diff --git a/CVE-2015/CVE-2015-67xx/CVE-2015-6748.json b/CVE-2015/CVE-2015-67xx/CVE-2015-6748.json index ceb6cf94de2..c52edf9da82 100644 --- a/CVE-2015/CVE-2015-67xx/CVE-2015-6748.json +++ b/CVE-2015/CVE-2015-67xx/CVE-2015-6748.json @@ -2,8 +2,8 @@ "id": "CVE-2015-6748", "sourceIdentifier": "secalert@redhat.com", "published": "2017-09-25T17:29:00.490", - "lastModified": "2020-01-27T00:15:10.553", - "vulnStatus": "Modified", + "lastModified": "2024-08-16T16:09:58.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,8 +86,24 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jsoup:jsoup:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.0", "versionEndExcluding": "1.8.3", - "matchCriteriaId": "FE38C5CA-5335-4547-9564-72147FEF3A64" + "matchCriteriaId": "1C802FF9-AAAC-4AE3-9BAE-8E5F05B3CC1B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ] } @@ -106,6 +122,7 @@ "url": "http://www.securityfocus.com/bid/76504", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -142,7 +159,10 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00021.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-202xx/CVE-2018-20227.json b/CVE-2018/CVE-2018-202xx/CVE-2018-20227.json index 9f6e43f7c9c..6d3300d72a2 100644 --- a/CVE-2018/CVE-2018-202xx/CVE-2018-20227.json +++ b/CVE-2018/CVE-2018-202xx/CVE-2018-20227.json @@ -2,7 +2,7 @@ "id": "CVE-2018-20227", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-19T11:29:01.920", - "lastModified": "2019-01-07T14:38:22.633", + "lastModified": "2024-08-16T16:09:23.257", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:eclipse:rdf4j:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "96E45985-FA15-4DB2-9BC1-CBAF8A7956A0" + "criteria": "cpe:2.3:a:eclipse:rdf4j:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.0", + "matchCriteriaId": "A87007A4-F9E4-4592-A805-6AEC9213AD43" } ] } diff --git a/CVE-2022/CVE-2022-296xx/CVE-2022-29631.json b/CVE-2022/CVE-2022-296xx/CVE-2022-29631.json index d622fd05e65..2c753d6e943 100644 --- a/CVE-2022/CVE-2022-296xx/CVE-2022-29631.json +++ b/CVE-2022/CVE-2022-296xx/CVE-2022-29631.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29631", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-06T21:15:08.697", - "lastModified": "2022-06-14T17:03:37.153", + "lastModified": "2024-08-16T16:11:20.603", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,10 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jodd:http:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:jodd:jodd_http:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.0", - "versionEndIncluding": "6.2.1", - "matchCriteriaId": "E86AA75D-BD93-4E0F-A196-CAF5A31ECB63" + "versionEndExcluding": "6.2.1", + "matchCriteriaId": "AA7523BB-2371-44AA-873B-3006F18A8653" } ] } @@ -101,6 +101,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] }, @@ -109,6 +110,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46089.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46089.json index e046ea72798..3a044ee9266 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46089.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46089.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46089", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T02:15:51.337", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-16T17:35:01.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en Online Flight Booking Management System v1.0 permite a los atacantes ejecutar scripts web arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de la aerol\u00ednea." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2022-46089/blob/main/CVE-35", diff --git a/CVE-2023/CVE-2023-336xx/CVE-2023-33676.json b/CVE-2023/CVE-2023-336xx/CVE-2023-33676.json index 07f76aa3807..78e0f205c54 100644 --- a/CVE-2023/CVE-2023-336xx/CVE-2023-33676.json +++ b/CVE-2023/CVE-2023-336xx/CVE-2023-33676.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33676", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T09:15:38.107", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-16T17:35:02.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Sourcecodester Lost and Found Information System's Version 1.0 es vulnerable a una inyecci\u00f3n SQL no autenticada en \"?page=items/view&id=*\" que puede escalarse a la ejecuci\u00f3n remota de comandos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-33676/blob/main/CVE-30", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json index 81657c7d058..d02280849ea 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40109", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.260", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-08-16T16:35:00.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En createFromParcel de UsbConfiguration.java, existe un posible inicio de actividad en segundo plano (BAL) debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/387d258cf10a30537fc48dc0e48d28071efa92e7", diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43292.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43292.json index a8ee3168f96..7b43f51968a 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43292.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43292.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43292", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:55.837", - "lastModified": "2024-03-13T12:33:51.697", + "lastModified": "2024-08-16T17:35:02.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en My Food Recipe usando PHP con c\u00f3digo fuente v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el nombre de la receta, el procedimiento y los par\u00e1metros de los ingredientes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-43292/blob/main/CVE-8", diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51141.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51141.json index 7dedd26abde..7c9adb5d0bb 100644 --- a/CVE-2023/CVE-2023-511xx/CVE-2023-51141.json +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51141.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51141", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T01:22:43.520", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-16T16:35:01.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en ZKTeko BioTime v.8.5.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente Autenticaci\u00f3n y Autorizaci\u00f3n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "http://biotime.com", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22543.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22543.json index 98f2c3a719a..c74b48e7f5d 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22543.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22543.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22543", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T01:15:06.980", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-16T17:35:03.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Linksys Router E1700 1.0.04 (compilaci\u00f3n 3), que permite a atacantes autenticados escalar privilegios a trav\u00e9s de una solicitud GET manipulada al URI /goform/* o mediante la funci\u00f3n ExportSettings." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://mat4mee.notion.site/Leaked-SessionID-can-lead-to-authentication-bypass-on-the-Linksys-Router-E1700-f56f9c4b15e7443fa237bd1b101a18d2", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23755.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23755.json index 0309e60dc15..53d722d73e7 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23755.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23755.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23755", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-23T22:15:07.827", - "lastModified": "2024-03-25T01:51:01.223", + "lastModified": "2024-08-16T17:35:04.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ClickUp Desktop anterior a 3.3.77 en macOS y Windows permite la inyecci\u00f3n de c\u00f3digo debido a Electron Fuses espec\u00edficos. Existe una protecci\u00f3n inadecuada contra la inyecci\u00f3n de c\u00f3digo a trav\u00e9s de configuraciones como RunAsNode." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://clickup.com/security/disclosures", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24724.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24724.json index 363a171d3a2..0921fd2e560 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24724.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24724.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24724", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:09.173", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-16T16:35:03.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Gibbon hasta 26.0.00 permite /modules/School%20Admin/messengerSettings.php la inyecci\u00f3n de plantilla del lado del servidor que conduce a la ejecuci\u00f3n remota de c\u00f3digo porque la entrada se pasa al motor de plantilla Twig (messengerSettings.php) sin sanitizaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], "references": [ { "url": "https://gibbonedu.org/download/", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25090.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25090.json index 0cdc3ecd528..f2b98f41f41 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25090.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25090", "sourceIdentifier": "security@apache.org", "published": "2024-07-26T09:15:09.700", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T17:56:31.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "La validaci\u00f3n de entrada y sanitizaci\u00f3n insuficientes de las funciones Profile name & screenname, Bookmark name & description and blogroll name en todas las versiones de Apache Roller en todas las plataformas permite que un usuario autenticado realice un ataque de XSS. Mitigaci\u00f3n: si no tiene Roller configurado para usuarios no confiables, entonces no necesita hacer nada porque conf\u00eda en que sus usuarios creen HTML sin formato y otro contenido web. Si est\u00e1 ejecutando con usuarios no confiables, entonces debe actualizar a Roller 6.1.3. Este problema afecta a Apache Roller: desde 5.0.0 hasta 6.1.3. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.1.3, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -32,10 +55,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "6.1.3", + "matchCriteriaId": "34B9206D-CB9B-49BD-8162-CEFAE5C287E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/lb50jqyxwf8jrfpydl6dc5zpqtpgrrwd", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25164.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25164.json index 530eeb5cf8b..959797a7ade 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25164.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25164.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25164", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.400", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-16T16:35:03.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad iA Path Traversal existe en iDURAR v2.0.0, que permite a atacantes no autenticados exponer archivos confidenciales a trav\u00e9s de la funcionalidad de descarga." