriteriaId": "115FB1F7-4C37-4519-AEEF-93E33FCEB745"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:webcuif_700:*:*:*:*:*:*:*",
"matchCriteriaId": "757BEDCD-BB4D-4F29-B6D7-41861286122E"
}
]
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3465129",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,59 @@
"id": "CVE-2024-34741",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.820",
"lastModified": "2024-08-15T22:15:06.820",
"lastModified": "2024-08-16T16:35:12.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": " En setForceHideNonSystemOverlayWindowIfNeeded de WindowState.java, existe una forma posible de que el contenido del mensaje sea visible en el protector de pantalla mientras el usuario restringe la configuraci\u00f3n de visibilidad de la pantalla de bloqueo debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-783"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/abfaf702ef833dc4d374492d45c615c6e6de7f01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36821",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-11T18:15:13.927",
"lastModified": "2024-08-01T13:53:17.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:33:38.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:velop_whw0101_firmware:1.1.13.202617:*:*:*:*:*:*:*",
"matchCriteriaId": "B38C1D00-1410-4536-9DD4-B0C98871999B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:velop_whw0101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62FDA4EB-13BE-4CD6-9E35-9DE76F6F9C06"
}
]
}
]
}
],
"references": [
{
"url": "https://downloads.linksys.com/support/assets/releasenotes/WHW01_VLP01_1.1.13.202617_Customer_Release_Notes.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/IvanGlinkin/CVE-2024-36821",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37293",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-11T17:16:04.237",
"lastModified": "2024-06-13T18:36:09.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:11:53.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,22 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:aws_deployment_framework:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.0",
"matchCriteriaId": "F3858F8E-B54E-4077-B22D-161EE66B0A73"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/awslabs/aws-deployment-framework/pull/732",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/awslabs/aws-deployment-framework/releases/tag/v4.0.0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/awslabs/aws-deployment-framework/security/advisories/GHSA-mcj7-ppmv-h6jr",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38115",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:12.080",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T16:32:49.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del complemento de administraci\u00f3n de enrutamiento IP de Windows"
}
],
"metrics": {
@ -37,8 +41,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,10 +61,125 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38116",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:12.333",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T16:36:12.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del complemento de administraci\u00f3n de enrutamiento IP de Windows"
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -47,10 +61,125 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38117",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:12.570",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T16:40:43.667",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NTFS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de NTFS"
}
],
"metrics": {
@ -37,8 +41,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,10 +61,125 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38117",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38118",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:12.817",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T16:41:04.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servidor de la Autoridad de seguridad local (LSA) de Microsoft"
}
],
"metrics": {
@ -47,10 +51,125 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38120",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:13.047",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T17:12:59.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)"
}
],
"metrics": {
@ -37,8 +41,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,10 +61,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38120",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38121",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:13.320",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T17:13:28.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)"
}
],
"metrics": {
@ -37,8 +41,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,10 +61,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38121",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38122",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-13T18:15:13.613",
"lastModified": "2024-08-14T02:07:05.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T17:16:41.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servidor de la Autoridad de seguridad local (LSA) de Microsoft"
}
],
"metrics": {
@ -47,10 +51,125 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20751",
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4780",
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4780",
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3147",
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4037",
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4037",
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.1457",
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.9200.25031",
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7259",
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6189",
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2655",
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1085",
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38122",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41962",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-01T17:16:09.507",
"lastModified": "2024-08-02T12:59:43.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:34:48.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,22 +81,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yonle:bostr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.10",
"matchCriteriaId": "572ED35B-69A0-4DD8-9764-8AC380AEF2F7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yonle/bostr/blob/8665374a66e2afb9f92d0414b0d6f420a95d5d2d/auth.js#L21",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Yonle/bostr/commit/49181f4ec9ae1472c6675cab56bbc01e723855af",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Yonle/bostr/releases/tag/3.0.10",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/Yonle/bostr/security/advisories/GHSA-5cf7-cxrf-mq73",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42461",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-02T07:16:10.230",
"lastModified": "2024-08-07T19:35:13.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T16:51:40.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elliptic_project:elliptic:6.5.6:*:*:*:*:node.js:*:*",
"matchCriteriaId": "EAFFCBB8-D7CC-49D0-A052-D1FAAF4F3C33"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/indutny/elliptic/pull/317",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-42480",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-12T16:15:15.750",
"lastModified": "2024-08-12T18:57:29.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T16:24:40.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an \"open at the top\" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2."
},
{
"lang": "es",
"value": "Kamaji es el administrador del plano de control alojado para Kubernetes. En las versiones 1.0.0 y anteriores, Kamaji utiliza una definici\u00f3n de rango \"abierto en la parte superior\" en RBAC para funciones etcd, lo que permite que algunos servidores API de TCP puedan leer, escribir y eliminar los datos de otros planos de control. Esta vulnerabilidad se solucion\u00f3 en edge-24.8.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clastix:kamaji:*:*:*:*:*:*:*:*",
"versionEndExcluding": "edge-24.8.2",
"matchCriteriaId": "442C676D-6F12-40B2-B23E-A45A3E94B7A0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/clastix/kamaji/blob/8cdc6191242f80d120c46b166e2102d27568225a/internal/datastore/etcd.go#L19-L24",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/clastix/kamaji/commit/1731e8c2ed5148b125ecfbdf091ee177bd44f3db",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/clastix/kamaji/security/advisories/GHSA-6r4j-4rjc-8vw5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42634",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T16:15:06.670",
"lastModified": "2024-08-16T16:15:06.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Command Injection vulnerability exists in formWriteFacMac of the httpd binary in Tenda AC9 v15.03.06.42. As a result, attacker can execute OS commands with root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/goldds96/Report/blob/main/Tenda/AC9/CI.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42946",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:19.097",
"lastModified": "2024-08-15T19:31:54.883",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-16T17:35:08.227",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 (408) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro page en la funci\u00f3n fromVirtualSer. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-42955",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:19.990",
"lastModified": "2024-08-15T19:29:55.033",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-16T17:35:08.957",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 (408) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro page en la funci\u00f3n fromSafeClientFilter. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42976",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:20.767",
"lastModified": "2024-08-16T13:31:28.890",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-16T17:35:09.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42985",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:21.623",
"lastModified": "2024-08-16T13:29:27.497",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-16T17:35:10.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42994",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T17:15:15.153",
"lastModified": "2024-08-16T17:15:15.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VTiger CRM <= 8.1.0 does not properly sanitize user input before using it in a SQL statement, leading to a SQL Injection in the \"CompanyDetails\" operation of the \"MailManager\" module."
}
],
"metrics": {},
"references": [
{