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/idurar/idurar-erp-crm/tree/2.0.0/routes/erpRoutes/erpDownloadRouter.js", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25288.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25288.json index e1d7e4709c2..a704224be84 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25288.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25288.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25288", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T17:15:09.817", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-16T17:35:05.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "SLIMS (Senayan Library Management Systems) 9 Bulian v9.6.1 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de pop-scope-vocabolary.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-pop_scope_vocabolary.md", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25386.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25386.json index 17e3cf4a509..e9bf57028dd 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25386.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25386", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T06:15:48.390", - "lastModified": "2024-03-13T04:15:07.960", + "lastModified": "2024-08-16T17:35:06.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Directory Traversal en DICOM\u00ae Connectivity Framework de laurelbridge anterior a v.2.7.6b permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo format_logfile.pl." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2", diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25410.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25410.json index 1915ade35c2..11a1915afbf 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25410.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25410.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25410", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:58.960", - "lastModified": "2024-04-03T21:15:31.220", + "lastModified": "2024-08-16T17:35:06.847", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "flusity-CMS 2.33 es vulnerable a la carga sin restricciones de archivos con tipo peligroso en update_setting.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/flusity/flusity-CMS/commit/b99de3bd05677e8b61c04a70235faa6001556b3b", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json index 2f52391a353..5d34a61428f 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27182", "sourceIdentifier": "security@apache.org", "published": "2024-08-02T10:16:00.250", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:55:10.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,8 +15,41 @@ "value": "En Apache Linkis <= 1.5.0, la eliminaci\u00f3n arbitraria de archivos en los servicios de administraci\u00f3n b\u00e1sicos puede provocar que un usuario con una cuenta de administrador elimine cualquier archivo al que tenga acceso el usuario del sistema Linkis. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.6.0, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + }, { "source": "security@apache.org", "type": "Secondary", @@ -28,10 +61,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3.2", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "A34962F7-E33B-4593-99EE-B99AE33E5130" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/2of1p433h8rbq2bx525rtftnk19oz38h", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json index aab7e316703..be0a714980d 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27497", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T15:15:08.580", - "lastModified": "2024-03-01T15:23:36.177", + "lastModified": "2024-08-16T16:35:04.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Linksys E2000 Ver.1.0.06 build 1 es vulnerable a la omisi\u00f3n de autenticaci\u00f3n a trav\u00e9s del archivo position.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27684.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27684.json index 28687c80eee..4503016751a 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27684.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27684.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27684", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-04T14:15:41.587", - "lastModified": "2024-03-04T15:35:25.673", + "lastModified": "2024-08-16T16:35:05.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cgi y seama.cgi en D-Link GORTAC750_A1_FW_v101b03 permite a atacantes remotos inyectar script web o HTML arbitrarios a trav\u00e9s del par\u00e1metro url." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1qu4iBQGeAwolTXjVOTXsAAusSHo2ie-Y/view", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27730.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27730.json index 04cd0356bfb..49e4856293b 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27730.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27730.json @@ -2,16 +2,55 @@ "id": "CVE-2024-27730", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T19:15:18.663", - "lastModified": "2024-08-15T19:15:18.663", + "lastModified": "2024-08-16T16:35:06.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure Permissions vulnerability in Friendica v.2023.12 allows a remote attacker to obtain sensitive information and execute arbitrary code via the cid parameter of the calendar event feature." + }, + { + "lang": "es", + "value": " La vulnerabilidad de permisos inseguros en Friendica v.2023.12 permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro cid de la funci\u00f3n de eventos del calendario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/friendica/friendica/pull/13927", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json index 10a7540cd3b..851e988a611 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27744", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.870", - "lastModified": "2024-03-13T07:15:36.410", + "lastModified": "2024-08-16T16:35:07.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross-Site Scripting en Petrol Pump Mangement Software v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro de imagen en el componente profile.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json index ae684f37459..efd204fdbca 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27881", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:10.807", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T17:37:25.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,120 @@ "value": " Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda acceder a informaci\u00f3n sobre los contactos de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "EA924D87-8FAE-4E34-83F7-A5E25C7450E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "389354D3-A504-48B7-A379-B894963B2B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14", + "versionEndExcluding": "14.6", + "matchCriteriaId": "3A459550-0BAE-4843-96F0-39780516D4A9" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214118", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214119", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214120", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28418.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28418.json index 303cd30a9f5..2714d40f3df 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28418.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28418.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28418", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T13:15:53.833", - "lastModified": "2024-03-14T14:21:20.217", + "lastModified": "2024-08-16T16:35:08.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Webedition CMS 9.2.2.0 tiene una vulnerabilidad de carga de archivos a trav\u00e9s de /webEdition/we_cmd.php" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://gitee.com/shavchen214/pwn/issues/I94VI3", diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json index 94e7cc1656e..3a029d95fb2 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28964", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-12T15:15:50.647", - "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:44:09.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:common_event_enabler:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "8.9.10.0", + "matchCriteriaId": "F0DBDBFB-2C27-4F9A-BEB8-D591BDE733B5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000224987/dsa-2024-179-security-update-for-dell-emc-common-event-enabler-windows-for-cavatools-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29157.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29157.json index 4654a9151ae..83a90dad709 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29157.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29157.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29157", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:15:31.520", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-08-16T16:35:08.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5HG_read, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32316.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32316.json index 13a64d1ad9b..8920f9544ce 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32316.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32316", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T16:15:09.013", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-08-16T16:35:09.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El firmware Tenda AC500 V2.0.1.9(1307) tiene una vulnerabilidad de desbordamiento de pila en la funci\u00f3n fromDhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32609.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32609.json index 63280be56a3..b2d74d3257f 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32609.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32609.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32609", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:45.683", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-16T16:35:10.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 permite el consumo de pila en la funci\u00f3n H5E_printf_stack en H5Eint.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32860.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32860.json index 5259804a2e9..acd035dcfe8 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32860.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32860", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T13:15:49.517", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:46:36.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security_alert@emc.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,631 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.26.0", + "matchCriteriaId": "6D3E1671-D766-4BEE-A382-3F9950540382" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D355D92F-71AB-4D6D-9D3D-85A0BF4133E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.24", + "matchCriteriaId": "09B0F2CD-223E-4C11-896E-E0D2AED3D7CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C32F25E-2F1F-409D-85DF-15CCAB423DD5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.25", + "matchCriteriaId": "6D3892D1-FA31-4E08-8C4A-B233A7E6166E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F0C34FD-6A6D-43BF-B548-13D57532AF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.1.19", + "matchCriteriaId": "2BA98A09-CEC8-4765-9F67-1B8E31A403BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", + "matchCriteriaId": "486DCCF7-79D9-45C1-8CBD-26FB78705F91" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.12", + "matchCriteriaId": "502B41A3-DA11-4F02-ADBA-12BAEB90E9D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2943649A-0559-4184-AE43-B6FCEDF3BF98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "34DF7BEA-2EF9-47A8-965D-C045C793F834" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503027CC-7D9B-4F00-9728-48C12B18BD7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.0", + "matchCriteriaId": "2C2FE0D4-FEFE-4E9D-BFCA-5EAC643E47A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66B64687-CF02-414E-B961-84A011DC49E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.27.0", + "matchCriteriaId": "CBC6538F-95F5-411B-9AEE-E330D33F765E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCCE762E-FB6C-4493-A21F-347DE5CB57E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.21.0", + "matchCriteriaId": "7EE1A9B5-8534-4DAE-957E-FF670060C35A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B084185F-1C0D-47D9-9F72-A79095462428" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.27.0", + "matchCriteriaId": "626441E2-E195-4E18-B5CF-093CE2706827" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.21.0", + "matchCriteriaId": "3E92F1AF-4259-40FA-BD64-2B5E36DB815B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C631E678-90F0-4DB2-8AB8-7378EC32FAC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.18.0", + "matchCriteriaId": "84A10F10-F9C8-4FF0-8F28-BCBDABE8C8EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05928944-E647-4A4D-AEA1-B67804BC7DB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.22.0", + "matchCriteriaId": "69E828F7-2199-470B-B3F3-251704F4BAA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.0", + "matchCriteriaId": "D9A38198-F80D-4D7C-B660-8B5B44C95751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A254E353-E519-401F-8657-76C7625F9A0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.22.0", + "matchCriteriaId": "AF468943-A697-46B0-A8DF-3D9F329E87D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.0", + "matchCriteriaId": "07378EE2-F446-4E05-A6C3-42532865C664" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C0272BD-DAFD-47EC-9B70-F72B686032B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.0", + "matchCriteriaId": "F084A15D-0C77-4AC7-A2E8-CCE5B638C968" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A86161-7209-4DC6-9315-66C37C1807DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "2CB354C9-725F-41D3-A514-C61D1E2C6DD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9B4D72F-BF7F-4AE3-825E-394DF12F0482" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_15_352_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.14.0", + "matchCriteriaId": "AF372BE7-5B95-4DF7-A85A-22B92D3931BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_352:-:*:*:*:*:*:*:*", + "matchCriteriaId": "807B8FFB-4AB1-43B3-B2E6-BA53D1244437" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "36119F09-7608-4DD7-A5BC-297D015F9FE8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52628A84-FEE1-4194-A13F-4139A3A0AE9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "54398C42-AD80-4365-8F44-F3B6F44D33F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5944D668-16F9-4098-A99E-811F02C65B2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.6.0", + "matchCriteriaId": "4C42BB7D-2380-4FA9-8C5C-FE0F594B3A7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E75E14FE-EDC4-43F8-960C-F135EDFFBDCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000223440/dsa-2024-125", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32918.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32918.json index c9b94605cea..408c5c55abc 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32918.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32918", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.683", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T17:49:01.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Omisi\u00f3n de permiso que permite a los atacantes desactivar el cifrado HDCP 2.2 al no completar los pasos de inicializaci\u00f3n del intercambio de claves HDCP" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33212.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33212.json index 8ff4826a850..7b9ba22c1a5 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33212.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33212.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33212", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-23T15:15:50.090", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-08-16T16:35:11.323", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro funcpara1 en ip/goform/setcfm." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/formSetCfm-7d199da0fd0740988a498304905e2dd1", diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json index 1437017b092..b718fb802f7 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34686", "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:11.080", - "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T17:54:46.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,108 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:103:*:*:*:*:*:*:*", + "matchCriteriaId": "D84BD4DE-15D9-4201-9A31-0A20F36D19AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:104:*:*:*:*:*:*:*", + "matchCriteriaId": "E5511CFF-7BEF-46FE-BE5B-2445BC540BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:105:*:*:*:*:*:*:*", + "matchCriteriaId": "5295DFAB-ACDA-49DD-B2E6-07F6D4F3DC85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:106:*:*:*:*:*:*:*", + "matchCriteriaId": "99A1D12E-2E49-4C4A-9732-CCB2328AD838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:107:*:*:*:*:*:*:*", + "matchCriteriaId": "FE65B3D9-B97C-4016-B432-CD79F104BE6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*", + "matchCriteriaId": "2F220D25-9344-482A-A36C-9D743EA55DE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:730:*:*:*:*:*:*:*", + "matchCriteriaId": "B0075805-C6FC-4E0D-9E1B-6ABA3A69F6C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*", + "matchCriteriaId": "48791122-7265-4C51-8AEB-DEBC199F9A7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*", + "matchCriteriaId": "B9EEA160-B4B4-45E9-84C8-C26E52D6F329" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*", + "matchCriteriaId": "8BDBE717-ADB6-4080-A198-E468080F82B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*", + "matchCriteriaId": "1B8775BD-EAB8-4F08-B65D-35B704C0E36B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*", + "matchCriteriaId": "2BFCEADC-7359-470F-A412-5B2808CF6069" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*", + "matchCriteriaId": "A387786F-F4F6-44FC-B969-6FB92A1AA096" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:s4fnd_102:*:*:*:*:*:*:*", + "matchCriteriaId": "115FB1F7-4C37-4519-AEEF-93E33FCEB745" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:webcuif_700:*:*:*:*:*:*:*", + "matchCriteriaId": "757BEDCD-BB4D-4F29-B6D7-41861286122E" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3465129", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34741.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34741.json index cd0f9e3b56f..244ca62428b 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34741.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34741.json @@ -2,16 +2,59 @@ "id": "CVE-2024-34741", "sourceIdentifier": "security@android.com", "published": "2024-08-15T22:15:06.820", - "lastModified": "2024-08-15T22:15:06.820", + "lastModified": "2024-08-16T16:35:12.133", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": " En setForceHideNonSystemOverlayWindowIfNeeded de WindowState.java, existe una forma posible de que el contenido del mensaje sea visible en el protector de pantalla mientras el usuario restringe la configuraci\u00f3n de visibilidad de la pantalla de bloqueo debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-783" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/abfaf702ef833dc4d374492d45c615c6e6de7f01", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json index 0ee893d1a76..df53d16320c 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36821.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36821", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T18:15:13.927", - "lastModified": "2024-08-01T13:53:17.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:33:38.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:velop_whw0101_firmware:1.1.13.202617:*:*:*:*:*:*:*", + "matchCriteriaId": "B38C1D00-1410-4536-9DD4-B0C98871999B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:velop_whw0101:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDA4EB-13BE-4CD6-9E35-9DE76F6F9C06" + } + ] + } + ] + } + ], "references": [ { "url": "https://downloads.linksys.com/support/assets/releasenotes/WHW01_VLP01_1.1.13.202617_Customer_Release_Notes.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/IvanGlinkin/CVE-2024-36821", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json index 3b779b61341..21d91512efb 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37293", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-11T17:16:04.237", - "lastModified": "2024-06-13T18:36:09.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:11:53.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:aws_deployment_framework:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.0", + "matchCriteriaId": "F3858F8E-B54E-4077-B22D-161EE66B0A73" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/awslabs/aws-deployment-framework/pull/732", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/awslabs/aws-deployment-framework/releases/tag/v4.0.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/awslabs/aws-deployment-framework/security/advisories/GHSA-mcj7-ppmv-h6jr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json index e8e388fdfca..265b8c2f944 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38115.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38115", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:12.080", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T16:32:49.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del complemento de administraci\u00f3n de enrutamiento IP de Windows" } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20751", + "matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json index 6eed26df549..8ad3e9c9cc9 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38116.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38116", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:12.333", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T16:36:12.