"url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42995",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T17:15:15.273",
"lastModified": "2024-08-16T17:15:15.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VTiger CRM <= 8.1.0 does not correctly check user privileges. A low-privileged user can interact directly with the \"Migration\" administrative module to disable arbitrary modules."
}
],
"metrics": {},
"references": [
{
"url": "https://www.shielder.com/advisories/vtiger-migration-bac/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43044",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-08-07T14:15:33.000",
"lastModified": "2024-08-07T15:17:46.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T17:19:30.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,73 @@
"value": "Jenkins 2.470 y anteriores, LTS 2.452.3 y anteriores permiten que los procesos del agente lean archivos arbitrarios del sistema de archivos del controlador Jenkins mediante el m\u00e9todo `ClassLoaderProxy#fetchJar` en la librer\u00eda Remoting."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.452.4",
"matchCriteriaId": "0041C764-EA61-4445-9696-65E22A678FD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndExcluding": "2.471",
"matchCriteriaId": "1139DB12-D88F-4E0D-B22F-2A147B1EFD31"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43045",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-08-07T14:15:33.077",
"lastModified": "2024-08-07T15:17:46.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-16T17:21:26.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,73 @@
"value": "Jenkins 2.470 y anteriores, LTS 2.452.3 y anteriores no realizan una verificaci\u00f3n de permisos en un endpoint HTTP, lo que permite a los atacantes con permiso general/lectura acceder a \"Mis vistas\" de otros usuarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.452.4",
"matchCriteriaId": "0041C764-EA61-4445-9696-65E22A678FD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndExcluding": "2.471",
"matchCriteriaId": "1139DB12-D88F-4E0D-B22F-2A147B1EFD31"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3349",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5976",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-13T21:15:57.683",
"lastModified": "2024-06-17T12:43:31.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T17:53:25.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xu-Mingming/cve/blob/main/sql.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description"
]
},
{
"url": "https://vuldb.com/?ctiid.268422",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.268422",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.355692",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-6134",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-12T13:38:38.780",
"lastModified": "2024-08-12T13:41:36.517",
"lastModified": "2024-08-16T17:35:11.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.6 no desinfecta ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/34d61f7e-90eb-4a64-a8a7-18f2d6518118/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6239",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-21T14:15:14.007",
"lastModified": "2024-06-24T19:06:27.537",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-16T16:15:06.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -125,6 +125,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:5305",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6239",
"source": "secalert@redhat.com",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-16T16:02:30.402064+00:00
2024-08-16T18:00:17.215682+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-16T16:00:36.687000+00:00
2024-08-16T17:56:31.230000+00:00
```
### Last Data Feed Release
@ -33,65 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260229
260232
```
### CVEs added in the last Commit
Recently added CVEs: `21`
Recently added CVEs: `3`
- [CVE-2024-2175](CVE-2024/CVE-2024-21xx/CVE-2024-2175.json) (`2024-08-16T15:15:27.940`)
- [CVE-2024-42462](CVE-2024/CVE-2024-424xx/CVE-2024-42462.json) (`2024-08-16T14:15:13.253`)
- [CVE-2024-42463](CVE-2024/CVE-2024-424xx/CVE-2024-42463.json) (`2024-08-16T14:15:13.650`)
- [CVE-2024-42464](CVE-2024/CVE-2024-424xx/CVE-2024-42464.json) (`2024-08-16T14:15:13.933`)
- [CVE-2024-42465](CVE-2024/CVE-2024-424xx/CVE-2024-42465.json) (`2024-08-16T14:15:14.133`)
- [CVE-2024-42466](CVE-2024/CVE-2024-424xx/CVE-2024-42466.json) (`2024-08-16T14:15:14.343`)
- [CVE-2024-42486](CVE-2024/CVE-2024-424xx/CVE-2024-42486.json) (`2024-08-16T15:15:28.777`)
- [CVE-2024-43381](CVE-2024/CVE-2024-433xx/CVE-2024-43381.json) (`2024-08-16T15:15:29.000`)
- [CVE-2024-43807](CVE-2024/CVE-2024-438xx/CVE-2024-43807.json) (`2024-08-16T15:15:29.197`)
- [CVE-2024-43808](CVE-2024/CVE-2024-438xx/CVE-2024-43808.json) (`2024-08-16T15:15:29.417`)
- [CVE-2024-43809](CVE-2024/CVE-2024-438xx/CVE-2024-43809.json) (`2024-08-16T15:15:29.597`)
- [CVE-2024-43810](CVE-2024/CVE-2024-438xx/CVE-2024-43810.json) (`2024-08-16T15:15:29.790`)
- [CVE-2024-4763](CVE-2024/CVE-2024-47xx/CVE-2024-4763.json) (`2024-08-16T15:15:30.563`)
- [CVE-2024-4781](CVE-2024/CVE-2024-47xx/CVE-2024-4781.json) (`2024-08-16T15:15:30.783`)
- [CVE-2024-4782](CVE-2024/CVE-2024-47xx/CVE-2024-4782.json) (`2024-08-16T15:15:30.967`)
- [CVE-2024-5209](CVE-2024/CVE-2024-52xx/CVE-2024-5209.json) (`2024-08-16T15:15:31.150`)
- [CVE-2024-5210](CVE-2024/CVE-2024-52xx/CVE-2024-5210.json) (`2024-08-16T15:15:31.337`)
- [CVE-2024-6004](CVE-2024/CVE-2024-60xx/CVE-2024-6004.json) (`2024-08-16T15:15:31.527`)
- [CVE-2024-6098](CVE-2024/CVE-2024-60xx/CVE-2024-6098.json) (`2024-08-16T15:15:31.737`)
- [CVE-2024-7144](CVE-2024/CVE-2024-71xx/CVE-2024-7144.json) (`2024-08-16T14:15:14.690`)
- [CVE-2024-7145](CVE-2024/CVE-2024-71xx/CVE-2024-7145.json) (`2024-08-16T14:15:15.187`)
- [CVE-2024-42634](CVE-2024/CVE-2024-426xx/CVE-2024-42634.json) (`2024-08-16T16:15:06.670`)
- [CVE-2024-42994](CVE-2024/CVE-2024-429xx/CVE-2024-42994.json) (`2024-08-16T17:15:15.153`)
- [CVE-2024-42995](CVE-2024/CVE-2024-429xx/CVE-2024-42995.json) (`2024-08-16T17:15:15.273`)
### CVEs modified in the last Commit
Recently modified CVEs: `44`
Recently modified CVEs: `53`
- [CVE-2024-37090](CVE-2024/CVE-2024-370xx/CVE-2024-37090.json) (`2024-08-16T14:19:42.403`)
- [CVE-2024-37091](CVE-2024/CVE-2024-370xx/CVE-2024-37091.json) (`2024-08-16T14:08:08.113`)
- [CVE-2024-37513](CVE-2024/CVE-2024-375xx/CVE-2024-37513.json) (`2024-08-16T14:30:47.543`)
- [CVE-2024-37952](CVE-2024/CVE-2024-379xx/CVE-2024-37952.json) (`2024-08-16T14:43:20.333`)
- [CVE-2024-38123](CVE-2024/CVE-2024-381xx/CVE-2024-38123.json) (`2024-08-16T15:40:45.897`)
- [CVE-2024-38125](CVE-2024/CVE-2024-381xx/CVE-2024-38125.json) (`2024-08-16T15:41:26.523`)
- [CVE-2024-38126](CVE-2024/CVE-2024-381xx/CVE-2024-38126.json) (`2024-08-16T15:42:36.073`)
- [CVE-2024-38127](CVE-2024/CVE-2024-381xx/CVE-2024-38127.json) (`2024-08-16T15:43:13.980`)
- [CVE-2024-38128](CVE-2024/CVE-2024-381xx/CVE-2024-38128.json) (`2024-08-16T15:31:29.327`)
- [CVE-2024-38130](CVE-2024/CVE-2024-381xx/CVE-2024-38130.json) (`2024-08-16T15:31:59.127`)
- [CVE-2024-38131](CVE-2024/CVE-2024-381xx/CVE-2024-38131.json) (`2024-08-16T15:32:31.797`)
- [CVE-2024-38132](CVE-2024/CVE-2024-381xx/CVE-2024-38132.json) (`2024-08-16T15:33:07.097`)
- [CVE-2024-38133](CVE-2024/CVE-2024-381xx/CVE-2024-38133.json) (`2024-08-16T15:25:05.590`)
- [CVE-2024-38136](CVE-2024/CVE-2024-381xx/CVE-2024-38136.json) (`2024-08-16T15:26:24.433`)
- [CVE-2024-38137](CVE-2024/CVE-2024-381xx/CVE-2024-38137.json) (`2024-08-16T15:27:09.137`)
- [CVE-2024-38189](CVE-2024/CVE-2024-381xx/CVE-2024-38189.json) (`2024-08-16T15:11:42.940`)
- [CVE-2024-41264](CVE-2024/CVE-2024-412xx/CVE-2024-41264.json) (`2024-08-16T16:00:36.687`)
- [CVE-2024-42982](CVE-2024/CVE-2024-429xx/CVE-2024-42982.json) (`2024-08-16T14:35:03.793`)
- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-08-16T14:44:05.733`)
- [CVE-2024-6347](CVE-2024/CVE-2024-63xx/CVE-2024-6347.json) (`2024-08-16T14:33:42.730`)
- [CVE-2024-6384](CVE-2024/CVE-2024-63xx/CVE-2024-6384.json) (`2024-08-16T14:29:24.947`)
- [CVE-2024-6990](CVE-2024/CVE-2024-69xx/CVE-2024-6990.json) (`2024-08-16T15:21:14.383`)
- [CVE-2024-7255](CVE-2024/CVE-2024-72xx/CVE-2024-7255.json) (`2024-08-16T15:23:19.167`)
- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-16T14:25:42.820`)
- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-16T14:25:46.027`)
- [CVE-2024-32918](CVE-2024/CVE-2024-329xx/CVE-2024-32918.json) (`2024-08-16T17:49:01.547`)
- [CVE-2024-33212](CVE-2024/CVE-2024-332xx/CVE-2024-33212.json) (`2024-08-16T16:35:11.323`)
- [CVE-2024-34686](CVE-2024/CVE-2024-346xx/CVE-2024-34686.json) (`2024-08-16T17:54:46.250`)
- [CVE-2024-34741](CVE-2024/CVE-2024-347xx/CVE-2024-34741.json) (`2024-08-16T16:35:12.133`)
- [CVE-2024-36821](CVE-2024/CVE-2024-368xx/CVE-2024-36821.json) (`2024-08-16T16:33:38.597`)
- [CVE-2024-37293](CVE-2024/CVE-2024-372xx/CVE-2024-37293.json) (`2024-08-16T16:11:53.287`)
- [CVE-2024-38115](CVE-2024/CVE-2024-381xx/CVE-2024-38115.json) (`2024-08-16T16:32:49.573`)
- [CVE-2024-38116](CVE-2024/CVE-2024-381xx/CVE-2024-38116.json) (`2024-08-16T16:36:12.337`)
- [CVE-2024-38117](CVE-2024/CVE-2024-381xx/CVE-2024-38117.json) (`2024-08-16T16:40:43.667`)
- [CVE-2024-38118](CVE-2024/CVE-2024-381xx/CVE-2024-38118.json) (`2024-08-16T16:41:04.497`)
- [CVE-2024-38120](CVE-2024/CVE-2024-381xx/CVE-2024-38120.json) (`2024-08-16T17:12:59.383`)
- [CVE-2024-38121](CVE-2024/CVE-2024-381xx/CVE-2024-38121.json) (`2024-08-16T17:13:28.350`)
- [CVE-2024-38122](CVE-2024/CVE-2024-381xx/CVE-2024-38122.json) (`2024-08-16T17:16:41.717`)
- [CVE-2024-41962](CVE-2024/CVE-2024-419xx/CVE-2024-41962.json) (`2024-08-16T16:34:48.873`)
- [CVE-2024-42461](CVE-2024/CVE-2024-424xx/CVE-2024-42461.json) (`2024-08-16T16:51:40.270`)
- [CVE-2024-42480](CVE-2024/CVE-2024-424xx/CVE-2024-42480.json) (`2024-08-16T16:24:40.430`)
- [CVE-2024-42946](CVE-2024/CVE-2024-429xx/CVE-2024-42946.json) (`2024-08-16T17:35:08.227`)
- [CVE-2024-42955](CVE-2024/CVE-2024-429xx/CVE-2024-42955.json) (`2024-08-16T17:35:08.957`)
- [CVE-2024-42976](CVE-2024/CVE-2024-429xx/CVE-2024-42976.json) (`2024-08-16T17:35:09.687`)
- [CVE-2024-42985](CVE-2024/CVE-2024-429xx/CVE-2024-42985.json) (`2024-08-16T17:35:10.400`)
- [CVE-2024-43044](CVE-2024/CVE-2024-430xx/CVE-2024-43044.json) (`2024-08-16T17:19:30.643`)
- [CVE-2024-43045](CVE-2024/CVE-2024-430xx/CVE-2024-43045.json) (`2024-08-16T17:21:26.803`)
- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-08-16T17:53:25.450`)
- [CVE-2024-6134](CVE-2024/CVE-2024-61xx/CVE-2024-6134.json) (`2024-08-16T17:35:11.413`)
- [CVE-2024-6239](CVE-2024/CVE-2024-62xx/CVE-2024-6239.json) (`2024-08-16T16:15:06.760`)
## Download and Usage

View File

@ -79627,7 +79627,7 @@ CVE-2015-6744,0,0,ca2d66c76739783f716b1cdcc4ad3d204d35663a9542d22561c35a22e800ca
CVE-2015-6745,0,0,e627d87474527daa79e7db2e1742300f4bd416724c177b6a6d8ec953ff29eca7,2015-08-31T19:08:00.877000
CVE-2015-6746,0,0,7e29a9dc31ea25916e170d4ba83bc34337696a20eed0923f46cc852b4dbd6721,2015-08-31T19:08:26.937000
CVE-2015-6747,0,0,a78c01ec5c822ac123b463fe0c957ec53cf6e33a09298554185c99ece916ef30,2015-08-31T19:08:48.720000
CVE-2015-6748,0,0,127756c2b0ef0cf95f1da6f4edd29fe4db415868dba3d1ed3d1ce33dccea2daf,2020-01-27T00:15:10.553000
CVE-2015-6748,0,1,f049f25f1e6c0ea2410c5396476cb8476bbb17e19c7f07baf9cf7a1d0e72da6a,2024-08-16T16:09:58.827000
CVE-2015-6749,0,0,f87c3a43609c773ca6f81a43f39e0d6c771bccada5b3fcf86178cf12796c77a4,2016-12-08T03:13:18.987000
CVE-2015-6750,0,0,81c69f4954e30747a454457076be8a1ade8a803744cd6badf8f33ada62a65d0a,2015-09-01T18:23:26.903000
CVE-2015-6751,0,0,5c4be3ca0d6e05978dc982372915dded47b3e5eaafd3b39d7c4f17a76a131d44,2015-09-11T17:59:46.143000
@ -109236,7 +109236,7 @@ CVE-2017-9437,0,0,64e23275d195a1ab2cbc31c52573223cde8ca170da9b723fd8474232992ca7
CVE-2017-9438,0,0,1a16512c2f194e9c8d7ea21627fc6228bd5549f81a4e55109342be440100bd8a,2023-11-07T02:50:46.323000
CVE-2017-9439,0,0,456f16a5e48c436581a51d320ede1d67b85a567c7da9bc7eaa063565aca48200,2019-10-03T00:03:26.223000
CVE-2017-9440,0,0,2123eb4ea3a03cedde6e2eddbaa29d3fe6e33ff0b3ee0a93b6111ae21ce4a4ec,2019-10-03T00:03:26.223000
CVE-2017-9441,0,1,6e652d223a5dc3eaece5b3b62832b1fb6d10153f411c16e97db83690374877f9,2024-08-16T15:35:01.103000
CVE-2017-9441,0,0,6e652d223a5dc3eaece5b3b62832b1fb6d10153f411c16e97db83690374877f9,2024-08-16T15:35:01.103000
CVE-2017-9442,0,0,8bf9f336242e1c1489746dbf1b94a79372e63100caad4ebd9dbd12e2a621193e,2024-08-05T17:15:39.363000
CVE-2017-9443,0,0,54e257e6a290bc5924fb0dfda90995bb7d0e850ef0677f89bc9cc580b15fd1d3,2024-08-05T17:15:39.430000
CVE-2017-9444,0,0,a8a61be64f1fe6f977b85debc8187d06e9259b178fd3bed8f2748cb6c8036855,2017-06-12T17:44:06.033000
@ -119921,7 +119921,7 @@ CVE-2018-20221,0,0,5fd00b71cc487e4e0e4193daba4cceeb8f5705806d153b6672f8f29f74b7c
CVE-2018-20222,0,0,8e0c16e57d9dcc30033901200ca3c9da59694c4f503c1b22d690ba9bc360aad2,2019-04-08T11:56:13.073000
CVE-2018-20225,0,0,b27824f57b885e319090ecc9a354a7faaf14af2f7c34c7e7a258c32460ecce7b,2024-08-05T12:15:29.653000
CVE-2018-20226,0,0,7d0a52318600d72e8702c5ca7c094270b9052a8df2b0da4bb948918001ecfba1,2019-10-03T00:03:26.223000
CVE-2018-20227,0,0,e0483ae742de594c3c3497c75bb20080f6ff0b5047c6814ec6d5c093eecdcb63,2019-01-07T14:38:22.633000
CVE-2018-20227,0,1,a9caf84bef65bc1087c3cf0d315ef0ab956e2f0d5407f1246e20b01dc37393b8,2024-08-16T16:09:23.257000
CVE-2018-20228,0,0,4e90f13706674b200b83ac5ad5612cdd8d08d3cf02d435efa10b9deb11d15ffc,2019-01-24T15:37:52.280000
CVE-2018-20229,0,0,2f2605790386ea4f1918e0a0a2344cce728cb227ddab0e6739b41de696f780b0,2019-04-08T16:29:58.260000
CVE-2018-20230,0,0,0881d313ffec24b55ad46c902fec949a0be3386cfd883c69c8ca77f41722e84a,2020-08-24T17:37:01.140000
@ -197747,7 +197747,7 @@ CVE-2022-29624,0,0,b7304d3f3d8a3fc21bb530fa62622522262f40c296b6abc0e5d2f4893aa57
CVE-2022-29627,0,0,ffa421d2c9b9f34fa5129a23f31eab5821dd06b3edf2869d17e4218d06592946,2022-06-12T02:12:18.457000
CVE-2022-29628,0,0,ed87694646944d873796e13e11b56199fcf3eb8b9ce0fb46cd12f5d571e6ecdb,2022-06-09T20:11:00.937000
CVE-2022-2963,0,0,f75c48b435f8a5336e2327a75c2e41ade8c611cf0f5a72ab580655090bfa4f1b,2022-10-18T18:04:12.260000
CVE-2022-29631,0,0,9e75f09225ea998af93999be145286e588fcbb5ca3b3d7fcd2496bf7bf3523fd,2022-06-14T17:03:37.153000
CVE-2022-29631,0,1,901bdf323e111be1491fba1cf63af131ff327ee14d14e6d2651fd7d73345ec9e,2024-08-16T16:11:20.603000
CVE-2022-29632,0,0,330989ff1b1ea65814ad0e45d736a41973f8dc7d17221c330c3f21fc050c4681,2022-06-08T15:54:04.953000
CVE-2022-29633,0,0,cfa42aa13fd24239ac389e8a2f3603df7bbdce50cf8d75f18e8b39a6b73524ba,2023-08-08T14:22:24.967000
CVE-2022-29637,0,0,d80755a0ed2863cfa85e5e86c4fe0cd1373f11826a292f73211d8e383a471bee,2022-06-08T16:04:59.757000
@ -210372,7 +210372,7 @@ CVE-2022-46080,0,0,fe9b2f2a23de7c5102d29ab9bc9b6a0f2eb379ce1e2d5a8ce8acadcffbe0e
CVE-2022-46081,0,0,10dd263b055bb8688d827cd365513fa6234714848594880daa28df023fae41a3,2024-08-03T15:15:33.853000
CVE-2022-46087,0,0,2d7a2aad383393e3a211a5235a80f74ad68301414683cf8758f0099824be289a,2023-02-06T21:54:50.580000
CVE-2022-46088,0,0,4ed06a94c0bc5acd5a9950d39108669b474d03ba4d63c42e5b0a87c8dd938716,2024-03-05T18:50:18.333000
CVE-2022-46089,0,0,32a450b8d6f1081fe551f32b5626a3eee19b8cf229568431e3a129e772b8efdc,2024-03-07T13:52:27.110000
CVE-2022-46089,0,1,a389db1543f1a2ff5fae3a5ebf216c4a40482acbc273e2405c2ae12b84cb1029,2024-08-16T17:35:01.040000
CVE-2022-4609,0,0,e70428330dd60a5e25b1dc4109e568b1aced34149fef1cd3984474ebc7588254,2022-12-23T18:44:47.767000
CVE-2022-46091,0,0,6ff24a58a333a49492281b25c366e610950da50d2b34311dcc22df1e4f6200df,2024-08-05T16:35:01.230000
CVE-2022-46093,0,0,c0c02a4cae40cc3ff547b83ecf90b1666a8ae67ef432ea60abf5435d631d85a2,2023-01-24T14:24:27.513000
@ -215476,7 +215476,7 @@ CVE-2023-21348,0,0,6536205321d5fe5c8ecb581d119686017cf544a48b45f9971c9987430c9d5
CVE-2023-21349,0,0,6db4fdb58824ed6add2774434860256244faea3a5778dec5dee8a7389bbf3391,2023-11-03T18:59:35.570000
CVE-2023-2135,0,0,4975a001fe13471f3f36bbc1a515f8a00221f54cd705ee38f3b61a934cb9f011,2023-10-20T20:53:18.983000
CVE-2023-21350,0,0,190e6cfe06286946a16c7d06283fc13546904bc93f168f3bd1a752e5caa577dc,2023-11-04T03:22:37.570000
CVE-2023-21351,0,1,dfa04bdbe866b1a8220a4a23f3b3a9f73d22c0f87606557b670b234ca20f7d5a,2024-08-16T15:35:01.333000
CVE-2023-21351,0,0,dfa04bdbe866b1a8220a4a23f3b3a9f73d22c0f87606557b670b234ca20f7d5a,2024-08-16T15:35:01.333000
CVE-2023-21352,0,0,bf9bbc836531e62cddd0e2eb36967636a5feba7eeb8a8cc199d223cecbe99cd0,2023-11-04T03:22:08.317000
CVE-2023-21353,0,0,c66984d1d99a5b13dc3ec131e5a274aa6bd6b74fe67d618fbf20f8803ecf6638,2023-11-04T03:22:00.393000
CVE-2023-21354,0,0,d6461086ceeb0e8c3fc21b5518c694b08fab2af77c245181d061ef4d315b3c02,2023-11-04T03:21:47.663000
@ -225303,7 +225303,7 @@ CVE-2023-33671,0,0,2c64ca1e06c9630e4ba1d8fe85512ff860c671e3e913c3ae1fe0459631330
CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610a10,2023-06-12T13:15:10.900000
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
CVE-2023-33676,0,0,90ba6c2c3d44d3e4ddbc93a4545955fd021e123f330baf5ccdf142ce22cf6a9f,2024-03-07T13:52:27.110000
CVE-2023-33676,0,1,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
CVE-2023-33677,0,0,fdaeb49d64bdf1efa8b5411d739207103f1736e1ceb5ef124ebf0bc2d9538056,2024-03-06T15:18:08.093000
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
@ -230092,7 +230092,7 @@ CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9
CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000
CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000
CVE-2023-40107,0,0,66f62207d9e25b242ec6da7f35b2ef9ecf0f1e96681d1510eaef351f3c32142f,2024-02-16T13:37:55.033000
CVE-2023-40109,0,0,9852e1ed3ab84624ed488dd571dfcb2a8f8fbe67a503c0c3a8f8a32f6ca7bd2c,2024-02-16T13:37:55.033000
CVE-2023-40109,0,1,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000
CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000
CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000
@ -232453,7 +232453,7 @@ CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0
CVE-2023-43284,0,0,d19af47cad8f003ee912aefb8b077df83455ebeb41fc85cb4eac052cd716193d,2023-11-22T15:15:09.303000
CVE-2023-4329,0,0,8b75efb685335d1476e96d7eec54e652c5d16a0d171dc01ce34df40a6d7b080d,2023-08-21T18:40:42.853000
CVE-2023-43291,0,0,d5ba19d030168db77bf7db7e6beafa094201b9e344ad7626faccfa0f9a3f170d,2023-09-29T17:25:25.957000
CVE-2023-43292,0,0,065ac2f210732043951d2ad4eb65f830f888507c648fd02a30a9db517004e7a7,2024-03-13T12:33:51.697000
CVE-2023-43292,0,1,24ca0ca0034ab3716a04050b8953f7ca74741d3547dbf42a22c571c80aa2ce0b,2024-08-16T17:35:02.787000
CVE-2023-43295,0,0,654a2e717a810338b9f5002f5c757587f6953578d4b0f454b1d2aae95dbd9902,2023-11-08T18:29:14.447000
CVE-2023-43297,0,0,dd6c536a8c4208de85afa8f1927062a6a713aaab4fa69403926f8e654f86f56a,2023-10-04T17:05:58.947000
CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca33224732bc,2023-12-11T17:48:50.780000
@ -237787,7 +237787,7 @@ CVE-2023-51133,0,0,4bc9e38acdb3d80c5232cd830b1f09875cdf7b59bc6548f7ae1d4caef7595
CVE-2023-51135,0,0,53c80adeaa8e75c9e3cd470f8895bc91ebde787cdb264fd2dcfc95c04b4bb99d,2024-01-05T18:31:15.977000
CVE-2023-51136,0,0,63ac77396c787693d1da831a86e7e0b47a74d8a0de9124c93b3461410be3e60a,2024-01-05T18:30:58.837000
CVE-2023-5114,0,0,54f99e7d2f0cfaa44a8d93ec082f1df9899d84ed3553bc7f2db17be741a57d05,2023-11-13T17:48:55.993000
CVE-2023-51141,0,0,d0a59f47f631036480902f5b7c06b564781b9cba22a29a98faf605d8d6619d3c,2024-04-11T12:47:44.137000
CVE-2023-51141,0,1,ed87fa65299edf13575c071e576bf18048cd3ec368ae733d0d5c21fda476e068,2024-08-16T16:35:01.820000
CVE-2023-51142,0,0,3cc421719bb627f399e2e569c0e2f084a8d2b6a78a2b82bf6a4efa03230e2ce3,2024-07-08T14:16:45.710000
CVE-2023-51146,0,0,565c9e6150b79b32d680692996443b4529e7b07694ee0fd8309e418e9a5f3ca2,2024-03-27T12:29:30.307000
CVE-2023-51147,0,0,75e5ad9e43cde03291b18d115e151db0aadaa5d5d0263e6c24a28fb6db5ae3b5,2024-08-05T21:35:01.980000
@ -238270,7 +238270,7 @@ CVE-2023-51796,0,0,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2ca
CVE-2023-51797,0,0,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000
CVE-2023-51798,0,0,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000
CVE-2023-5180,0,0,05de7a925f3b457b2b9f8a9dc5ce3c9a3d8ff4c9a3d8e7d0ed796b81c1f1e2d9,2024-01-04T15:43:40.260000
CVE-2023-51800,0,1,93a99ca6ee46e69a132e46eb486333b1af37da71382d74108d17c872eb589999,2024-08-16T15:35:02.053000
CVE-2023-51800,0,0,93a99ca6ee46e69a132e46eb486333b1af37da71382d74108d17c872eb589999,2024-08-16T15:35:02.053000
CVE-2023-51801,0,0,daec35424d16e8651180e47ce7964aaa86708153ff4d98fb80cf1eeaac664121,2024-08-01T13:45:33
CVE-2023-51802,0,0,26d2eb61c4bcd76ccdbaa324cdefd7f58728d6a0c595e8ec56ace22886ad7131,2024-02-29T13:49:29.390000
CVE-2023-51803,0,0,5790a7a80f4880b3e3a0fa86790ea4c84e94ec68c366f5e2ddc287043198ebc5,2024-04-01T01:12:59.077000
@ -238383,7 +238383,7 @@ CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d1
CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000
CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000
CVE-2023-5207,0,0,ae7a22a20155b6a0e191891e5e59a6b878214fc55c1a67934deb96cc7d59a0de,2023-10-04T01:55:31.953000
CVE-2023-52070,0,1,eb135ebe9555f9263de301311a19bde2c26d80c5302f7256ab733a45a10b5c37,2024-08-16T15:35:02.790000
CVE-2023-52070,0,0,eb135ebe9555f9263de301311a19bde2c26d80c5302f7256ab733a45a10b5c37,2024-08-16T15:35:02.790000
CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000
CVE-2023-52072,0,0,1d3ce461c7777391c7f83d91e740b1ebc41a9b9c6ba2aac12cdeda55979ce207,2024-01-11T20:05:45.403000
CVE-2023-52073,0,0,44eca5907bf748429307dd6a52fcacd5ad285cf13a8090b51741b3af5b94a19e,2024-01-11T20:05:37.137000
@ -243917,10 +243917,10 @@ CVE-2024-21725,0,0,5e6534017e45269ab964c843fba95f205445e30933324620ccbba3f3f4e2e
CVE-2024-21726,0,0,6323b2b43ac337f244a115fea0a0997a8ee4d7e666452b5dae48b4ac07f1f7fb,2024-02-29T13:49:29.390000
CVE-2024-21727,0,0,4af573498420db9348e00aac06b95b56a5038edabffc25cb0f25ab9c01be1a45,2024-02-15T14:28:31.380000
CVE-2024-21728,0,0,6d3de60c64db99ec16689d15b3a09c6273756d73ea66742792a8ee295b84ce4d,2024-02-16T13:38:00.047000