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del complemento de administraci\u00f3n de enrutamiento IP de Windows" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20751", + "matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json index 84f28208abb..6f441430903 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38117.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38117", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:12.570", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T16:40:43.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NTFS Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de NTFS" } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20751", + "matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38117", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json index 8ea3aa9f4a1..428051d9a4a 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38118.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38118", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:12.817", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T16:41:04.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servidor de la Autoridad de seguridad local (LSA) de Microsoft" } ], "metrics": { @@ -47,10 +51,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20751", + "matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json index 9f56a3dee82..8e4915dd52f 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38120.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38120", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:13.047", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T17:12:59.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38120", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json index d5379a5ca92..6da23ba0c16 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38121.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38121", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:13.320", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T17:13:28.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38121", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json index a0f5b6f3798..9dc3bee32b4 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38122.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38122", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-13T18:15:13.613", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T17:16:41.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servidor de la Autoridad de seguridad local (LSA) de Microsoft" } ], "metrics": { @@ -47,10 +51,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20751", + "matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.9200.25031", + "matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38122", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41962.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41962.json index b0e22915a7f..92ed4a3dc8d 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41962.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41962", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T17:16:09.507", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:34:48.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yonle:bostr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.10", + "matchCriteriaId": "572ED35B-69A0-4DD8-9764-8AC380AEF2F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Yonle/bostr/blob/8665374a66e2afb9f92d0414b0d6f420a95d5d2d/auth.js#L21", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Yonle/bostr/commit/49181f4ec9ae1472c6675cab56bbc01e723855af", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Yonle/bostr/releases/tag/3.0.10", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/Yonle/bostr/security/advisories/GHSA-5cf7-cxrf-mq73", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json index d19e35dbe45..31169551b8d 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42461", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T07:16:10.230", - "lastModified": "2024-08-07T19:35:13.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T16:51:40.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elliptic_project:elliptic:6.5.6:*:*:*:*:node.js:*:*", + "matchCriteriaId": "EAFFCBB8-D7CC-49D0-A052-D1FAAF4F3C33" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/indutny/elliptic/pull/317", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42480.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42480.json index 84e4b6ec0f6..d47e677a71b 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42480.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42480.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42480", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T16:15:15.750", - "lastModified": "2024-08-12T18:57:29.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T16:24:40.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an \"open at the top\" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2." + }, + { + "lang": "es", + "value": "Kamaji es el administrador del plano de control alojado para Kubernetes. En las versiones 1.0.0 y anteriores, Kamaji utiliza una definici\u00f3n de rango \"abierto en la parte superior\" en RBAC para funciones etcd, lo que permite que algunos servidores API de TCP puedan leer, escribir y eliminar los datos de otros planos de control. Esta vulnerabilidad se solucion\u00f3 en edge-24.8.2." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:clastix:kamaji:*:*:*:*:*:*:*:*", + "versionEndExcluding": "edge-24.8.2", + "matchCriteriaId": "442C676D-6F12-40B2-B23E-A45A3E94B7A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/clastix/kamaji/blob/8cdc6191242f80d120c46b166e2102d27568225a/internal/datastore/etcd.go#L19-L24", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/clastix/kamaji/commit/1731e8c2ed5148b125ecfbdf091ee177bd44f3db", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/clastix/kamaji/security/advisories/GHSA-6r4j-4rjc-8vw5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42634.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42634.json new file mode 100644 index 00000000000..6cdbdae822e --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42634.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42634", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-16T16:15:06.670", + "lastModified": "2024-08-16T16:15:06.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Command Injection vulnerability exists in formWriteFacMac of the httpd binary in Tenda AC9 v15.03.06.42. As a result, attacker can execute OS commands with root privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/goldds96/Report/blob/main/Tenda/AC9/CI.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json index 5adbed9c421..7996cfac91a 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42946.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42946", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:19.097", - "lastModified": "2024-08-15T19:31:54.883", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-16T17:35:08.227", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 (408) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro page en la funci\u00f3n fromVirtualSer. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json index 82c7cf11040..403d664eb41 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42955.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42955", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:19.990", - "lastModified": "2024-08-15T19:29:55.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-16T17:35:08.957", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 (408) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro page en la funci\u00f3n fromSafeClientFilter. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json index eec7067859e..48975303250 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42976", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:20.767", - "lastModified": "2024-08-16T13:31:28.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-16T17:35:09.687", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json index 202fc9a7f28..31b4f29007a 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42985", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:21.623", - "lastModified": "2024-08-16T13:29:27.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-16T17:35:10.400", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json new file mode 100644 index 00000000000..81a970abc93 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42994", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-16T17:15:15.153", + "lastModified": "2024-08-16T17:15:15.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "VTiger CRM <= 8.1.0 does not properly sanitize user input before using it in a SQL statement, leading to a SQL Injection in the \"CompanyDetails\" operation of the \"MailManager\" module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json new file mode 100644 index 00000000000..1bf4cbb139d --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42995", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-16T17:15:15.273", + "lastModified": "2024-08-16T17:15:15.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "VTiger CRM <= 8.1.0 does not correctly check user privileges. A low-privileged user can interact directly with the \"Migration\" administrative module to disable arbitrary modules." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.shielder.com/advisories/vtiger-migration-bac/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43044.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43044.json index bed26a4c93d..431b2b7cc0e 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43044.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43044", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-08-07T14:15:33.000", - "lastModified": "2024-08-07T15:17:46.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T17:19:30.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,73 @@ "value": "Jenkins 2.470 y anteriores, LTS 2.452.3 y anteriores permiten que los procesos del agente lean archivos arbitrarios del sistema de archivos del controlador Jenkins mediante el m\u00e9todo `ClassLoaderProxy#fetchJar` en la librer\u00eda Remoting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "2.452.4", + "matchCriteriaId": "0041C764-EA61-4445-9696-65E22A678FD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*", + "versionEndExcluding": "2.471", + "matchCriteriaId": "1139DB12-D88F-4E0D-B22F-2A147B1EFD31" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43045.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43045.json index 0b36bf2bafe..42ee28e4856 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43045.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43045", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-08-07T14:15:33.077", - "lastModified": "2024-08-07T15:17:46.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-16T17:21:26.