CVE-2024-21729,0,1,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000
CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000
CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000
CVE-2024-21730,0,1,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000
CVE-2024-21731,0,1,0bdbad6073a6f00bc29521c81bb3ba90d14042bc70946cce369f0b6d5d73421c,2024-08-16T14:54:49.230000
CVE-2024-21730,0,0,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000
CVE-2024-21731,0,0,0bdbad6073a6f00bc29521c81bb3ba90d14042bc70946cce369f0b6d5d73421c,2024-08-16T14:54:49.230000
CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411731,2024-01-08T18:51:23.740000
CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000
CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000
@ -243939,7 +243939,7 @@ CVE-2024-21746,0,0,71b367edf262d30b7091359190b87e54a7e9349e34c251cedb156f5314341
CVE-2024-21747,0,0,cc2bc1e14d3097f2a1e3dc28d52ecd9537e1bd47ae59862aa7a5dd138ea1e45b,2024-01-11T18:45:06.960000
CVE-2024-21748,0,0,2a197de0adbf993ed118e27e797a4f0c8754f47a7d945195f996e2582711721f,2024-07-17T19:59:28.060000
CVE-2024-21749,0,0,5487855d4429da4fac08226224f1538028a7a5ac2df658cc224a0e240622cf41,2024-02-29T13:49:47.277000
CVE-2024-2175,1,1,9e9e3edd6492c4dbac5ff0accd7cd503db38ed345fbfa9a1783a57a68a56f8a9,2024-08-16T15:15:27.940000
CVE-2024-2175,0,0,9e9e3edd6492c4dbac5ff0accd7cd503db38ed345fbfa9a1783a57a68a56f8a9,2024-08-16T15:15:27.940000
CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000
CVE-2024-21751,0,0,55d06ade7b40f70a88f44c4672adccf43ead813dee575220c2752c77b1d36f34,2024-06-10T12:40:41.360000
CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000
@ -244544,7 +244544,7 @@ CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba7
CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000
CVE-2024-22532,0,0,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000
CVE-2024-22533,0,0,85338afee49dae9d2d34419392208a0e08c059f930c68060a5bc4d947f64730e,2024-02-10T04:09:13.303000
CVE-2024-22543,0,0,b394fea0f9ec82c032a72697191c5255a9224f67e82d2cec41e6415b42196cbc,2024-02-27T14:20:06.637000
CVE-2024-22543,0,1,b1a889b0e18be55a9638cd371ddf76030836a5edd3b6465766a28cf814e1ba4e,2024-08-16T17:35:03.823000
CVE-2024-22544,0,0,c83930b3fd617d56b4e76bf97e8edd2a7a4295e7011794060244a8c71ee5f812,2024-08-01T13:46:59.453000
CVE-2024-22545,0,0,68df59d7f199c8b9a762129a9a26d5183a0bcd88eec159e4a975bd0c437f8e2d,2024-03-05T18:15:48.443000
CVE-2024-22546,0,0,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000
@ -245296,7 +245296,7 @@ CVE-2024-2375,0,0,a058c80efe949762571e053df4cb958436e1818db9efb8af354b35f7ce7104
CVE-2024-23750,0,0,5b7689a4bbe3979ddb3dbfc60b9bab1cc13d0a195ac1ecb4770e9c464c629b61,2024-01-29T16:51:14.573000
CVE-2024-23751,0,0,9162dc4b42b5905d8dd88803aa2613495cbbe611df5d9d2ead982e210e469fa5,2024-01-29T15:06:44.003000
CVE-2024-23752,0,0,b2bcc21873940c2a0980c29225225dbeb5e398b96bb8976a2b36657cd69cb30a,2024-01-29T19:27:17.040000
CVE-2024-23755,0,0,1d0ab3a2302d7444b06dc76885babfa0cdbd41238356230e54918e18d91dff39,2024-03-25T01:51:01.223000
CVE-2024-23755,0,1,d38be966ccbea9093e3f38cc4a316cab8e8cf5496a4c06474494fc58b9fd5172,2024-08-16T17:35:04.600000
CVE-2024-23756,0,0,2bdfbaef90f9f936a849dec2c9c1d1a05a3f10092fc01318b2702eeb8348f878,2024-02-15T16:01:08.870000
CVE-2024-23758,0,0,3ffe01e5849c29350b16e72f283a186df16bf63db40bd56bdf04a6fdd9681114,2024-02-22T19:07:37.840000
CVE-2024-23759,0,0,7b8f90d14164aaef0f5274ab8cd0cd35c941b0f2a4c75bb44f448c7d8d1f721f,2024-02-15T04:49:02.133000
@ -245812,7 +245812,7 @@ CVE-2024-2472,0,0,9c657ae60ef92e7052748340ce8fdcc97fb449e534be5cbcdbd4360a9f7fdd
CVE-2024-24720,0,0,116148208b713005301f5cf40f7ed4d29a4a646b11c4e3748d94824457651517,2024-08-14T15:35:05.267000
CVE-2024-24721,0,0,cc501af2f363293d6bbcb033e643fca22423d4b5f2a3dc57ffee4b6412c8c2b9,2024-08-12T18:35:31.143000
CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000
CVE-2024-24724,0,0,49e36beb0292b27c4af21607f62c8098e243af86c10e87204060b3a2a9eb0caa,2024-04-03T12:38:04.840000
CVE-2024-24724,0,1,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9afa9d,2024-08-16T16:35:03.010000
CVE-2024-24725,0,0,fa4c4ce65e4991dcf18e22afc18c407373bea4c35493c8cf2afcfe5d0757cc18,2024-03-25T01:51:01.223000
CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000
CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000
@ -246110,7 +246110,7 @@ CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f7
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
CVE-2024-25089,0,0,4d3ddaeeeaf0e005a5320fd57126d38836ae358b9586c6957758efb8e6b78742,2024-02-13T00:38:12.137000
CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000
CVE-2024-25090,0,0,fe4dfe05b7df4dade0fae9afde244a31ac4436c4195a84dec142976b30aaa959,2024-07-26T12:38:41.683000
CVE-2024-25090,0,1,f85b3bcd033b385efb1c9f266ce72e41f2e2d9369cf294e95ea532fc1e35d52c,2024-08-16T17:56:31.230000
CVE-2024-25091,0,0,d822656b63074e0c8fc140e02cdc2082434684ada7eeff085f5eee9f7616d66b,2024-08-05T19:35:03.780000
CVE-2024-25092,0,0,93228461014d21e76377d62123a9b74976fcddddff96fb9097cb4fcb49528f7c,2024-06-10T02:52:08.267000
CVE-2024-25093,0,0,b8e6c12d6bc03129058956c6365ec4ac1bf71d6b0585045592f329dee7756d25,2024-02-29T13:49:29.390000
@ -246175,7 +246175,7 @@ CVE-2024-25155,0,0,1d7983859d61945142ef2e8872f422d7a225c4f14d7bf78ef2435c14d9e9f
CVE-2024-25156,0,0,5644f61e62691ed9b2ea36cf2dd30ea49f643127034e87e186f5419ac1deb692,2024-03-14T14:21:20.217000
CVE-2024-25157,0,0,cd729b57eba763a1404c06e161ad68966ff36563106bac56cde20ec280ac8b95,2024-08-14T17:49:14.177000
CVE-2024-2516,0,0,14566cb1daab665f74119ef85235fd35fa3b84dccd777ba113a66fd32edf19a9,2024-05-17T02:38:16.350000
CVE-2024-25164,0,0,0c2d2e02425cd8795a424c928e888033fabe9adbf3e44624e7d86333837b1314,2024-03-05T13:41:01.900000
CVE-2024-25164,0,1,759bf404d5770b9163c704f082cc395dd906a306da057b7d64ff4a44c31ee872,2024-08-16T16:35:03.903000
CVE-2024-25165,0,0,b60ae9c4b2953dad1606ed76f79140fa695e9553000ce7a315e2caf4198c7634,2024-02-15T06:23:39.303000
CVE-2024-25166,0,0,28ed357e8ad3f41e96ed47a3cbc3e0eb532501ab6da8d8dda90dddb9fc6831df,2024-02-27T14:20:06.637000
CVE-2024-25167,0,0,be72ecca7313bea8f298d89db24b35310bc283e623855cf81605c9b70521a6b3,2024-08-05T18:35:07.617000
@ -246239,7 +246239,7 @@ CVE-2024-25269,0,0,cecb054aeb252fd3635e4b5b6f2ee9da6b9765bdfc4680265db28bca7071a
CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f91,2024-05-17T02:38:17.313000
CVE-2024-25274,0,0,08bbd944a87379073203caa03548429c52cb88f2e3324503fdb87764ae5cf736,2024-02-20T19:50:53.960000
CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000
CVE-2024-25288,0,0,ec9a8f6e97e7741142de4cb4c32dde31396457ba8d55d4f5745270d50453dfad,2024-02-22T19:07:27.197000
CVE-2024-25288,0,1,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000
CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000
CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000
CVE-2024-25291,0,0,3fb4fe8a5c11e3a034eb8eee615e5ca2d89bb2fc5feb0b891e21815184a51204,2024-08-01T13:47:40.580000
@ -246291,7 +246291,7 @@ CVE-2024-25376,0,0,6a816dff6e980af2ce9830b28c1e10df0bab9ab3e8e9a695c06849f72c23c
CVE-2024-2538,0,0,9040c900b991e8f6fd3afa80f5869e2f9dbcc85520bbfcec371534f7a5ee52c0,2024-03-20T13:00:16.367000
CVE-2024-25381,0,0,a7f2494426dcfd03638803eefb4663189386d44e34e1d8cefdca6022c601b371,2024-02-22T19:07:27.197000
CVE-2024-25385,0,0,4e6ac49ed38b214c0cadcf5b7d24f80edcf812117f3b947eea7b8836b8926a85,2024-02-23T02:42:54.547000
CVE-2024-25386,0,0,8150946dfcd9aeb8580150c5b420a3c626648a2db1c6d529b93950e8e3ec732d,2024-03-13T04:15:07.960000
CVE-2024-25386,0,1,635388f91f9efca73d197efb28e6d958488f53679752b3c1d9d9ef7abd682a1f,2024-08-16T17:35:06.100000
CVE-2024-25388,0,0,a4fd2e7348bdb39a0284b3ab07f14681f4dbe00912c0f5a31c9cd1eaaaf64a39,2024-08-01T13:47:42.200000
CVE-2024-25389,0,0,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000
CVE-2024-2539,0,0,e61b24f26184c749ddf56008443c202d469d18246466f0526477f147012e59d6,2024-04-10T13:23:38.787000
@ -246305,7 +246305,7 @@ CVE-2024-25398,0,0,d9ed4e2578e708fde238a2333f8c06b711d373daa3ef2c157ba58fb7d13ba
CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000
CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000
CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000
CVE-2024-25410,0,0,da2543318fbb8275cd16936f8a754d30f1d50739901afbcb1ba92647c65cf519,2024-04-03T21:15:31.220000
CVE-2024-25410,0,1,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000
CVE-2024-25415,0,0,669eb2c339e3bc5aae821eb5536f61ec9a8ace328fdd7918c4b65de35957067d,2024-06-07T15:15:49.860000
@ -247740,7 +247740,7 @@ CVE-2024-27179,0,0,85f9bd060c25072746b1e3bfaefabaa31cf907d9fa1300683bdfc57bd5ce2
CVE-2024-2718,0,0,e867b4db92934c4ec2b3fac03d5022cd051733038b4330c7ca5ad40b77757de0,2024-05-17T02:38:27.407000
CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431d16,2024-07-04T05:15:15.450000
CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000
CVE-2024-27182,0,0,ce412bcff2b9c7110a2b759fc053bec2d3578e8e3e218da80159f8ef3b0ffed3,2024-08-02T12:59:43.990000
CVE-2024-27182,0,1,3745db63e259cb2e1fbe54f15ae0e0f8afab0bc93a91d91e5de7d932d84971e0,2024-08-16T16:55:10.923000
CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000
CVE-2024-27188,0,0,def19a2058b71e528abca5da80971f2d008d715cb853d3ea2c84141e42391a01,2024-03-27T12:29:30.307000
CVE-2024-27189,0,0,994d0c9d134383fa54dc85b5fd282a40acff54c3ff303ac4e31ff6be7de68f0c,2024-03-15T16:26:49.320000
@ -248007,7 +248007,7 @@ CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a8
CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000
CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000
CVE-2024-27497,0,1,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000
CVE-2024-27499,0,0,b83d178e9b7191162c5685f1e47e2fd1e5529f49e76aee3b7cd72833d352a7e5,2024-08-01T13:48:29.880000
CVE-2024-2750,0,0,37727f710079f44007aa4b3f740cc1e5c5b0086f375c812c16d7e3bf2db19280,2024-05-02T18:00:37.360000
CVE-2024-27507,0,0,553b05ae6ffd373dfbf2aa3222522f3386658a0a78887ec1a5a87ad22402f8cf,2024-03-23T03:15:11.443000
@ -248084,7 +248084,7 @@ CVE-2024-27674,0,0,21e90956bc1e5ed96e828710d1d2cfc02b0d7dccfda52db8ef3f15b53b564
CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000
CVE-2024-27680,0,0,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
CVE-2024-27684,0,1,b102c05080f733920be192face7e38ed6a74f9c73aceec04d2c70a07af3f6781,2024-08-16T16:35:05.530000
CVE-2024-27689,0,0,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
CVE-2024-2769,0,0,4ce409110b7519da5af6e8ebe0cc3e53d83319a867f728e76ce04b1f4c62c385,2024-05-17T02:38:29.300000
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
@ -248110,13 +248110,13 @@ CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c7
CVE-2024-27728,0,0,92c2f4f300ca741f2c37bce04178555a76577e155666dd983f312360347cacd1,2024-08-15T19:15:18.477000
CVE-2024-27729,0,0,c948204789378d657f2b41d6c6761ce5ea794f998ddb93f2ebf81a9fb64e12c5,2024-08-15T19:15:18.573000
CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000