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,73 @@ "value": "Jenkins 2.470 y anteriores, LTS 2.452.3 y anteriores no realizan una verificaci\u00f3n de permisos en un endpoint HTTP, lo que permite a los atacantes con permiso general/lectura acceder a \"Mis vistas\" de otros usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "2.452.4", + "matchCriteriaId": "0041C764-EA61-4445-9696-65E22A678FD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*", + "versionEndExcluding": "2.471", + "matchCriteriaId": "1139DB12-D88F-4E0D-B22F-2A147B1EFD31" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3349", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5976.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5976.json index e8793ff7581..a09961f1f64 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5976.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5976", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-13T21:15:57.683", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-16T17:53:25.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Xu-Mingming/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description" + ] }, { "url": "https://vuldb.com/?ctiid.268422", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.268422", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.355692", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json index e981571cfba..590cd90300e 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json @@ -2,16 +2,43 @@ "id": "CVE-2024-6134", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-12T13:38:38.780", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-08-16T17:35:11.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.6 no desinfecta ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/34d61f7e-90eb-4a64-a8a7-18f2d6518118/", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json index 0111afd39db..75e25f9b07d 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6239", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-21T14:15:14.007", - "lastModified": "2024-06-24T19:06:27.537", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-16T16:15:06.760", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -125,6 +125,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:5305", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6239", "source": "secalert@redhat.com", diff --git a/README.md b/README.md index 5c67c02d75d..cc659528058 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-16T16:02:30.402064+00:00 +2024-08-16T18:00:17.215682+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-16T16:00:36.687000+00:00 +2024-08-16T17:56:31.230000+00:00 ``` ### Last Data Feed Release @@ -33,65 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260229 +260232 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `3` -- [CVE-2024-2175](CVE-2024/CVE-2024-21xx/CVE-2024-2175.json) (`2024-08-16T15:15:27.940`) -- [CVE-2024-42462](CVE-2024/CVE-2024-424xx/CVE-2024-42462.json) (`2024-08-16T14:15:13.253`) -- [CVE-2024-42463](CVE-2024/CVE-2024-424xx/CVE-2024-42463.json) (`2024-08-16T14:15:13.650`) -- [CVE-2024-42464](CVE-2024/CVE-2024-424xx/CVE-2024-42464.json) (`2024-08-16T14:15:13.933`) -- [CVE-2024-42465](CVE-2024/CVE-2024-424xx/CVE-2024-42465.json) (`2024-08-16T14:15:14.133`) -- [CVE-2024-42466](CVE-2024/CVE-2024-424xx/CVE-2024-42466.json) (`2024-08-16T14:15:14.343`) -- [CVE-2024-42486](CVE-2024/CVE-2024-424xx/CVE-2024-42486.json) (`2024-08-16T15:15:28.777`) -- [CVE-2024-43381](CVE-2024/CVE-2024-433xx/CVE-2024-43381.json) (`2024-08-16T15:15:29.000`) -- [CVE-2024-43807](CVE-2024/CVE-2024-438xx/CVE-2024-43807.json) (`2024-08-16T15:15:29.197`) -- [CVE-2024-43808](CVE-2024/CVE-2024-438xx/CVE-2024-43808.json) (`2024-08-16T15:15:29.417`) -- [CVE-2024-43809](CVE-2024/CVE-2024-438xx/CVE-2024-43809.json) (`2024-08-16T15:15:29.597`) -- [CVE-2024-43810](CVE-2024/CVE-2024-438xx/CVE-2024-43810.json) (`2024-08-16T15:15:29.790`) -- [CVE-2024-4763](CVE-2024/CVE-2024-47xx/CVE-2024-4763.json) (`2024-08-16T15:15:30.563`) -- [CVE-2024-4781](CVE-2024/CVE-2024-47xx/CVE-2024-4781.json) (`2024-08-16T15:15:30.783`) -- [CVE-2024-4782](CVE-2024/CVE-2024-47xx/CVE-2024-4782.json) (`2024-08-16T15:15:30.967`) -- [CVE-2024-5209](CVE-2024/CVE-2024-52xx/CVE-2024-5209.json) (`2024-08-16T15:15:31.150`) -- [CVE-2024-5210](CVE-2024/CVE-2024-52xx/CVE-2024-5210.json) (`2024-08-16T15:15:31.337`) -- [CVE-2024-6004](CVE-2024/CVE-2024-60xx/CVE-2024-6004.json) (`2024-08-16T15:15:31.527`) -- [CVE-2024-6098](CVE-2024/CVE-2024-60xx/CVE-2024-6098.json) (`2024-08-16T15:15:31.737`) -- [CVE-2024-7144](CVE-2024/CVE-2024-71xx/CVE-2024-7144.json) (`2024-08-16T14:15:14.690`) -- [CVE-2024-7145](CVE-2024/CVE-2024-71xx/CVE-2024-7145.json) (`2024-08-16T14:15:15.187`) +- [CVE-2024-42634](CVE-2024/CVE-2024-426xx/CVE-2024-42634.json) (`2024-08-16T16:15:06.670`) +- [CVE-2024-42994](CVE-2024/CVE-2024-429xx/CVE-2024-42994.json) (`2024-08-16T17:15:15.153`) +- [CVE-2024-42995](CVE-2024/CVE-2024-429xx/CVE-2024-42995.json) (`2024-08-16T17:15:15.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `44` +Recently modified CVEs: `53` -- [CVE-2024-37090](CVE-2024/CVE-2024-370xx/CVE-2024-37090.json) (`2024-08-16T14:19:42.403`) -- [CVE-2024-37091](CVE-2024/CVE-2024-370xx/CVE-2024-37091.json) (`2024-08-16T14:08:08.113`) -- [CVE-2024-37513](CVE-2024/CVE-2024-375xx/CVE-2024-37513.json) (`2024-08-16T14:30:47.543`) -- [CVE-2024-37952](CVE-2024/CVE-2024-379xx/CVE-2024-37952.json) (`2024-08-16T14:43:20.333`) -- [CVE-2024-38123](CVE-2024/CVE-2024-381xx/CVE-2024-38123.json) (`2024-08-16T15:40:45.897`) -- [CVE-2024-38125](CVE-2024/CVE-2024-381xx/CVE-2024-38125.json) (`2024-08-16T15:41:26.523`) -- [CVE-2024-38126](CVE-2024/CVE-2024-381xx/CVE-2024-38126.json) (`2024-08-16T15:42:36.073`) -- [CVE-2024-38127](CVE-2024/CVE-2024-381xx/CVE-2024-38127.json) (`2024-08-16T15:43:13.980`) -- [CVE-2024-38128](CVE-2024/CVE-2024-381xx/CVE-2024-38128.json) (`2024-08-16T15:31:29.327`) -- [CVE-2024-38130](CVE-2024/CVE-2024-381xx/CVE-2024-38130.json) (`2024-08-16T15:31:59.127`) -- [CVE-2024-38131](CVE-2024/CVE-2024-381xx/CVE-2024-38131.json) (`2024-08-16T15:32:31.797`) -- [CVE-2024-38132](CVE-2024/CVE-2024-381xx/CVE-2024-38132.json) (`2024-08-16T15:33:07.097`) -- [CVE-2024-38133](CVE-2024/CVE-2024-381xx/CVE-2024-38133.json) (`2024-08-16T15:25:05.590`) -- [CVE-2024-38136](CVE-2024/CVE-2024-381xx/CVE-2024-38136.json) (`2024-08-16T15:26:24.433`) -- [CVE-2024-38137](CVE-2024/CVE-2024-381xx/CVE-2024-38137.json) (`2024-08-16T15:27:09.137`) -- [CVE-2024-38189](CVE-2024/CVE-2024-381xx/CVE-2024-38189.json) (`2024-08-16T15:11:42.940`) -- [CVE-2024-41264](CVE-2024/CVE-2024-412xx/CVE-2024-41264.json) (`2024-08-16T16:00:36.687`) -- [CVE-2024-42982](CVE-2024/CVE-2024-429xx/CVE-2024-42982.json) (`2024-08-16T14:35:03.793`) -- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-08-16T14:44:05.733`) -- [CVE-2024-6347](CVE-2024/CVE-2024-63xx/CVE-2024-6347.json) (`2024-08-16T14:33:42.730`) -- [CVE-2024-6384](CVE-2024/CVE-2024-63xx/CVE-2024-6384.json) (`2024-08-16T14:29:24.947`) -- [CVE-2024-6990](CVE-2024/CVE-2024-69xx/CVE-2024-6990.json) (`2024-08-16T15:21:14.383`) -- [CVE-2024-7255](CVE-2024/CVE-2024-72xx/CVE-2024-7255.json) (`2024-08-16T15:23:19.167`) -- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-16T14:25:42.820`) -- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-16T14:25:46.027`) +- [CVE-2024-32918](CVE-2024/CVE-2024-329xx/CVE-2024-32918.json) (`2024-08-16T17:49:01.547`) +- [CVE-2024-33212](CVE-2024/CVE-2024-332xx/CVE-2024-33212.json) (`2024-08-16T16:35:11.323`) +- [CVE-2024-34686](CVE-2024/CVE-2024-346xx/CVE-2024-34686.json) (`2024-08-16T17:54:46.250`) +- [CVE-2024-34741](CVE-2024/CVE-2024-347xx/CVE-2024-34741.json) (`2024-08-16T16:35:12.133`) +- [CVE-2024-36821](CVE-2024/CVE-2024-368xx/CVE-2024-36821.json) (`2024-08-16T16:33:38.597`) +- [CVE-2024-37293](CVE-2024/CVE-2024-372xx/CVE-2024-37293.json) (`2024-08-16T16:11:53.287`) +- [CVE-2024-38115](CVE-2024/CVE-2024-381xx/CVE-2024-38115.json) (`2024-08-16T16:32:49.573`) +- [CVE-2024-38116](CVE-2024/CVE-2024-381xx/CVE-2024-38116.json) (`2024-08-16T16:36:12.337`) +- [CVE-2024-38117](CVE-2024/CVE-2024-381xx/CVE-2024-38117.json) (`2024-08-16T16:40:43.667`) +- [CVE-2024-38118](CVE-2024/CVE-2024-381xx/CVE-2024-38118.json) (`2024-08-16T16:41:04.497`) +- [CVE-2024-38120](CVE-2024/CVE-2024-381xx/CVE-2024-38120.json) (`2024-08-16T17:12:59.383`) +- [CVE-2024-38121](CVE-2024/CVE-2024-381xx/CVE-2024-38121.json) (`2024-08-16T17:13:28.350`) +- [CVE-2024-38122](CVE-2024/CVE-2024-381xx/CVE-2024-38122.json) (`2024-08-16T17:16:41.717`) +- [CVE-2024-41962](CVE-2024/CVE-2024-419xx/CVE-2024-41962.json) (`2024-08-16T16:34:48.873`) +- [CVE-2024-42461](CVE-2024/CVE-2024-424xx/CVE-2024-42461.json) (`2024-08-16T16:51:40.270`) +- [CVE-2024-42480](CVE-2024/CVE-2024-424xx/CVE-2024-42480.json) (`2024-08-16T16:24:40.430`) +- [CVE-2024-42946](CVE-2024/CVE-2024-429xx/CVE-2024-42946.json) (`2024-08-16T17:35:08.227`) +- [CVE-2024-42955](CVE-2024/CVE-2024-429xx/CVE-2024-42955.json) (`2024-08-16T17:35:08.957`) +- [CVE-2024-42976](CVE-2024/CVE-2024-429xx/CVE-2024-42976.json) (`2024-08-16T17:35:09.687`) +- [CVE-2024-42985](CVE-2024/CVE-2024-429xx/CVE-2024-42985.json) (`2024-08-16T17:35:10.400`) +- [CVE-2024-43044](CVE-2024/CVE-2024-430xx/CVE-2024-43044.json) (`2024-08-16T17:19:30.643`) +- [CVE-2024-43045](CVE-2024/CVE-2024-430xx/CVE-2024-43045.json) (`2024-08-16T17:21:26.803`) +- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-08-16T17:53:25.450`) +- [CVE-2024-6134](CVE-2024/CVE-2024-61xx/CVE-2024-6134.json) (`2024-08-16T17:35:11.413`) +- [CVE-2024-6239](CVE-2024/CVE-2024-62xx/CVE-2024-6239.json) (`2024-08-16T16:15:06.760`) ## Download and Usage diff --git a/_state.csv b/_state.csv index da335e5cb72..b064ee7a184 100644 --- a/_state.csv +++ b/_state.csv @@ -79627,7 +79627,7 @@ CVE-2015-6744,0,0,ca2d66c76739783f716b1cdcc4ad3d204d35663a9542d22561c35a22e800ca CVE-2015-6745,0,0,e627d87474527daa79e7db2e1742300f4bd416724c177b6a6d8ec953ff29eca7,2015-08-31T19:08:00.877000 CVE-2015-6746,0,0,7e29a9dc31ea25916e170d4ba83bc34337696a20eed0923f46cc852b4dbd6721,2015-08-31T19:08:26.937000 CVE-2015-6747,0,0,a78c01ec5c822ac123b463fe0c957ec53cf6e33a09298554185c99ece916ef30,2015-08-31T19:08:48.720000 -CVE-2015-6748,0,0,127756c2b0ef0cf95f1da6f4edd29fe4db415868dba3d1ed3d1ce33dccea2daf,2020-01-27T00:15:10.553000 +CVE-2015-6748,0,1,f049f25f1e6c0ea2410c5396476cb8476bbb17e19c7f07baf9cf7a1d0e72da6a,2024-08-16T16:09:58.827000 CVE-2015-6749,0,0,f87c3a43609c773ca6f81a43f39e0d6c771bccada5b3fcf86178cf12796c77a4,2016-12-08T03:13:18.987000 CVE-2015-6750,0,0,81c69f4954e30747a454457076be8a1ade8a803744cd6badf8f33ada62a65d0a,2015-09-01T18:23:26.903000 CVE-2015-6751,0,0,5c4be3ca0d6e05978dc982372915dded47b3e5eaafd3b39d7c4f17a76a131d44,2015-09-11T17:59:46.143000 @@ -109236,7 +109236,7 @@ CVE-2017-9437,0,0,64e23275d195a1ab2cbc31c52573223cde8ca170da9b723fd8474232992ca7 CVE-2017-9438,0,0,1a16512c2f194e9c8d7ea21627fc6228bd5549f81a4e55109342be440100bd8a,2023-11-07T02:50:46.323000 CVE-2017-9439,0,0,456f16a5e48c436581a51d320ede1d67b85a567c7da9bc7eaa063565aca48200,2019-10-03T00:03:26.223000 CVE-2017-9440,0,0,2123eb4ea3a03cedde6e2eddbaa29d3fe6e33ff0b3ee0a93b6111ae21ce4a4ec,2019-10-03T00:03:26.223000 -CVE-2017-9441,0,1,6e652d223a5dc3eaece5b3b62832b1fb6d10153f411c16e97db83690374877f9,2024-08-16T15:35:01.103000 +CVE-2017-9441,0,0,6e652d223a5dc3eaece5b3b62832b1fb6d10153f411c16e97db83690374877f9,2024-08-16T15:35:01.103000 