CVE-2024-27730,0,0,32a18e903d98aa035fd1fe5fcdbab3b67106449b10089c696c32a889a14b214f,2024-08-15T19:15:18.663000
CVE-2024-27730,0,1,12847aa86fe1ac70d87265d0b4758314d0c5ea3a5710aebdf2b0c7adafade873,2024-08-16T16:35:06.563000
CVE-2024-27731,0,0,0e54bb9a495ca00aca3255fbd7013d472940c8369148ec88372e9e447c0ebdfe,2024-08-15T19:15:18.770000
CVE-2024-27733,0,0,f76bf300f1cfa0de74d17f1145877f7fe4a3d69ea3dede66e09a54e795dd7256,2024-03-08T14:02:57.420000
CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663b2a,2024-03-01T22:22:25.913000
CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000
CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000
CVE-2024-27744,0,0,4e757ce0fe3647ea6f05f08011979a37be799ec10e3981611cdfea238e8d5ca8,2024-03-13T07:15:36.410000
CVE-2024-27744,0,1,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000
CVE-2024-27746,0,0,25c5d1637666144aa24b9e78e08712d087d46315d29be0eb97ff37efb1a8968b,2024-03-13T07:15:36.470000
CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000
CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000
@ -248139,8 +248139,8 @@ CVE-2024-27774,0,0,9cbdaf77f4a8542149d6b11f5bee28067f7edd716cc6732ed60e063fe1f70
CVE-2024-27775,0,0,456fca18fe71533779d986efe95c0ae90c69ca0c555f033d6cc6ced4fa8e3387,2024-03-28T16:07:30.893000
CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1ef96,2024-06-03T14:46:24.250000
CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000
CVE-2024-27782,0,1,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000
CVE-2024-27783,0,1,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000
CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
CVE-2024-27784,0,0,7a9199f6100de9f987e85bb4b46ccc517d63d40c8a5a9b633fa6d524c9d2d6a0,2024-07-09T18:18:38.713000
CVE-2024-27785,0,0,a9323d0de61da76c0e0b4ae0888d0a2f5fae6fc263c21d492f4567bd7dd7a351,2024-07-09T18:18:38.713000
CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000
@ -248224,7 +248224,7 @@ CVE-2024-27873,0,0,7729d99677f493b1646015ca9c6f3b42e2f48da1b219729ff59f6f38e1d66
CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29c1a,2024-08-09T17:02:19.750000
CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000
CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000
CVE-2024-27881,0,0,6afd9f87fafeb826eaa3a6402ee6d0351c4562f692aa76e6b34d561c97200b1f,2024-07-30T13:32:45.943000
CVE-2024-27881,0,1,ecd3b41ffcf84a1b769c2ce9b805a207566f7e84b913888f092b35189f2e87e8,2024-08-16T17:37:25.757000
CVE-2024-27882,0,0,5f6b8c776d129a743847181e673fbc08fa4525f477938bb4131e477f4d230687,2024-07-30T13:32:45.943000
CVE-2024-27883,0,0,a0ddd934b377fc709fb4c9c5999258197501ae8a4c900c5f15b38ef425986e01,2024-07-30T13:32:45.943000
CVE-2024-27884,0,0,c8b7a89e085d35ad0c448e616c336654f520047f390f2d4a8df19df20362a2a2,2024-07-30T13:32:45.943000
@ -248621,7 +248621,7 @@ CVE-2024-28404,0,0,de4bb0761b47ec48a2f8f7ba9fcf3d34a35356ef117606bd87d22259d5f91
CVE-2024-28405,0,0,2c15de9876ba9bcb0c88245dcbd415aed2fe212a7903bb0c75f14ccc80f65f8d,2024-08-01T16:35:07.140000
CVE-2024-2841,0,0,2c2b4741d1454e52d6849cf0d7e19bb6be42afd910b9080bb0f288684da8e29a,2024-03-29T12:45:02.937000
CVE-2024-28417,0,0,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b6a4,2024-07-03T01:51:41.033000
CVE-2024-28418,0,0,a547e7c2904ffc7c315aa13518177bc1d84929cd46462a0678162ae7db3fce1d,2024-03-14T14:21:20.217000
CVE-2024-28418,0,1,2a4e7f72113758cf676cf86e709d4c2254271c4bc05c9c8adb6c432f26d0d67c,2024-08-16T16:35:08.140000
CVE-2024-2842,0,0,fb8969f6b6806427a8ba5bfc6ea26b5b1997081ed131de3b61a4fe60370dfde0,2024-03-29T12:45:02.937000
CVE-2024-28421,0,0,1239831c00e8490a8b37a2f0168365916badc596709bff57ac81168b6c37e716,2024-08-05T19:35:05.787000
CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c92f,2024-03-14T20:11:36.180000
@ -248923,7 +248923,7 @@ CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c
CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000
CVE-2024-28962,0,0,a96effbf83c42c6de037f267cb741b7ad8c0c1cba3ce445c3f138895f41093ff,2024-08-06T16:30:24.547000
CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000
CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000
CVE-2024-28964,0,1,668c3eb1130fe0883336d2377db58f6ba4d918c33aa5ccfcfc554147c62cb6c8,2024-08-16T16:44:09.413000
CVE-2024-28965,0,0,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000
CVE-2024-28966,0,0,6430710ce538aed33833d6523d76ed4e05ecdf436ddf0d76f353fb0ef57acee9,2024-08-06T15:30:39.067000
CVE-2024-28967,0,0,1648dd50c3f81be97a86f7abed79bf1b0d6da23e4a54c3c444650653354399fb,2024-08-06T15:30:14.820000
@ -248943,7 +248943,7 @@ CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f3
CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808f7e,2024-06-27T12:47:19.847000
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
CVE-2024-28986,0,1,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000
CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000
@ -249097,7 +249097,7 @@ CVE-2024-29152,0,0,6494eb520227446d6d245c5a4d673a99692904bc67e1a2221cdb6494798ef
CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000
CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c77b,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,595d020a34dc3c63329ef492697be54cca90adb54515cbfada40f26153450f3f,2024-03-18T12:38:25.490000
CVE-2024-29157,0,0,686a5563366ae5e63c744308ef6f77aa3c96e95949cc031d68a4d1990f03c411,2024-05-14T16:13:02.773000
CVE-2024-29157,0,1,3110ca8118b2c924b316fb8b417f719cf20fff49178f5804090215ed711693f7,2024-08-16T16:35:08.877000
CVE-2024-29158,0,0,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000
CVE-2024-29159,0,0,9a119fb563b8f74a63294a27b73a89cf8c5215b9d36b48948639d3bb01780b26,2024-05-14T16:13:02.773000
CVE-2024-2916,0,0,62a74d7777ba9b78e45dbd8edaf3903a6d88704541ec72ec8eada5e4f7d122b9,2024-05-17T02:38:37.200000
@ -249234,7 +249234,7 @@ CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0
CVE-2024-29402,0,0,b3b67ac2f5a71f897648f0dbc8697340f6879726be4aa06cba11c0478007588d,2024-04-17T12:48:07.510000
CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000
CVE-2024-29413,0,0,493f53d4b43110a7ef6c57bebf5ca6e237d29210366d7552d76297fd422d6175,2024-04-04T12:48:41.700000
CVE-2024-29415,0,1,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000
CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000
CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000
@ -249314,7 +249314,7 @@ CVE-2024-29661,0,0,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515e
CVE-2024-29666,0,0,a67e8622ed74011ff249c5e68e53374a60af6cb3676ee7edca6fb573c3e202e4,2024-03-26T12:55:05.010000
CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494dc8,2024-08-01T13:49:33.747000
CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000
CVE-2024-29672,0,1,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000
CVE-2024-29672,0,0,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000
CVE-2024-2968,0,0,45b6ebbb9d99cd3c2205a629e13ac67f3a4bda14dbab27666ba50c91e62a9257,2024-03-29T12:45:02.937000
CVE-2024-29684,0,0,b36bf2e8a8667d8059487f589a89143767a320a5d181a5559cd241abd56a073c,2024-08-06T15:35:12.520000
CVE-2024-29686,0,0,24415b8b4ad1fce01014ce0adb73b5758ac1af7cb6661af128dfb5e4207dea3b,2024-08-02T01:16:00.577000
@ -250605,7 +250605,7 @@ CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520
CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000
CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000
CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000
CVE-2024-31333,0,1,dff3c0848f2c560893a0af75ea057ea93ab7ac2846c297e0e5fb7e6350eba960,2024-08-16T15:35:05.893000
CVE-2024-31333,0,0,dff3c0848f2c560893a0af75ea057ea93ab7ac2846c297e0e5fb7e6350eba960,2024-08-16T15:35:05.893000
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
@ -251217,7 +251217,7 @@ CVE-2024-32312,0,0,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3
CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000
CVE-2024-32314,0,0,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000
CVE-2024-32315,0,0,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000
CVE-2024-32316,0,0,ffea206eb35e029317458be59cb44b8fa7a1becdd91322b99748836c3f7db1d0,2024-04-17T16:51:07.347000
CVE-2024-32316,0,1,b7e4f766b6ae8b9ee3202c8692a9daa8fa4256b563e548adca488753bcf1bbfd,2024-08-16T16:35:09.793000
CVE-2024-32317,0,0,650aa34fc080388d8f2bd6a4a88b6775736a0002394db3f799d9283eb4ac353f,2024-08-08T21:35:13.350000
CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000
CVE-2024-3232,0,0,c59a906ca6c3b26e020d4b33cc77d57f43a342f5b3c4ac255f8439d838cfaba1,2024-07-16T18:00:02.110000
@ -251452,7 +251452,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e
CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000
CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000
CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000
CVE-2024-32609,0,0,e9c7de90afd0cbd1681b9959652a6da4e9f88c281b35d47dfe050d5fb7f03f3f,2024-05-14T16:12:23.490000
CVE-2024-32609,0,1,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000
CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000
CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000
CVE-2024-32611,0,0,2310031ef5af96912f44f0f7e5319f735ea5afde954f456c8fb33e30d583bb91,2024-05-14T16:12:23.490000
@ -251683,7 +251683,7 @@ CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196
CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000
CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
CVE-2024-32860,0,0,f7dffb4e6c88e91eb3b0e840948c90a54884d2d7e46d06b53c404dced4e4a3d1,2024-06-13T18:35:19.777000
CVE-2024-32860,0,1,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000
CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000
CVE-2024-32862,0,0,2aef539538fe2995a5ca2aea866b8c37c4f13ea43ec8d03f4cb015e7c649b943,2024-08-09T18:55:44.473000
CVE-2024-32863,0,0,6824730357c9032b068186d64db79b75e84cc03aca375bd1b03f4bed7db730e0,2024-08-09T18:47:45.963000
@ -251743,7 +251743,7 @@ CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c
CVE-2024-32915,0,0,ce3c0f63e7c4b15b4980a52ade118f9c0799ed8303c4569ce9e259a0da82edf0,2024-06-17T12:43:31.090000
CVE-2024-32916,0,0,b886661caf70d7fd3c261e90c0f590c6eca5af4ee25ade8b0972d2baebb2ff9c,2024-06-17T12:43:31.090000
CVE-2024-32917,0,0,6d583d8ab79c5333a5d03cc2ab6bba8eb02ee95c890cd04661d7dbc4855b1773,2024-08-15T16:35:09.653000
CVE-2024-32918,0,0,2a2c8a8c7d4b363845694cbf190176d55749936bbf41bcb406340187abded385,2024-06-17T12:43:31.090000
CVE-2024-32918,0,1,af111f037945614b977ab3fde7f96a13d2defad259d3c610a939cb822dc9c206,2024-08-16T17:49:01.547000
CVE-2024-32919,0,0,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000
CVE-2024-3292,0,0,07318f8f2185b7ffadc020ce54f4218255ee206d16b74c44d805183e4ce99eaf,2024-05-17T18:35:35.070000
CVE-2024-32920,0,0,884af5f47808b4ceffd2a4bd9b80204f75cce16bd0848479c6a369a24d34e09f,2024-06-17T12:43:31.090000
@ -251890,7 +251890,7 @@ CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000
CVE-2024-33212,0,0,9a12458adc56efb8a68240e2fde6c0ad53446d170f1d3cd3bc653023748972de,2024-04-24T13:39:42.883000
CVE-2024-33212,0,1,e1465636a9a0085dbcb931f6bf0bf00f21c6133d537bb14ffddf0238c4968d35,2024-08-16T16:35:11.323000
CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000
CVE-2024-33214,0,0,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000
CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000
@ -252880,7 +252880,7 @@ CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45
CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000
CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000
CVE-2024-34685,0,0,588dc8fca74d544e911ad8585a3fe8a4026086ccc3b45cf5d371e8a153609a7e,2024-07-09T18:19:14.047000
CVE-2024-34686,0,0,9a46529afe2602396741c77c95009142538ded4dd5a0a610b2bc7ac147d05880,2024-06-11T13:54:12.057000
CVE-2024-34686,0,1,e9bb1b88f368d1635fab463778c0099fa75235c21c0d77c253e89ea0001f99e2,2024-08-16T17:54:46.250000
CVE-2024-34687,0,0,2d1fb3e427c306d9f3a4e574ef26ad04ac3746abee3e170bed2385765a3ef230,2024-05-14T19:17:55.627000
CVE-2024-34688,0,0,f7195c0aa4b21b145d71d8ca8f2dd3d8f80451302ff7a5fec7e22b7dba8274ce,2024-08-09T19:45:52.623000
CVE-2024-34689,0,0,24635e46ef31bb11483f26da60a02a929940d00bd29acd39e88acae29470e314,2024-07-09T18:19:14.047000
@ -252922,15 +252922,15 @@ CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6
CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000
CVE-2024-34727,0,0,d3a2c747ee927f1291c35785807c6dbb5ec4b02ae6150a400652401339eb68d8,2024-08-15T22:15:06.190000
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
CVE-2024-34731,0,1,db99553d52ef10862db59395def4b447bf82c534bc82ff690124fb7e9aeaf33e,2024-08-16T15:35:07.050000
CVE-2024-34734,0,1,2401da04401bc478efc817cf70bc2539da268544cddb84ea1022fb7b735e1a9a,2024-08-16T15:35:08.043000
CVE-2024-34731,0,0,db99553d52ef10862db59395def4b447bf82c534bc82ff690124fb7e9aeaf33e,2024-08-16T15:35:07.050000
CVE-2024-34734,0,0,2401da04401bc478efc817cf70bc2539da268544cddb84ea1022fb7b735e1a9a,2024-08-16T15:35:08.043000
CVE-2024-34736,0,0,e31a789529c464401dd83172b804c99ebe04c32cc188ce2e95f92b9abe1bc6ea,2024-08-15T22:15:06.400000
CVE-2024-34737,0,1,47d73555cd102e0f18e45ab95ac3a6e267c7cd75e08fe880be1adf2bf0c8e2dd,2024-08-16T15:35:09.367000
CVE-2024-34738,0,1,9bffb660d4578c23873bea39f77d81a9f59f5b4d9ddbe82ebb52e5c5dcb4a003,2024-08-16T15:35:09.537000
CVE-2024-34739,0,1,29b4a468c9ec4e299c008f2fd536080f64baded03c66ae4ec0774f333537b18a,2024-08-16T15:35:09.703000
CVE-2024-34737,0,0,47d73555cd102e0f18e45ab95ac3a6e267c7cd75e08fe880be1adf2bf0c8e2dd,2024-08-16T15:35:09.367000
CVE-2024-34738,0,0,9bffb660d4578c23873bea39f77d81a9f59f5b4d9ddbe82ebb52e5c5dcb4a003,2024-08-16T15:35:09.537000
CVE-2024-34739,0,0,29b4a468c9ec4e299c008f2fd536080f64baded03c66ae4ec0774f333537b18a,2024-08-16T15:35:09.703000
CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000
CVE-2024-34740,0,1,7e6b7caee11d6bb2f72419f850600f936ccab908481703a9ea744b4d892dfa36,2024-08-16T14:35:02.640000
CVE-2024-34741,0,0,ffc119c2b062b459351b84600fe5fda211e601923a32345a664710007a08e353,2024-08-15T22:15:06.820000
CVE-2024-34740,0,0,7e6b7caee11d6bb2f72419f850600f936ccab908481703a9ea744b4d892dfa36,2024-08-16T14:35:02.640000
CVE-2024-34741,0,1,9743d0fcf2b344299b6d8e57c3e5c047679ef45dcdbcc16f464446bb088cce71,2024-08-16T16:35:12.133000
CVE-2024-34742,0,0,810e6764d5ddb3d52b814c091bfdc919e6fb1c2ff52eaed58ccd0c8bd96c8188,2024-08-15T22:15:06.890000
CVE-2024-34743,0,0,e813f78a1c3c1f053825d2df9fc7d52e06e3c3fcd645217e4ada409f53307702,2024-08-15T22:15:06.957000
CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000
@ -254275,7 +254275,7 @@ CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa79
CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44df61,2024-06-07T19:24:09.243000
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
CVE-2024-36821,0,0,a101d59bf6e24c907bc18edaa02c1eaea1af6aad6d551ff1aa91ecf54c6663ec,2024-08-01T13:53:17.693000
CVE-2024-36821,0,1,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000
CVE-2024-36823,0,0,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000
CVE-2024-36827,0,0,d5b65af3d7b9322aad3b5478f72ede9b79c676edb352f8fbc888d8aac5e59f92,2024-06-07T19:24:09.243000
CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e04b,2024-08-12T14:35:09.987000
@ -254482,8 +254482,8 @@ CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3
CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000
CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000
CVE-2024-37089,0,0,9e292fe1dd11fba75d82973b2e1db6879968f554c93ecd19be42fbc3a656ef4b,2024-06-24T12:57:36.513000
CVE-2024-37090,0,1,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000
CVE-2024-37091,0,1,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b460,2024-08-16T14:08:08.113000
CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000
CVE-2024-37091,0,0,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b460,2024-08-16T14:08:08.113000
CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3a6b,2024-06-24T19:26:54.367000
CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000
CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000
@ -254632,7 +254632,7 @@ CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14
CVE-2024-37287,0,0,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
CVE-2024-37293,0,0,efa095b0cfa3ac59ab9798514bc41970933da504bf684c09bb20230e55ad7e3a,2024-06-13T18:36:09.013000
CVE-2024-37293,0,1,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000
CVE-2024-37294,0,0,b35339309cfb6110892ba6e3580c3b860149dc89948cc54efd20172fbcf6cac8,2024-06-13T18:36:45.417000
CVE-2024-37295,0,0,fbcc7bb2889d9597bfed9fd8e34bf110cdf869ea553c4d9c4889af667e21f7cd,2024-06-13T18:36:45.417000
CVE-2024-37296,0,0,f773e9b4096330bb10b1258fc1d1c3f8598fa34d0610a3d76b02b358a1c46fc9,2024-06-13T18:36:45.417000
@ -254788,7 +254788,7 @@ CVE-2024-37507,0,0,4e09e288241de45505be5c9a204dc926ba463ec216fa96f5e2157f7702b56
CVE-2024-37509,0,0,dc88a6cc688b80a3d03a097d55abdc7d4cad7d3b7b2c546a1ea91a8173ea195a,2024-07-22T13:00:31.330000
CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000
CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000
CVE-2024-37513,0,1,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000
CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000
CVE-2024-37514,0,0,dc98e25e8fd49b90b1755d1a17af64cf14cc9a477edf02d5fac5f9675efa01ce,2024-07-22T13:00:31.330000
CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000
CVE-2024-37519,0,0,86f8ec4698a3f7ec42b8ff60d0401dd6d0a9f51f26071b5cfe16503b6f9ef5fb,2024-07-22T13:00:31.330000
@ -255018,7 +255018,7 @@ CVE-2024-37949,0,0,55220a015847dc6b7bbbb605b8fd86a65c29f22d3366af728409225c777da
CVE-2024-3795,0,0,f16f2517dca7ca05b3c4907d5c002f230ac9e36a749d3bc6fea553bc4f317d0d,2024-05-14T16:11:39.510000
CVE-2024-37950,0,0,b9d9c5157e1c031a5d4e7c44990db904f249de585cb32088fcff43b55d08f84a,2024-07-22T13:00:31.330000
CVE-2024-37951,0,0,1d7da26bc90367902aadb08526715ea13e2d2d70f6c886dc0633388d7fb4c227,2024-07-22T13:00:31.330000
CVE-2024-37952,0,1,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000
CVE-2024-37952,0,0,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000
CVE-2024-37953,0,0,4eb5938cacccd7a29bd6421c7b9d4f160d359c8ce01d9b3d6865ffcc482f476e,2024-07-22T13:00:31.330000
CVE-2024-37954,0,0,5da244531959717aea2bcb37c065da0b6b4234d99344e5c53987029f66f4ac92,2024-07-22T13:00:31.330000
CVE-2024-37955,0,0,0546cd1263e2bde71eb6a609e1ed7b710b22deaf856a78cfe13cb35decc79042,2024-07-22T13:00:31.330000
@ -255146,28 +255146,28 @@ CVE-2024-38109,0,0,02eca01dc206383c5000f5bdb91703b385cc24e7f0ebef3584edd1fc31081
CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000
CVE-2024-38112,0,0,64430ceb275cf8da67da7c67aeb82862dd246ca5cb45dd22ee184d5f24377f9e,2024-08-14T16:56:54.473000
CVE-2024-38114,0,0,1282525a951ecf3124930865d1cd10f1ea2b2932c023f1714c8b23ef7351b831,2024-08-14T02:07:05.410000
CVE-2024-38115,0,0,4704e56eea8b8b074f156e981474d632988785f88bf14ae388fb152ba6a674ba,2024-08-14T02:07:05.410000
CVE-2024-38116,0,0,c2e2ceafbae9191663acb68769fbff52112a73f7e2608f4c3d97f9e8cb7a617d,2024-08-14T02:07:05.410000
CVE-2024-38117,0,0,ca68cb4f7a878afdf154a0f25eed1ff20d4ef6133063c7fffb5553e86781d7c1,2024-08-14T02:07:05.410000
CVE-2024-38118,0,0,26d18b3717d8ebfbb8bbc274785e430983473f457c5d8729b4244429ba71532b,2024-08-14T02:07:05.410000
CVE-2024-38115,0,1,02e874a63c3ed8e836207d7ec5324587e06233688848e5986aceeba6b3647167,2024-08-16T16:32:49.573000
CVE-2024-38116,0,1,cf5f9404ade8a272eaa60eac9416d676a7fec4246c36e11b4419656b9c2b876d,2024-08-16T16:36:12.337000
CVE-2024-38117,0,1,02b7b7449a7b7b31a197bf1e7192817f8fc368d67a62c3b9bfb90b12627dfc8b,2024-08-16T16:40:43.667000
CVE-2024-38118,0,1,059378b81a9f1bb6254755f38cf2c71d4b5127a9e95a1f8408020622caafceb0,2024-08-16T16:41:04.497000
CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da45,2024-05-20T13:00:34.807000
CVE-2024-38120,0,0,c6d043ce60e7570a91ddabd7dc6cbb9101fe07ab797612d39ebfb98d20caa260,2024-08-14T02:07:05.410000
CVE-2024-38121,0,0,171fc1d508881ec08c8f3d20c5a1da6f266ed783da35b3ccbae425ec88391deb,2024-08-14T02:07:05.410000
CVE-2024-38122,0,0,24d80a04c2b8b72b5bc37449b1da731ceaa85ad71a0f7a82d1665cf0a1f2e913,2024-08-14T02:07:05.410000
CVE-2024-38123,0,1,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000
CVE-2024-38125,0,1,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000
CVE-2024-38126,0,1,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000
CVE-2024-38127,0,1,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000
CVE-2024-38128,0,1,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000
CVE-2024-38120,0,1,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088fb7,2024-08-16T17:12:59.383000
CVE-2024-38121,0,1,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000
CVE-2024-38122,0,1,ccd40c698ac79bd5e6ffae27158140be83eb08e1e0ee4a0ffabbae2b5e3808c8,2024-08-16T17:16:41.717000
CVE-2024-38123,0,0,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000
CVE-2024-38125,0,0,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000
CVE-2024-38126,0,0,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000
CVE-2024-38127,0,0,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000
CVE-2024-38128,0,0,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000
CVE-2024-3813,0,0,d80bc8b1e8c714a4f8827190dc103e9bc726aeafa665606cb93627ea2cb076a3,2024-08-07T15:45:23.793000
CVE-2024-38130,0,1,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000
CVE-2024-38131,0,1,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000
CVE-2024-38132,0,1,2a93ad01c2f6386608e424c1dfbafa21ec2ed5d60753f135cdd2c69c119de531,2024-08-16T15:33:07.097000
CVE-2024-38133,0,1,5b117a31a499a24e7c20a3254e7045dc8befa477564278a1a29716f75bfec5a7,2024-08-16T15:25:05.590000
CVE-2024-38130,0,0,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000
CVE-2024-38131,0,0,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000
CVE-2024-38132,0,0,2a93ad01c2f6386608e424c1dfbafa21ec2ed5d60753f135cdd2c69c119de531,2024-08-16T15:33:07.097000
CVE-2024-38133,0,0,5b117a31a499a24e7c20a3254e7045dc8befa477564278a1a29716f75bfec5a7,2024-08-16T15:25:05.590000
CVE-2024-38134,0,0,b6bca1691f34ce239423b1778ddba4932cca47dfb244ff22d58ba4b41cb300da,2024-08-15T17:43:41.003000
CVE-2024-38135,0,0,98f14c37b10468e1351c51883d72765a25cb71664e0ecc84c4e130e6b7bd9ae5,2024-08-16T13:32:49.503000
CVE-2024-38136,0,1,cfb5c77ae8e5a72e5b5f77bb0b7a3d12e21e298432360ac71bc0f1bdf1bb6039,2024-08-16T15:26:24.433000
CVE-2024-38137,0,1,fab28c8133db0be5dde10db5a50f4bb03706666135c65b121b19727f3cc55898,2024-08-16T15:27:09.137000
CVE-2024-38136,0,0,cfb5c77ae8e5a72e5b5f77bb0b7a3d12e21e298432360ac71bc0f1bdf1bb6039,2024-08-16T15:26:24.433000
CVE-2024-38137,0,0,fab28c8133db0be5dde10db5a50f4bb03706666135c65b121b19727f3cc55898,2024-08-16T15:27:09.137000
CVE-2024-38138,0,0,abc0a81a70e51ce96788b041a13e6056800dddcef1d1b740392d66a01c072e6f,2024-08-14T02:07:05.410000
CVE-2024-3814,0,0,4b11a7d4126e6e627365a6c09d49c5b79c42112fff3bef28a2dbbe621feb8e3e,2024-07-26T13:36:51.523000
CVE-2024-38140,0,0,ee68c7b1f88cb35e19343ff179991211a8ff702f8244f123636f491f728a1f17,2024-08-14T02:07:05.410000
@ -255216,7 +255216,7 @@ CVE-2024-38184,0,0,c835801cc9a652fb4d0e1f944198cfbcc8cd135504cb985a1202364a28f2d
CVE-2024-38185,0,0,75ab73ca7d58e9b27e8fa6ff3eacfd93bb93d79005d1365847f0476f878e01f8,2024-08-14T02:07:05.410000
CVE-2024-38186,0,0,e48699951b83a13a8c545a7bb39dc766d490dd0a39c76d8a25aa85e46c5ed311,2024-08-14T02:07:05.410000
CVE-2024-38187,0,0,426ec9e92ff0a407b183738cdd31a21c97647274d94618ee0b6aa72a02fffbbf,2024-08-14T02:07:05.410000
CVE-2024-38189,0,1,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000
CVE-2024-38189,0,0,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
@ -256877,7 +256877,7 @@ CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fc
CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000
CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000
CVE-2024-41262,0,0,48b0074f34ada1a302a3c7c2afcfaf4594d4fd732c8b7153c8377ab26e16ee3d,2024-08-01T16:35:11.627000
CVE-2024-41264,0,1,332d92db5c905482198269e17be9fe322336114f0c994cd46df7b2596aa2cc30,2024-08-16T16:00:36.687000
CVE-2024-41264,0,0,332d92db5c905482198269e17be9fe322336114f0c994cd46df7b2596aa2cc30,2024-08-16T16:00:36.687000
CVE-2024-41265,0,0,96664aad23c7dd63e002634cfc71189c6e2399a9d19b5373e19abde784e31cd7,2024-08-02T16:35:52.013000
CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000
CVE-2024-41270,0,0,af12a3d2be324bb3d9e2b16ff7d039367afc9e03066837308e275993680c0e05,2024-08-12T18:25:28.583000
@ -257163,7 +257163,7 @@ CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385f
CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000
CVE-2024-41962,0,1,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-41976,0,0,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000
@ -257430,12 +257430,12 @@ CVE-2024-42458,0,0,5dc7de7c18fc9a4762e6600de6bc88b5c8771baaff2409a2a19314905b1c9
CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000
CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000
CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000
CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449bf17,2024-08-07T19:35:13.447000
CVE-2024-42462,1,1,bd842e4078213663fb9634d032edf846d5a7dcdcf5e81621d6a22c94c7d85215,2024-08-16T14:15:13.253000
CVE-2024-42463,1,1,a938019478eeaf319f9b08147b37054c25ff2382e54c40bd90ca30afae7c0b7f,2024-08-16T14:15:13.650000
CVE-2024-42464,1,1,3e63a708074ce366f3461fc42631850434e6ccbd81b25ac91329e1979960a870,2024-08-16T14:15:13.933000
CVE-2024-42465,1,1,1c0b6edc320d8750d70e421efe32a64e97e1bb73fcf59fbb24c5bad282598f4e,2024-08-16T14:15:14.133000
CVE-2024-42466,1,1,d86a0ebc4dcb18aca1621b0b7b556b13b3a067e20f4525c591e0df9bbf718bc2,2024-08-16T14:15:14.343000
CVE-2024-42461,0,1,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000
CVE-2024-42462,0,0,bd842e4078213663fb9634d032edf846d5a7dcdcf5e81621d6a22c94c7d85215,2024-08-16T14:15:13.253000
CVE-2024-42463,0,0,a938019478eeaf319f9b08147b37054c25ff2382e54c40bd90ca30afae7c0b7f,2024-08-16T14:15:13.650000
CVE-2024-42464,0,0,3e63a708074ce366f3461fc42631850434e6ccbd81b25ac91329e1979960a870,2024-08-16T14:15:13.933000
CVE-2024-42465,0,0,1c0b6edc320d8750d70e421efe32a64e97e1bb73fcf59fbb24c5bad282598f4e,2024-08-16T14:15:14.133000
CVE-2024-42466,0,0,d86a0ebc4dcb18aca1621b0b7b556b13b3a067e20f4525c591e0df9bbf718bc2,2024-08-16T14:15:14.343000
CVE-2024-42467,0,0,4d22b6210d07d5f3c254f02dd41ae3cecad0c4d515c80021ed5ec249d7082a04,2024-08-12T13:41:36.517000
CVE-2024-42468,0,0,76cb3122a8232cee530b0374441c48dedc4c3d24ff695d723500b8a92fe30bc6,2024-08-12T13:41:36.517000
CVE-2024-42469,0,0,b65049b5c4751d92c1e0b91c507812510fe11805ae8aa9f7a38c440861e678c6,2024-08-12T13:41:36.517000
@ -257450,11 +257450,11 @@ CVE-2024-42477,0,0,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf3
CVE-2024-42478,0,0,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000
CVE-2024-42479,0,0,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000
CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34
CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c017c,2024-08-12T18:57:29.247000
CVE-2024-42480,0,1,a493fdcfd2cab0bed771f4294216832fdd84bd63bcd8976ed48629d61d56dc9b,2024-08-16T16:24:40.430000
CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000
CVE-2024-42482,0,0,b30158f5b674bded8c099de403a1859157e22ee6eae596b9cbf6c6cda1ffed96,2024-08-12T18:57:17.383000
CVE-2024-42485,0,0,fe887079979720fde6a2564dece883024602b52e3edd829141a610d95ce6aeb6,2024-08-12T18:57:17.383000
CVE-2024-42486,1,1,0cf9b72eb06e426c9ae9c3be7c0a8751b5c461e1fe82a33b1cb1479b5f7e9ef5,2024-08-16T15:15:28.777000
CVE-2024-42486,0,0,0cf9b72eb06e426c9ae9c3be7c0a8751b5c461e1fe82a33b1cb1479b5f7e9ef5,2024-08-16T15:15:28.777000
CVE-2024-42487,0,0,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
CVE-2024-42488,0,0,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
CVE-2024-42489,0,0,1203b17e47b8d78391ae8374fec72a221549be23a40702733d44133e504634fc,2024-08-12T18:57:17.383000
@ -257488,6 +257488,7 @@ CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb4
CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000
CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000
CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000
CVE-2024-42634,1,1,315cb6187375dc5de6e54eacb8a432704aa3e96d9692e54bbe2981f665b8fc7d,2024-08-16T16:15:06.670000
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000
@ -257540,7 +257541,7 @@ CVE-2024-42942,0,0,22160e7a51aba7ec4c2a442eda5365016c21f50a3ce436f5593e17d4a4e43
CVE-2024-42943,0,0,89c464dfd8c5f51926e53bbc150c1d5fb409b705cb2bcd9dfb7d1af986ed8796,2024-08-15T19:32:41.770000
CVE-2024-42944,0,0,6a290ba62a9fff3904840cadfe2b37e39d360c8330bb30550edf0cc0dbc5dd2d,2024-08-15T19:35:13.737000
CVE-2024-42945,0,0,b51c554c7b4c6d19cac5e4b0d4a01832b1af734dc7e9521d8a5997f778081806,2024-08-15T18:35:13.343000
CVE-2024-42946,0,0,93fe4893c0cedb4738a7e308b70ad69c3528d6545aadd1d60c711d4757ed44f7,2024-08-15T19:31:54.883000
CVE-2024-42946,0,1,d0f7e8d7d1788119449618db3b1da4ffbfa720ab07647edae28d1ada00373d08,2024-08-16T17:35:08.227000
CVE-2024-42947,0,0,e7d01f7003d2f409e61d4e637f7500689fb65c07673a6b4b02e4e7886d96fafe,2024-08-16T13:32:05.103000
CVE-2024-42948,0,0,59733d9ea03ff832cdda58530fe7794aa6dde194a9927e51f986b168d6545b07,2024-08-15T19:31:38.217000
CVE-2024-42949,0,0,9d545118cba6649782b54ae27c38f1aa504bb881d29e0b9897d5de790ac29d20,2024-08-15T18:35:14.430000
@ -257550,7 +257551,7 @@ CVE-2024-42951,0,0,85275541fa923c811c363f65806be15ab72ba82c78bd854fd99c466c7c580
CVE-2024-42952,0,0,b65ff3219b833a55817e0927e7de1af3e44121268840902e5ccda1d541c6cdf9,2024-08-15T19:30:38.387000
CVE-2024-42953,0,0,58c878dc5f5cca4ba3f36cfc4bba965c4a1c2ae0257b6ccf0d5ee87f2b28abe9,2024-08-15T18:35:15.460000
CVE-2024-42954,0,0,21936edb6d76a1dd8ac96611d3a88660fcfb4cf78730c9339bc7845c4b218f07,2024-08-15T18:35:16.510000
CVE-2024-42955,0,0,9320f4344c94707c19eb1638f7623083e78d4d0cac1d427a8b445dec8cf0f81b,2024-08-15T19:29:55.033000
CVE-2024-42955,0,1,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000
CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000
CVE-2024-42966,0,0,2183a7825b02d826715434a606b8e0e88607ae49ea211d2b913cb8ef25e10f0a,2024-08-16T13:35:28.477000
CVE-2024-42967,0,0,7e74ee4a2d6a17af6b0f12f00eb90c60c9c52c49e61e430789bbc0c38446386e,2024-08-16T13:34:29.780000
@ -257559,27 +257560,29 @@ CVE-2024-42969,0,0,ceb7831a2a6e34194193b49c18930eef13b8b53d9526a7c509fe06bf6f41d
CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828d7,2024-04-29T12:42:03.667000
CVE-2024-42973,0,0,d5485c43677896de6fa08dcef41d866080793d4ea6f42d62bb087be9a42b86ec,2024-08-15T18:35:18.647000
CVE-2024-42974,0,0,61d1e7965783de08549ceb87497ce958d38b08adcba4b51b3e7dd7cf76abda57,2024-08-15T18:35:19.710000
CVE-2024-42976,0,0,fdeb1058f309a6b1c2e03e5041022acb93160f1fd65f5954096327060d87628a,2024-08-16T13:31:28.890000
CVE-2024-42976,0,1,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000
CVE-2024-42977,0,0,feb7f28f54f84204165e37a00b44b1e384cb0d1f0ba15a6d5127e74a8ec2aae1,2024-08-16T13:31:11.107000
CVE-2024-42978,0,0,b1f4d5128465b01f205b47353b8c0b280ab205530bf41f8f4bc128c131592e31,2024-08-16T13:30:54.670000
CVE-2024-42979,0,0,fec579a62e68a4a25550b4929302262929d70ec750534fbc7a3c9c744abc20d4,2024-08-15T18:35:20.827000
CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000
CVE-2024-42980,0,0,aae73890d46507cd39a47700993c5d676f70df0e2e17eb3d4e6489411e40562b,2024-08-16T13:30:25.787000
CVE-2024-42981,0,0,305e4d194b20329fbf4e53ae71462711a1b6a79d86ab57d0c8e5b6861c13f109,2024-08-16T13:30:08.427000
CVE-2024-42982,0,1,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613f62,2024-08-16T14:35:03.793000
CVE-2024-42982,0,0,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613f62,2024-08-16T14:35:03.793000
CVE-2024-42983,0,0,2ff07324e83d99eb1dc609eafc4c3fb864fe9bede7cebb3f3a45d534c9241118,2024-08-15T18:35:21.960000
CVE-2024-42984,0,0,bab3f2f7207ff98837835928f6ef37efbc1f08e16988e1becb88b00c2369e868,2024-08-15T18:35:23.283000
CVE-2024-42985,0,0,c7e7a8fb8466a6c9eed5915b1babd484e4e0a3d29e5fa5926690e0b009cd701f,2024-08-16T13:29:27.497000
CVE-2024-42985,0,1,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000
CVE-2024-42986,0,0,729f44b69d8ed274bedf72a20b1cd0e83d0be1662a818f8ffd16806b1da8caa0,2024-08-16T13:26:43.100000
CVE-2024-42987,0,0,be14eefacd9f282e13e394cb1aeefe62ea3c84389f7783546c46d3192df9881f,2024-08-16T13:26:27.123000
CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000
CVE-2024-42994,1,1,929e4934cc5ce20c828654d19893b5f26f36240698af23914c05b184721c7515,2024-08-16T17:15:15.153000
CVE-2024-42995,1,1,0ea9659999eca75719977ad75316ad87471a8f88bfd82595d5287f10dccdda95,2024-08-16T17:15:15.273000
CVE-2024-4300,0,0,9683d559686bc261042c0ad86aeb3d06ca0ebb649bc8d0eaba9f4d32c108bd00,2024-04-29T12:42:03.667000
CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000
CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
CVE-2024-43044,0,0,2dbbef33f99d7cbcabcc19e81e19ebf43163c5d81893c4595ee6a39205a72744,2024-08-07T15:17:46.717000
CVE-2024-43045,0,0,6c09b38c22660d5e17b2c923e52895837b1f6e1429e2502f70318f1f62bcf3fa,2024-08-07T15:17:46.717000
CVE-2024-43044,0,1,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
CVE-2024-43045,0,1,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000
CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000
CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000
CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000
@ -257675,7 +257678,7 @@ CVE-2024-43370,0,0,59b87d7d60e811132be75fab5860fc7d531485b8890b7e3ad6ed1f41f6548
CVE-2024-43373,0,0,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000
CVE-2024-43374,0,0,7644def70e08cd7a711b128ad560c089ada83dcf140f909f0ac36102735face9,2024-08-16T02:15:17.687000
CVE-2024-43378,0,0,d0e1086da4bd21519e32eff9bfa155f1714d7bd494c9d21a9f49685aa5f864a3,2024-08-16T02:15:17.877000
CVE-2024-43381,1,1,8ad255b17aef678316f5fdfb44e36b31d5b5d1db82172614569592481d1fec5a,2024-08-16T15:15:29
CVE-2024-43381,0,0,8ad255b17aef678316f5fdfb44e36b31d5b5d1db82172614569592481d1fec5a,2024-08-16T15:15:29
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000
@ -257716,11 +257719,11 @@ CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
CVE-2024-43807,1,1,611e8f9d418d5e15c9aad30fc27b0390a7fb66137bd3721a251de12fedfbc97f,2024-08-16T15:15:29.197000
CVE-2024-43808,1,1,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13eba5,2024-08-16T15:15:29.417000
CVE-2024-43809,1,1,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000
CVE-2024-43807,0,0,611e8f9d418d5e15c9aad30fc27b0390a7fb66137bd3721a251de12fedfbc97f,2024-08-16T15:15:29.197000
CVE-2024-43808,0,0,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13eba5,2024-08-16T15:15:29.417000
CVE-2024-43809,0,0,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000
CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000
CVE-2024-43810,1,1,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000
CVE-2024-43810,0,0,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000
CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
@ -258060,7 +258063,7 @@ CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da7348723
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
CVE-2024-4763,1,1,6636f17cd3a0c4133c37d5ed7e2fab0443c459d266364d8c96c024b20b18973f,2024-08-16T15:15:30.563000
CVE-2024-4763,0,0,6636f17cd3a0c4133c37d5ed7e2fab0443c459d266364d8c96c024b20b18973f,2024-08-16T15:15:30.563000
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
CVE-2024-4765,0,0,8a392c26e3db622097fdbc028abf6a874c53118cfa805a98650695a7c92a19e0,2024-05-14T19:17:55.627000
CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000
@ -258078,8 +258081,8 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b
CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000
CVE-2024-4781,1,1,b694f46118d4cccc5c5bcdb3d30f110d4d06f54bef2c3bd5967fb05b14fef8a8,2024-08-16T15:15:30.783000
CVE-2024-4782,1,1,18e9f0fb9ad043cb162fddc8d4b5d979fca1582ad25f7d3183bf4fb975a4dc81,2024-08-16T15:15:30.967000
CVE-2024-4781,0,0,b694f46118d4cccc5c5bcdb3d30f110d4d06f54bef2c3bd5967fb05b14fef8a8,2024-08-16T15:15:30.783000
CVE-2024-4782,0,0,18e9f0fb9ad043cb162fddc8d4b5d979fca1582ad25f7d3183bf4fb975a4dc81,2024-08-16T15:15:30.967000
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
CVE-2024-4784,0,0,9aaebc683fa580787b3fd96a509a375fe0be341d6b1720ff572edca3637a16b2,2024-08-08T13:04:18.753000
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
@ -258440,8 +258443,8 @@ CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e38
CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca4436,2024-06-17T19:15:59.190000
CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000
CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000
CVE-2024-5209,1,1,a68bca98dfe872b23aaa0a9014ede2a53549ec319bf752a6f798da9369698c69,2024-08-16T15:15:31.150000
CVE-2024-5210,1,1,0c9453286818a64466348ad4ea2fe1c9bda56f0c4d89e3d6bd52256cf7397211,2024-08-16T15:15:31.337000
CVE-2024-5209,0,0,a68bca98dfe872b23aaa0a9014ede2a53549ec319bf752a6f798da9369698c69,2024-08-16T15:15:31.150000
CVE-2024-5210,0,0,0c9453286818a64466348ad4ea2fe1c9bda56f0c4d89e3d6bd52256cf7397211,2024-08-16T15:15:31.337000
CVE-2024-5211,0,0,98a88a37609463fc748729234fb7fa88ed6b19a9a862440dab2a89ae616c7fd0,2024-06-13T18:36:09.010000
CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
@ -258850,7 +258853,7 @@ CVE-2024-5687,0,0,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a
CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000
CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000
CVE-2024-5690,0,0,d97da1ed16aadcb18dbcdccf4095ed3e100e24ec0426a177c2c96faa76e14b0a,2024-08-09T13:43:37.807000
CVE-2024-5691,0,1,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000
CVE-2024-5691,0,0,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000
CVE-2024-5692,0,0,da86a3e71defc1a5762f0a215e21c8d6ad0bb48702dddd9796e84e537e21cbce,2024-08-01T13:59:56.967000
CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000
CVE-2024-5694,0,0,275b578189d93f8e1ff5fb24ee08b4deeac272512e00405f2d220d413d57023d,2024-06-11T13:54:12.057000
@ -259057,7 +259060,7 @@ CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb
CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000
CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000
CVE-2024-5975,0,0,fa255d4ef912d8f8da76e1022132a17caf8538a1c8cca7df81e3eaadac5c5086,2024-08-01T14:00:06.617000
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
CVE-2024-5976,0,1,77b9cc86c9238f37d2799be9bfcfd76dc8bf6ab8aad4ffdc48881bdede83c5f6,2024-08-16T17:53:25.450000
CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da75815823,2024-07-19T18:27:34.967000
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
@ -259076,7 +259079,7 @@ CVE-2024-5996,0,0,ab938dbc15262bb65cf82c58e85d96d3d9a41bba3218e574f8e961fd3a4906
CVE-2024-5997,0,0,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000
CVE-2024-6000,0,0,4ab86aa4bce235d1120437fd5cb3b34fb6bdae181005ebaa070e8c0afe83cf87,2024-06-17T12:42:04.623000
CVE-2024-6003,0,0,14279c0384813c4cf50ab75a79953f2b0469d9bedd7f76c2b6cebfd90962fd14,2024-06-17T16:15:16.027000
CVE-2024-6004,1,1,7ebd9046422c77bdfb40b7ec5eac36784e20ab47d0f1e37aeb7d86e4bdd1a2a4,2024-08-16T15:15:31.527000
CVE-2024-6004,0,0,7ebd9046422c77bdfb40b7ec5eac36784e20ab47d0f1e37aeb7d86e4bdd1a2a4,2024-08-16T15:15:31.527000
CVE-2024-6005,0,0,4d74c6c4a521a164f63a9fe529c141dc8da0592a0575e27e0e62d822beb9b877,2024-06-17T12:42:04.623000
CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d5f,2024-06-17T15:15:52.693000
CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000
@ -259149,7 +259152,7 @@ CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7e
CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000
CVE-2024-6098,1,1,932d25e2016531c902cfc4db6b2a32ff7be61dd1665ae909731e83ee7ccd342c,2024-08-16T15:15:31.737000
CVE-2024-6098,0,0,932d25e2016531c902cfc4db6b2a32ff7be61dd1665ae909731e83ee7ccd342c,2024-08-16T15:15:31.737000
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000
CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000
@ -259180,7 +259183,7 @@ CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42
CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
CVE-2024-6133,0,0,2337ffd9cad2357491c8f783d0b691c0b27d4405be8ab2d34dc8ce60f34a6000,2024-08-13T01:18:26.570000
CVE-2024-6134,0,0,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000
CVE-2024-6134,0,1,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000
CVE-2024-6136,0,0,b5f2fd8869742060eab1f7acc4116cefd24c0a3b003f1c5a14cb58f5ac02f037,2024-08-13T01:18:26.820000
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
@ -259264,7 +259267,7 @@ CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3
CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000
CVE-2024-6237,0,0,8762afad911d25272cef1e25e793265b79c2ac5f7d12b159ff8ab393df4b7ad2,2024-08-12T13:38:38.977000
CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ffd0,2024-06-25T18:50:42.040000
CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000
CVE-2024-6239,0,1,f9926b0cd048febae2346520b44e3c86bff18a382e32c768152365d4c8d177e9,2024-08-16T16:15:06.760000
CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000
CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000
CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000
@ -259349,7 +259352,7 @@ CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdca
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000
CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000
CVE-2024-6347,0,1,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000
CVE-2024-6347,0,0,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
@ -259375,7 +259378,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
CVE-2024-6384,0,1,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
@ -259746,7 +259749,7 @@ CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000
CVE-2024-6990,0,1,0326ecf1bc9a8efec80f09c5dfd50b62c0d815fc632f7f111159a058f9ccd9e8,2024-08-16T15:21:14.383000
CVE-2024-6990,0,0,0326ecf1bc9a8efec80f09c5dfd50b62c0d815fc632f7f111159a058f9ccd9e8,2024-08-16T15:21:14.383000
CVE-2024-6991,0,0,d11c88ce8a351ab3495759c45368576c695eaeac0cf5e78c45b41aed7a267a71,2024-08-07T22:09:36.353000
CVE-2024-6994,0,0,9960b5d210859f33c1958dbd6accb9b3cfa02ad5092a4aa4cfe1209e8d35090e,2024-08-07T22:10:04.740000
CVE-2024-6995,0,0,9e1a01449fcee7bd95abf904254e638fb274f5eefbc5fb1951ae014eb09df4e6,2024-08-07T20:35:26.507000
@ -259809,8 +259812,8 @@ CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
CVE-2024-7136,0,0,800009dc095d757e18cd07243220b156b5e1378ab0cdc8e3a6c11dcf096f0c2b,2024-08-16T11:15:04.027000
CVE-2024-7143,0,0,444409226f2889debaa1b6cea63b846cc438f1a41258f2e601b106b9c83baf18,2024-08-07T19:09:46.290000
CVE-2024-7144,1,1,956345c30ac91703cc6247a06908da0b5850fed46bf6b704798f3fbd677362a9,2024-08-16T14:15:14.690000
CVE-2024-7145,1,1,8008e4f01c2164733d1a7678bcf08be4de0dc8b1ace04bc419ca0832fa2e5456,2024-08-16T14:15:15.187000
CVE-2024-7144,0,0,956345c30ac91703cc6247a06908da0b5850fed46bf6b704798f3fbd677362a9,2024-08-16T14:15:14.690000
CVE-2024-7145,0,0,8008e4f01c2164733d1a7678bcf08be4de0dc8b1ace04bc419ca0832fa2e5456,2024-08-16T14:15:15.187000
CVE-2024-7146,0,0,1125a4692c6fb48bbab5140d3c4102c44a646d58d32c16ab6b96c4c0e4b7524f,2024-08-16T11:15:04.230000
CVE-2024-7147,0,0,25a2551577bf2ff9e0ee13fa7c6e048a893e4216beb8bb4e8ed94704fa47c0a8,2024-08-16T11:15:04.423000
CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
@ -259893,11 +259896,11 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000
CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000
CVE-2024-7255,0,1,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
CVE-2024-7262,0,1,f691c718a5a63454dd0ad05ebe1b7dabdfe7c97003cd8aba2b437046cee7544f,2024-08-16T14:25:42.820000
CVE-2024-7263,0,1,aad826c9d28e2bc52cb4f35b11d432222b44358d7b79f7294e5895302e02069b,2024-08-16T14:25:46.027000
CVE-2024-7262,0,0,f691c718a5a63454dd0ad05ebe1b7dabdfe7c97003cd8aba2b437046cee7544f,2024-08-16T14:25:42.820000
CVE-2024-7263,0,0,aad826c9d28e2bc52cb4f35b11d432222b44358d7b79f7294e5895302e02069b,2024-08-16T14:25:46.027000
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000
CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000

Can't render this file because it is too large.