CVE-2017-9442,0,0,8bf9f336242e1c1489746dbf1b94a79372e63100caad4ebd9dbd12e2a621193e,2024-08-05T17:15:39.363000 CVE-2017-9443,0,0,54e257e6a290bc5924fb0dfda90995bb7d0e850ef0677f89bc9cc580b15fd1d3,2024-08-05T17:15:39.430000 CVE-2017-9444,0,0,a8a61be64f1fe6f977b85debc8187d06e9259b178fd3bed8f2748cb6c8036855,2017-06-12T17:44:06.033000 @@ -119921,7 +119921,7 @@ CVE-2018-20221,0,0,5fd00b71cc487e4e0e4193daba4cceeb8f5705806d153b6672f8f29f74b7c CVE-2018-20222,0,0,8e0c16e57d9dcc30033901200ca3c9da59694c4f503c1b22d690ba9bc360aad2,2019-04-08T11:56:13.073000 CVE-2018-20225,0,0,b27824f57b885e319090ecc9a354a7faaf14af2f7c34c7e7a258c32460ecce7b,2024-08-05T12:15:29.653000 CVE-2018-20226,0,0,7d0a52318600d72e8702c5ca7c094270b9052a8df2b0da4bb948918001ecfba1,2019-10-03T00:03:26.223000 -CVE-2018-20227,0,0,e0483ae742de594c3c3497c75bb20080f6ff0b5047c6814ec6d5c093eecdcb63,2019-01-07T14:38:22.633000 +CVE-2018-20227,0,1,a9caf84bef65bc1087c3cf0d315ef0ab956e2f0d5407f1246e20b01dc37393b8,2024-08-16T16:09:23.257000 CVE-2018-20228,0,0,4e90f13706674b200b83ac5ad5612cdd8d08d3cf02d435efa10b9deb11d15ffc,2019-01-24T15:37:52.280000 CVE-2018-20229,0,0,2f2605790386ea4f1918e0a0a2344cce728cb227ddab0e6739b41de696f780b0,2019-04-08T16:29:58.260000 CVE-2018-20230,0,0,0881d313ffec24b55ad46c902fec949a0be3386cfd883c69c8ca77f41722e84a,2020-08-24T17:37:01.140000 @@ -197747,7 +197747,7 @@ CVE-2022-29624,0,0,b7304d3f3d8a3fc21bb530fa62622522262f40c296b6abc0e5d2f4893aa57 CVE-2022-29627,0,0,ffa421d2c9b9f34fa5129a23f31eab5821dd06b3edf2869d17e4218d06592946,2022-06-12T02:12:18.457000 CVE-2022-29628,0,0,ed87694646944d873796e13e11b56199fcf3eb8b9ce0fb46cd12f5d571e6ecdb,2022-06-09T20:11:00.937000 CVE-2022-2963,0,0,f75c48b435f8a5336e2327a75c2e41ade8c611cf0f5a72ab580655090bfa4f1b,2022-10-18T18:04:12.260000 -CVE-2022-29631,0,0,9e75f09225ea998af93999be145286e588fcbb5ca3b3d7fcd2496bf7bf3523fd,2022-06-14T17:03:37.153000 +CVE-2022-29631,0,1,901bdf323e111be1491fba1cf63af131ff327ee14d14e6d2651fd7d73345ec9e,2024-08-16T16:11:20.603000 CVE-2022-29632,0,0,330989ff1b1ea65814ad0e45d736a41973f8dc7d17221c330c3f21fc050c4681,2022-06-08T15:54:04.953000 CVE-2022-29633,0,0,cfa42aa13fd24239ac389e8a2f3603df7bbdce50cf8d75f18e8b39a6b73524ba,2023-08-08T14:22:24.967000 CVE-2022-29637,0,0,d80755a0ed2863cfa85e5e86c4fe0cd1373f11826a292f73211d8e383a471bee,2022-06-08T16:04:59.757000 @@ -210372,7 +210372,7 @@ CVE-2022-46080,0,0,fe9b2f2a23de7c5102d29ab9bc9b6a0f2eb379ce1e2d5a8ce8acadcffbe0e CVE-2022-46081,0,0,10dd263b055bb8688d827cd365513fa6234714848594880daa28df023fae41a3,2024-08-03T15:15:33.853000 CVE-2022-46087,0,0,2d7a2aad383393e3a211a5235a80f74ad68301414683cf8758f0099824be289a,2023-02-06T21:54:50.580000 CVE-2022-46088,0,0,4ed06a94c0bc5acd5a9950d39108669b474d03ba4d63c42e5b0a87c8dd938716,2024-03-05T18:50:18.333000 -CVE-2022-46089,0,0,32a450b8d6f1081fe551f32b5626a3eee19b8cf229568431e3a129e772b8efdc,2024-03-07T13:52:27.110000 +CVE-2022-46089,0,1,a389db1543f1a2ff5fae3a5ebf216c4a40482acbc273e2405c2ae12b84cb1029,2024-08-16T17:35:01.040000 CVE-2022-4609,0,0,e70428330dd60a5e25b1dc4109e568b1aced34149fef1cd3984474ebc7588254,2022-12-23T18:44:47.767000 CVE-2022-46091,0,0,6ff24a58a333a49492281b25c366e610950da50d2b34311dcc22df1e4f6200df,2024-08-05T16:35:01.230000 CVE-2022-46093,0,0,c0c02a4cae40cc3ff547b83ecf90b1666a8ae67ef432ea60abf5435d631d85a2,2023-01-24T14:24:27.513000 @@ -215476,7 +215476,7 @@ CVE-2023-21348,0,0,6536205321d5fe5c8ecb581d119686017cf544a48b45f9971c9987430c9d5 CVE-2023-21349,0,0,6db4fdb58824ed6add2774434860256244faea3a5778dec5dee8a7389bbf3391,2023-11-03T18:59:35.570000 CVE-2023-2135,0,0,4975a001fe13471f3f36bbc1a515f8a00221f54cd705ee38f3b61a934cb9f011,2023-10-20T20:53:18.983000 CVE-2023-21350,0,0,190e6cfe06286946a16c7d06283fc13546904bc93f168f3bd1a752e5caa577dc,2023-11-04T03:22:37.570000 -CVE-2023-21351,0,1,dfa04bdbe866b1a8220a4a23f3b3a9f73d22c0f87606557b670b234ca20f7d5a,2024-08-16T15:35:01.333000 +CVE-2023-21351,0,0,dfa04bdbe866b1a8220a4a23f3b3a9f73d22c0f87606557b670b234ca20f7d5a,2024-08-16T15:35:01.333000 CVE-2023-21352,0,0,bf9bbc836531e62cddd0e2eb36967636a5feba7eeb8a8cc199d223cecbe99cd0,2023-11-04T03:22:08.317000 CVE-2023-21353,0,0,c66984d1d99a5b13dc3ec131e5a274aa6bd6b74fe67d618fbf20f8803ecf6638,2023-11-04T03:22:00.393000 CVE-2023-21354,0,0,d6461086ceeb0e8c3fc21b5518c694b08fab2af77c245181d061ef4d315b3c02,2023-11-04T03:21:47.663000 @@ -225303,7 +225303,7 @@ CVE-2023-33671,0,0,2c64ca1e06c9630e4ba1d8fe85512ff860c671e3e913c3ae1fe0459631330 CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610a10,2023-06-12T13:15:10.900000 CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000 CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000 -CVE-2023-33676,0,0,90ba6c2c3d44d3e4ddbc93a4545955fd021e123f330baf5ccdf142ce22cf6a9f,2024-03-07T13:52:27.110000 +CVE-2023-33676,0,1,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000 CVE-2023-33677,0,0,fdaeb49d64bdf1efa8b5411d739207103f1736e1ceb5ef124ebf0bc2d9538056,2024-03-06T15:18:08.093000 CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000 CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000 @@ -230092,7 +230092,7 @@ CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9 CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000 CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000 CVE-2023-40107,0,0,66f62207d9e25b242ec6da7f35b2ef9ecf0f1e96681d1510eaef351f3c32142f,2024-02-16T13:37:55.033000 -CVE-2023-40109,0,0,9852e1ed3ab84624ed488dd571dfcb2a8f8fbe67a503c0c3a8f8a32f6ca7bd2c,2024-02-16T13:37:55.033000 +CVE-2023-40109,0,1,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000 CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000 CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000 CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000 @@ -232453,7 +232453,7 @@ CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0 CVE-2023-43284,0,0,d19af47cad8f003ee912aefb8b077df83455ebeb41fc85cb4eac052cd716193d,2023-11-22T15:15:09.303000 CVE-2023-4329,0,0,8b75efb685335d1476e96d7eec54e652c5d16a0d171dc01ce34df40a6d7b080d,2023-08-21T18:40:42.853000 CVE-2023-43291,0,0,d5ba19d030168db77bf7db7e6beafa094201b9e344ad7626faccfa0f9a3f170d,2023-09-29T17:25:25.957000 -CVE-2023-43292,0,0,065ac2f210732043951d2ad4eb65f830f888507c648fd02a30a9db517004e7a7,2024-03-13T12:33:51.697000 +CVE-2023-43292,0,1,24ca0ca0034ab3716a04050b8953f7ca74741d3547dbf42a22c571c80aa2ce0b,2024-08-16T17:35:02.787000 CVE-2023-43295,0,0,654a2e717a810338b9f5002f5c757587f6953578d4b0f454b1d2aae95dbd9902,2023-11-08T18:29:14.447000 CVE-2023-43297,0,0,dd6c536a8c4208de85afa8f1927062a6a713aaab4fa69403926f8e654f86f56a,2023-10-04T17:05:58.947000 CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca33224732bc,2023-12-11T17:48:50.780000 @@ -237787,7 +237787,7 @@ CVE-2023-51133,0,0,4bc9e38acdb3d80c5232cd830b1f09875cdf7b59bc6548f7ae1d4caef7595 CVE-2023-51135,0,0,53c80adeaa8e75c9e3cd470f8895bc91ebde787cdb264fd2dcfc95c04b4bb99d,2024-01-05T18:31:15.977000 CVE-2023-51136,0,0,63ac77396c787693d1da831a86e7e0b47a74d8a0de9124c93b3461410be3e60a,2024-01-05T18:30:58.837000 CVE-2023-5114,0,0,54f99e7d2f0cfaa44a8d93ec082f1df9899d84ed3553bc7f2db17be741a57d05,2023-11-13T17:48:55.993000 -CVE-2023-51141,0,0,d0a59f47f631036480902f5b7c06b564781b9cba22a29a98faf605d8d6619d3c,2024-04-11T12:47:44.137000 +CVE-2023-51141,0,1,ed87fa65299edf13575c071e576bf18048cd3ec368ae733d0d5c21fda476e068,2024-08-16T16:35:01.820000 CVE-2023-51142,0,0,3cc421719bb627f399e2e569c0e2f084a8d2b6a78a2b82bf6a4efa03230e2ce3,2024-07-08T14:16:45.710000 CVE-2023-51146,0,0,565c9e6150b79b32d680692996443b4529e7b07694ee0fd8309e418e9a5f3ca2,2024-03-27T12:29:30.307000 CVE-2023-51147,0,0,75e5ad9e43cde03291b18d115e151db0aadaa5d5d0263e6c24a28fb6db5ae3b5,2024-08-05T21:35:01.980000 @@ -238270,7 +238270,7 @@ CVE-2023-51796,0,0,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2ca CVE-2023-51797,0,0,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000 CVE-2023-51798,0,0,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000 CVE-2023-5180,0,0,05de7a925f3b457b2b9f8a9dc5ce3c9a3d8ff4c9a3d8e7d0ed796b81c1f1e2d9,2024-01-04T15:43:40.260000 -CVE-2023-51800,0,1,93a99ca6ee46e69a132e46eb486333b1af37da71382d74108d17c872eb589999,2024-08-16T15:35:02.053000 +CVE-2023-51800,0,0,93a99ca6ee46e69a132e46eb486333b1af37da71382d74108d17c872eb589999,2024-08-16T15:35:02.053000 CVE-2023-51801,0,0,daec35424d16e8651180e47ce7964aaa86708153ff4d98fb80cf1eeaac664121,2024-08-01T13:45:33 CVE-2023-51802,0,0,26d2eb61c4bcd76ccdbaa324cdefd7f58728d6a0c595e8ec56ace22886ad7131,2024-02-29T13:49:29.390000 CVE-2023-51803,0,0,5790a7a80f4880b3e3a0fa86790ea4c84e94ec68c366f5e2ddc287043198ebc5,2024-04-01T01:12:59.077000 @@ -238383,7 +238383,7 @@ CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d1 CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000 CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000 CVE-2023-5207,0,0,ae7a22a20155b6a0e191891e5e59a6b878214fc55c1a67934deb96cc7d59a0de,2023-10-04T01:55:31.953000 -CVE-2023-52070,0,1,eb135ebe9555f9263de301311a19bde2c26d80c5302f7256ab733a45a10b5c37,2024-08-16T15:35:02.790000 +CVE-2023-52070,0,0,eb135ebe9555f9263de301311a19bde2c26d80c5302f7256ab733a45a10b5c37,2024-08-16T15:35:02.790000 CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000 CVE-2023-52072,0,0,1d3ce461c7777391c7f83d91e740b1ebc41a9b9c6ba2aac12cdeda55979ce207,2024-01-11T20:05:45.403000 CVE-2023-52073,0,0,44eca5907bf748429307dd6a52fcacd5ad285cf13a8090b51741b3af5b94a19e,2024-01-11T20:05:37.137000 @@ -243917,10 +243917,10 @@ CVE-2024-21725,0,0,5e6534017e45269ab964c843fba95f205445e30933324620ccbba3f3f4e2e CVE-2024-21726,0,0,6323b2b43ac337f244a115fea0a0997a8ee4d7e666452b5dae48b4ac07f1f7fb,2024-02-29T13:49:29.390000 CVE-2024-21727,0,0,4af573498420db9348e00aac06b95b56a5038edabffc25cb0f25ab9c01be1a45,2024-02-15T14:28:31.380000 CVE-2024-21728,0,0,6d3de60c64db99ec16689d15b3a09c6273756d73ea66742792a8ee295b84ce4d,2024-02-16T13:38:00.047000 -CVE-2024-21729,0,1,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000 +CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000 CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 -CVE-2024-21730,0,1,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000 -CVE-2024-21731,0,1,0bdbad6073a6f00bc29521c81bb3ba90d14042bc70946cce369f0b6d5d73421c,2024-08-16T14:54:49.230000 +CVE-2024-21730,0,0,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000 +CVE-2024-21731,0,0,0bdbad6073a6f00bc29521c81bb3ba90d14042bc70946cce369f0b6d5d73421c,2024-08-16T14:54:49.230000 CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411731,2024-01-08T18:51:23.740000 CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000 CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000 @@ -243939,7 +243939,7 @@ CVE-2024-21746,0,0,71b367edf262d30b7091359190b87e54a7e9349e34c251cedb156f5314341 CVE-2024-21747,0,0,cc2bc1e14d3097f2a1e3dc28d52ecd9537e1bd47ae59862aa7a5dd138ea1e45b,2024-01-11T18:45:06.960000 CVE-2024-21748,0,0,2a197de0adbf993ed118e27e797a4f0c8754f47a7d945195f996e2582711721f,2024-07-17T19:59:28.060000 CVE-2024-21749,0,0,5487855d4429da4fac08226224f1538028a7a5ac2df658cc224a0e240622cf41,2024-02-29T13:49:47.277000 -CVE-2024-2175,1,1,9e9e3edd6492c4dbac5ff0accd7cd503db38ed345fbfa9a1783a57a68a56f8a9,2024-08-16T15:15:27.940000 +CVE-2024-2175,0,0,9e9e3edd6492c4dbac5ff0accd7cd503db38ed345fbfa9a1783a57a68a56f8a9,2024-08-16T15:15:27.940000 CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000 CVE-2024-21751,0,0,55d06ade7b40f70a88f44c4672adccf43ead813dee575220c2752c77b1d36f34,2024-06-10T12:40:41.360000 CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000 @@ -244544,7 +244544,7 @@ CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba7 CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000 CVE-2024-22532,0,0,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000 CVE-2024-22533,0,0,85338afee49dae9d2d34419392208a0e08c059f930c68060a5bc4d947f64730e,2024-02-10T04:09:13.303000 -CVE-2024-22543,0,0,b394fea0f9ec82c032a72697191c5255a9224f67e82d2cec41e6415b42196cbc,2024-02-27T14:20:06.637000 +CVE-2024-22543,0,1,b1a889b0e18be55a9638cd371ddf76030836a5edd3b6465766a28cf814e1ba4e,2024-08-16T17:35:03.823000 CVE-2024-22544,0,0,c83930b3fd617d56b4e76bf97e8edd2a7a4295e7011794060244a8c71ee5f812,2024-08-01T13:46:59.453000 CVE-2024-22545,0,0,68df59d7f199c8b9a762129a9a26d5183a0bcd88eec159e4a975bd0c437f8e2d,2024-03-05T18:15:48.443000 CVE-2024-22546,0,0,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000 @@ -245296,7 +245296,7 @@ CVE-2024-2375,0,0,a058c80efe949762571e053df4cb958436e1818db9efb8af354b35f7ce7104 CVE-2024-23750,0,0,5b7689a4bbe3979ddb3dbfc60b9bab1cc13d0a195ac1ecb4770e9c464c629b61,2024-01-29T16:51:14.573000 CVE-2024-23751,0,0,9162dc4b42b5905d8dd88803aa2613495cbbe611df5d9d2ead982e210e469fa5,2024-01-29T15:06:44.003000 CVE-2024-23752,0,0,b2bcc21873940c2a0980c29225225dbeb5e398b96bb8976a2b36657cd69cb30a,2024-01-29T19:27:17.040000 -CVE-2024-23755,0,0,1d0ab3a2302d7444b06dc76885babfa0cdbd41238356230e54918e18d91dff39,2024-03-25T01:51:01.223000 +CVE-2024-23755,0,1,d38be966ccbea9093e3f38cc4a316cab8e8cf5496a4c06474494fc58b9fd5172,2024-08-16T17:35:04.600000 CVE-2024-23756,0,0,2bdfbaef90f9f936a849dec2c9c1d1a05a3f10092fc01318b2702eeb8348f878,2024-02-15T16:01:08.870000 CVE-2024-23758,0,0,3ffe01e5849c29350b16e72f283a186df16bf63db40bd56bdf04a6fdd9681114,2024-02-22T19:07:37.840000 CVE-2024-23759,0,0,7b8f90d14164aaef0f5274ab8cd0cd35c941b0f2a4c75bb44f448c7d8d1f721f,2024-02-15T04:49:02.133000 @@ -245812,7 +245812,7 @@ CVE-2024-2472,0,0,9c657ae60ef92e7052748340ce8fdcc97fb449e534be5cbcdbd4360a9f7fdd CVE-2024-24720,0,0,116148208b713005301f5cf40f7ed4d29a4a646b11c4e3748d94824457651517,2024-08-14T15:35:05.267000 CVE-2024-24721,0,0,cc501af2f363293d6bbcb033e643fca22423d4b5f2a3dc57ffee4b6412c8c2b9,2024-08-12T18:35:31.143000 CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000 -CVE-2024-24724,0,0,49e36beb0292b27c4af21607f62c8098e243af86c10e87204060b3a2a9eb0caa,2024-04-03T12:38:04.840000 +CVE-2024-24724,0,1,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9afa9d,2024-08-16T16:35:03.010000 CVE-2024-24725,0,0,fa4c4ce65e4991dcf18e22afc18c407373bea4c35493c8cf2afcfe5d0757cc18,2024-03-25T01:51:01.223000 CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 @@ -246110,7 +246110,7 @@ CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f7 CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000 CVE-2024-25089,0,0,4d3ddaeeeaf0e005a5320fd57126d38836ae358b9586c6957758efb8e6b78742,2024-02-13T00:38:12.137000 CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 -CVE-2024-25090,0,0,fe4dfe05b7df4dade0fae9afde244a31ac4436c4195a84dec142976b30aaa959,2024-07-26T12:38:41.683000 +CVE-2024-25090,0,1,f85b3bcd033b385efb1c9f266ce72e41f2e2d9369cf294e95ea532fc1e35d52c,2024-08-16T17:56:31.230000 CVE-2024-25091,0,0,d822656b63074e0c8fc140e02cdc2082434684ada7eeff085f5eee9f7616d66b,2024-08-05T19:35:03.780000 CVE-2024-25092,0,0,93228461014d21e76377d62123a9b74976fcddddff96fb9097cb4fcb49528f7c,2024-06-10T02:52:08.267000 CVE-2024-25093,0,0,b8e6c12d6bc03129058956c6365ec4ac1bf71d6b0585045592f329dee7756d25,2024-02-29T13:49:29.390000 @@ -246175,7 +246175,7 @@ CVE-2024-25155,0,0,1d7983859d61945142ef2e8872f422d7a225c4f14d7bf78ef2435c14d9e9f CVE-2024-25156,0,0,5644f61e62691ed9b2ea36cf2dd30ea49f643127034e87e186f5419ac1deb692,2024-03-14T14:21:20.217000 CVE-2024-25157,0,0,cd729b57eba763a1404c06e161ad68966ff36563106bac56cde20ec280ac8b95,2024-08-14T17:49:14.177000 CVE-2024-2516,0,0,14566cb1daab665f74119ef85235fd35fa3b84dccd777ba113a66fd32edf19a9,2024-05-17T02:38:16.350000 -CVE-2024-25164,0,0,0c2d2e02425cd8795a424c928e888033fabe9adbf3e44624e7d86333837b1314,2024-03-05T13:41:01.900000 +CVE-2024-25164,0,1,759bf404d5770b9163c704f082cc395dd906a306da057b7d64ff4a44c31ee872,2024-08-16T16:35:03.903000 CVE-2024-25165,0,0,b60ae9c4b2953dad1606ed76f79140fa695e9553000ce7a315e2caf4198c7634,2024-02-15T06:23:39.303000 CVE-2024-25166,0,0,28ed357e8ad3f41e96ed47a3cbc3e0eb532501ab6da8d8dda90dddb9fc6831df,2024-02-27T14:20:06.637000 CVE-2024-25167,0,0,be72ecca7313bea8f298d89db24b35310bc283e623855cf81605c9b70521a6b3,2024-08-05T18:35:07.617000 @@ -246239,7 +246239,7 @@ CVE-2024-25269,0,0,cecb054aeb252fd3635e4b5b6f2ee9da6b9765bdfc4680265db28bca7071a CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f91,2024-05-17T02:38:17.313000 CVE-2024-25274,0,0,08bbd944a87379073203caa03548429c52cb88f2e3324503fdb87764ae5cf736,2024-02-20T19:50:53.960000 CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000 -CVE-2024-25288,0,0,ec9a8f6e97e7741142de4cb4c32dde31396457ba8d55d4f5745270d50453dfad,2024-02-22T19:07:27.197000 +CVE-2024-25288,0,1,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000 CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000 CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000 CVE-2024-25291,0,0,3fb4fe8a5c11e3a034eb8eee615e5ca2d89bb2fc5feb0b891e21815184a51204,2024-08-01T13:47:40.580000 @@ -246291,7 +246291,7 @@ CVE-2024-25376,0,0,6a816dff6e980af2ce9830b28c1e10df0bab9ab3e8e9a695c06849f72c23c CVE-2024-2538,0,0,9040c900b991e8f6fd3afa80f5869e2f9dbcc85520bbfcec371534f7a5ee52c0,2024-03-20T13:00:16.367000 CVE-2024-25381,0,0,a7f2494426dcfd03638803eefb4663189386d44e34e1d8cefdca6022c601b371,2024-02-22T19:07:27.197000 CVE-2024-25385,0,0,4e6ac49ed38b214c0cadcf5b7d24f80edcf812117f3b947eea7b8836b8926a85,2024-02-23T02:42:54.547000 -CVE-2024-25386,0,0,8150946dfcd9aeb8580150c5b420a3c626648a2db1c6d529b93950e8e3ec732d,2024-03-13T04:15:07.960000 +CVE-2024-25386,0,1,635388f91f9efca73d197efb28e6d958488f53679752b3c1d9d9ef7abd682a1f,2024-08-16T17:35:06.100000 CVE-2024-25388,0,0,a4fd2e7348bdb39a0284b3ab07f14681f4dbe00912c0f5a31c9cd1eaaaf64a39,2024-08-01T13:47:42.200000 CVE-2024-25389,0,0,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000 CVE-2024-2539,0,0,e61b24f26184c749ddf56008443c202d469d18246466f0526477f147012e59d6,2024-04-10T13:23:38.787000 @@ -246305,7 +246305,7 @@ CVE-2024-25398,0,0,d9ed4e2578e708fde238a2333f8c06b711d373daa3ef2c157ba58fb7d13ba CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000 CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000 -CVE-2024-25410,0,0,da2543318fbb8275cd16936f8a754d30f1d50739901afbcb1ba92647c65cf519,2024-04-03T21:15:31.220000 +CVE-2024-25410,0,1,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000 CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000 CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000 CVE-2024-25415,0,0,669eb2c339e3bc5aae821eb5536f61ec9a8ace328fdd7918c4b65de35957067d,2024-06-07T15:15:49.860000 @@ -247740,7 +247740,7 @@ CVE-2024-27179,0,0,85f9bd060c25072746b1e3bfaefabaa31cf907d9fa1300683bdfc57bd5ce2 CVE-2024-2718,0,0,e867b4db92934c4ec2b3fac03d5022cd051733038b4330c7ca5ad40b77757de0,2024-05-17T02:38:27.407000 CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431d16,2024-07-04T05:15:15.450000 CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000 -CVE-2024-27182,0,0,ce412bcff2b9c7110a2b759fc053bec2d3578e8e3e218da80159f8ef3b0ffed3,2024-08-02T12:59:43.990000 +CVE-2024-27182,0,1,3745db63e259cb2e1fbe54f15ae0e0f8afab0bc93a91d91e5de7d932d84971e0,2024-08-16T16:55:10.923000 CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000 CVE-2024-27188,0,0,def19a2058b71e528abca5da80971f2d008d715cb853d3ea2c84141e42391a01,2024-03-27T12:29:30.307000 CVE-2024-27189,0,0,994d0c9d134383fa54dc85b5fd282a40acff54c3ff303ac4e31ff6be7de68f0c,2024-03-15T16:26:49.320000 @@ -248007,7 +248007,7 @@ CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a8 CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000 CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000 CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000 -CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000 +CVE-2024-27497,0,1,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000 CVE-2024-27499,0,0,b83d178e9b7191162c5685f1e47e2fd1e5529f49e76aee3b7cd72833d352a7e5,2024-08-01T13:48:29.880000 CVE-2024-2750,0,0,37727f710079f44007aa4b3f740cc1e5c5b0086f375c812c16d7e3bf2db19280,2024-05-02T18:00:37.360000 CVE-2024-27507,0,0,553b05ae6ffd373dfbf2aa3222522f3386658a0a78887ec1a5a87ad22402f8cf,2024-03-23T03:15:11.443000 @@ -248084,7 +248084,7 @@ CVE-2024-27674,0,0,21e90956bc1e5ed96e828710d1d2cfc02b0d7dccfda52db8ef3f15b53b564 CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000 CVE-2024-27680,0,0,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000 CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000 -CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000 +CVE-2024-27684,0,1,b102c05080f733920be192face7e38ed6a74f9c73aceec04d2c70a07af3f6781,2024-08-16T16:35:05.530000 CVE-2024-27689,0,0,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000 CVE-2024-2769,0,0,4ce409110b7519da5af6e8ebe0cc3e53d83319a867f728e76ce04b1f4c62c385,2024-05-17T02:38:29.300000 CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000 @@ -248110,13 +248110,13 @@ CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c7 CVE-2024-27728,0,0,92c2f4f300ca741f2c37bce04178555a76577e155666dd983f312360347cacd1,2024-08-15T19:15:18.477000 CVE-2024-27729,0,0,c948204789378d657f2b41d6c6761ce5ea794f998ddb93f2ebf81a9fb64e12c5,2024-08-15T19:15:18.573000 CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000 -CVE-2024-27730,0,0,32a18e903d98aa035fd1fe5fcdbab3b67106449b10089c696c32a889a14b214f,2024-08-15T19:15:18.663000 +CVE-2024-27730,0,1,12847aa86fe1ac70d87265d0b4758314d0c5ea3a5710aebdf2b0c7adafade873,2024-08-16T16:35:06.563000 CVE-2024-27731,0,0,0e54bb9a495ca00aca3255fbd7013d472940c8369148ec88372e9e447c0ebdfe,2024-08-15T19:15:18.770000 CVE-2024-27733,0,0,f76bf300f1cfa0de74d17f1145877f7fe4a3d69ea3dede66e09a54e795dd7256,2024-03-08T14:02:57.420000 CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663b2a,2024-03-01T22:22:25.913000 CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000 CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000 -CVE-2024-27744,0,0,4e757ce0fe3647ea6f05f08011979a37be799ec10e3981611cdfea238e8d5ca8,2024-03-13T07:15:36.410000 +CVE-2024-27744,0,1,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000 CVE-2024-27746,0,0,25c5d1637666144aa24b9e78e08712d087d46315d29be0eb97ff37efb1a8968b,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000 CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000 @@ -248139,8 +248139,8 @@ CVE-2024-27774,0,0,9cbdaf77f4a8542149d6b11f5bee28067f7edd716cc6732ed60e063fe1f70 CVE-2024-27775,0,0,456fca18fe71533779d986efe95c0ae90c69ca0c555f033d6cc6ced4fa8e3387,2024-03-28T16:07:30.893000 CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1ef96,2024-06-03T14:46:24.250000 CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000 -CVE-2024-27782,0,1,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000 -CVE-2024-27783,0,1,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000 +CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000 +CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000 CVE-2024-27784,0,0,7a9199f6100de9f987e85bb4b46ccc517d63d40c8a5a9b633fa6d524c9d2d6a0,2024-07-09T18:18:38.713000 CVE-2024-27785,0,0,a9323d0de61da76c0e0b4ae0888d0a2f5fae6fc263c21d492f4567bd7dd7a351,2024-07-09T18:18:38.713000 CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000 @@ -248224,7 +248224,7 @@ CVE-2024-27873,0,0,7729d99677f493b1646015ca9c6f3b42e2f48da1b219729ff59f6f38e1d66 CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29c1a,2024-08-09T17:02:19.750000 CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000 CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000 -CVE-2024-27881,0,0,6afd9f87fafeb826eaa3a6402ee6d0351c4562f692aa76e6b34d561c97200b1f,2024-07-30T13:32:45.943000 +CVE-2024-27881,0,1,ecd3b41ffcf84a1b769c2ce9b805a207566f7e84b913888f092b35189f2e87e8,2024-08-16T17:37:25.757000 CVE-2024-27882,0,0,5f6b8c776d129a743847181e673fbc08fa4525f477938bb4131e477f4d230687,2024-07-30T13:32:45.943000 CVE-2024-27883,0,0,a0ddd934b377fc709fb4c9c5999258197501ae8a4c900c5f15b38ef425986e01,2024-07-30T13:32:45.943000 CVE-2024-27884,0,0,c8b7a89e085d35ad0c448e616c336654f520047f390f2d4a8df19df20362a2a2,2024-07-30T13:32:45.943000 @@ -248621,7 +248621,7 @@ CVE-2024-28404,0,0,de4bb0761b47ec48a2f8f7ba9fcf3d34a35356ef117606bd87d22259d5f91 CVE-2024-28405,0,0,2c15de9876ba9bcb0c88245dcbd415aed2fe212a7903bb0c75f14ccc80f65f8d,2024-08-01T16:35:07.140000 CVE-2024-2841,0,0,2c2b4741d1454e52d6849cf0d7e19bb6be42afd910b9080bb0f288684da8e29a,2024-03-29T12:45:02.937000 CVE-2024-28417,0,0,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b6a4,2024-07-03T01:51:41.033000 -CVE-2024-28418,0,0,a547e7c2904ffc7c315aa13518177bc1d84929cd46462a0678162ae7db3fce1d,2024-03-14T14:21:20.217000 +CVE-2024-28418,0,1,2a4e7f72113758cf676cf86e709d4c2254271c4bc05c9c8adb6c432f26d0d67c,2024-08-16T16:35:08.140000 CVE-2024-2842,0,0,fb8969f6b6806427a8ba5bfc6ea26b5b1997081ed131de3b61a4fe60370dfde0,2024-03-29T12:45:02.937000 CVE-2024-28421,0,0,1239831c00e8490a8b37a2f0168365916badc596709bff57ac81168b6c37e716,2024-08-05T19:35:05.787000 CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c92f,2024-03-14T20:11:36.180000 @@ -248923,7 +248923,7 @@ CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000 CVE-2024-28962,0,0,a96effbf83c42c6de037f267cb741b7ad8c0c1cba3ce445c3f138895f41093ff,2024-08-06T16:30:24.547000 CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000 -CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000 +CVE-2024-28964,0,1,668c3eb1130fe0883336d2377db58f6ba4d918c33aa5ccfcfc554147c62cb6c8,2024-08-16T16:44:09.413000 CVE-2024-28965,0,0,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000 CVE-2024-28966,0,0,6430710ce538aed33833d6523d76ed4e05ecdf436ddf0d76f353fb0ef57acee9,2024-08-06T15:30:39.067000 CVE-2024-28967,0,0,1648dd50c3f81be97a86f7abed79bf1b0d6da23e4a54c3c444650653354399fb,2024-08-06T15:30:14.820000 @@ -248943,7 +248943,7 @@ CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f3 CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808f7e,2024-06-27T12:47:19.847000 CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000 CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000 -CVE-2024-28986,0,1,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000 +CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000 CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000 @@ -249097,7 +249097,7 @@ CVE-2024-29152,0,0,6494eb520227446d6d245c5a4d673a99692904bc67e1a2221cdb6494798ef CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000 CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c77b,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,595d020a34dc3c63329ef492697be54cca90adb54515cbfada40f26153450f3f,2024-03-18T12:38:25.490000 -CVE-2024-29157,0,0,686a5563366ae5e63c744308ef6f77aa3c96e95949cc031d68a4d1990f03c411,2024-05-14T16:13:02.773000 +CVE-2024-29157,0,1,3110ca8118b2c924b316fb8b417f719cf20fff49178f5804090215ed711693f7,2024-08-16T16:35:08.877000 CVE-2024-29158,0,0,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000 CVE-2024-29159,0,0,9a119fb563b8f74a63294a27b73a89cf8c5215b9d36b48948639d3bb01780b26,2024-05-14T16:13:02.773000 CVE-2024-2916,0,0,62a74d7777ba9b78e45dbd8edaf3903a6d88704541ec72ec8eada5e4f7d122b9,2024-05-17T02:38:37.200000 @@ -249234,7 +249234,7 @@ CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0 CVE-2024-29402,0,0,b3b67ac2f5a71f897648f0dbc8697340f6879726be4aa06cba11c0478007588d,2024-04-17T12:48:07.510000 CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000 CVE-2024-29413,0,0,493f53d4b43110a7ef6c57bebf5ca6e237d29210366d7552d76297fd422d6175,2024-04-04T12:48:41.700000 -CVE-2024-29415,0,1,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000 +CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000 CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000 @@ -249314,7 +249314,7 @@ CVE-2024-29661,0,0,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515e CVE-2024-29666,0,0,a67e8622ed74011ff249c5e68e53374a60af6cb3676ee7edca6fb573c3e202e4,2024-03-26T12:55:05.010000 CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494dc8,2024-08-01T13:49:33.747000 CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000 -CVE-2024-29672,0,1,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000 +CVE-2024-29672,0,0,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000 CVE-2024-2968,0,0,45b6ebbb9d99cd3c2205a629e13ac67f3a4bda14dbab27666ba50c91e62a9257,2024-03-29T12:45:02.937000 CVE-2024-29684,0,0,b36bf2e8a8667d8059487f589a89143767a320a5d181a5559cd241abd56a073c,2024-08-06T15:35:12.520000 CVE-2024-29686,0,0,24415b8b4ad1fce01014ce0adb73b5758ac1af7cb6661af128dfb5e4207dea3b,2024-08-02T01:16:00.577000 @@ -250605,7 +250605,7 @@ CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520 CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000 CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000 CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 -CVE-2024-31333,0,1,dff3c0848f2c560893a0af75ea057ea93ab7ac2846c297e0e5fb7e6350eba960,2024-08-16T15:35:05.893000 +CVE-2024-31333,0,0,dff3c0848f2c560893a0af75ea057ea93ab7ac2846c297e0e5fb7e6350eba960,2024-08-16T15:35:05.893000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 @@ -251217,7 +251217,7 @@ CVE-2024-32312,0,0,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3 CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000 CVE-2024-32314,0,0,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000 CVE-2024-32315,0,0,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000 -CVE-2024-32316,0,0,ffea206eb35e029317458be59cb44b8fa7a1becdd91322b99748836c3f7db1d0,2024-04-17T16:51:07.347000 +CVE-2024-32316,0,1,b7e4f766b6ae8b9ee3202c8692a9daa8fa4256b563e548adca488753bcf1bbfd,2024-08-16T16:35:09.793000 CVE-2024-32317,0,0,650aa34fc080388d8f2bd6a4a88b6775736a0002394db3f799d9283eb4ac353f,2024-08-08T21:35:13.350000 CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000 CVE-2024-3232,0,0,c59a906ca6c3b26e020d4b33cc77d57f43a342f5b3c4ac255f8439d838cfaba1,2024-07-16T18:00:02.110000 @@ -251452,7 +251452,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000 CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000 -CVE-2024-32609,0,0,e9c7de90afd0cbd1681b9959652a6da4e9f88c281b35d47dfe050d5fb7f03f3f,2024-05-14T16:12:23.490000 +CVE-2024-32609,0,1,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000 CVE-2024-32611,0,0,2310031ef5af96912f44f0f7e5319f735ea5afde954f456c8fb33e30d583bb91,2024-05-14T16:12:23.490000 @@ -251683,7 +251683,7 @@ CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196 CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000 CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000 CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000 -CVE-2024-32860,0,0,f7dffb4e6c88e91eb3b0e840948c90a54884d2d7e46d06b53c404dced4e4a3d1,2024-06-13T18:35:19.777000 +CVE-2024-32860,0,1,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000 CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000 CVE-2024-32862,0,0,2aef539538fe2995a5ca2aea866b8c37c4f13ea43ec8d03f4cb015e7c649b943,2024-08-09T18:55:44.473000 CVE-2024-32863,0,0,6824730357c9032b068186d64db79b75e84cc03aca375bd1b03f4bed7db730e0,2024-08-09T18:47:45.963000 @@ -251743,7 +251743,7 @@ CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c CVE-2024-32915,0,0,ce3c0f63e7c4b15b4980a52ade118f9c0799ed8303c4569ce9e259a0da82edf0,2024-06-17T12:43:31.090000 CVE-2024-32916,0,0,b886661caf70d7fd3c261e90c0f590c6eca5af4ee25ade8b0972d2baebb2ff9c,2024-06-17T12:43:31.090000 CVE-2024-32917,0,0,6d583d8ab79c5333a5d03cc2ab6bba8eb02ee95c890cd04661d7dbc4855b1773,2024-08-15T16:35:09.653000 -CVE-2024-32918,0,0,2a2c8a8c7d4b363845694cbf190176d55749936bbf41bcb406340187abded385,2024-06-17T12:43:31.090000 +CVE-2024-32918,0,1,af111f037945614b977ab3fde7f96a13d2defad259d3c610a939cb822dc9c206,2024-08-16T17:49:01.547000 CVE-2024-32919,0,0,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000 CVE-2024-3292,0,0,07318f8f2185b7ffadc020ce54f4218255ee206d16b74c44d805183e4ce99eaf,2024-05-17T18:35:35.070000 CVE-2024-32920,0,0,884af5f47808b4ceffd2a4bd9b80204f75cce16bd0848479c6a369a24d34e09f,2024-06-17T12:43:31.090000 @@ -251890,7 +251890,7 @@ CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000 CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000 CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 -CVE-2024-33212,0,0,9a12458adc56efb8a68240e2fde6c0ad53446d170f1d3cd3bc653023748972de,2024-04-24T13:39:42.883000 +CVE-2024-33212,0,1,e1465636a9a0085dbcb931f6bf0bf00f21c6133d537bb14ffddf0238c4968d35,2024-08-16T16:35:11.323000 CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000 CVE-2024-33214,0,0,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000 CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000 @@ -252880,7 +252880,7 @@ CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000 CVE-2024-34685,0,0,588dc8fca74d544e911ad8585a3fe8a4026086ccc3b45cf5d371e8a153609a7e,2024-07-09T18:19:14.047000 -CVE-2024-34686,0,0,9a46529afe2602396741c77c95009142538ded4dd5a0a610b2bc7ac147d05880,2024-06-11T13:54:12.057000 +CVE-2024-34686,0,1,e9bb1b88f368d1635fab463778c0099fa75235c21c0d77c253e89ea0001f99e2,2024-08-16T17:54:46.250000 CVE-2024-34687,0,0,2d1fb3e427c306d9f3a4e574ef26ad04ac3746abee3e170bed2385765a3ef230,2024-05-14T19:17:55.627000 CVE-2024-34688,0,0,f7195c0aa4b21b145d71d8ca8f2dd3d8f80451302ff7a5fec7e22b7dba8274ce,2024-08-09T19:45:52.623000 CVE-2024-34689,0,0,24635e46ef31bb11483f26da60a02a929940d00bd29acd39e88acae29470e314,2024-07-09T18:19:14.047000 @@ -252922,15 +252922,15 @@ CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-34727,0,0,d3a2c747ee927f1291c35785807c6dbb5ec4b02ae6150a400652401339eb68d8,2024-08-15T22:15:06.190000 CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000 -CVE-2024-34731,0,1,db99553d52ef10862db59395def4b447bf82c534bc82ff690124fb7e9aeaf33e,2024-08-16T15:35:07.050000 -CVE-2024-34734,0,1,2401da04401bc478efc817cf70bc2539da268544cddb84ea1022fb7b735e1a9a,2024-08-16T15:35:08.043000 +CVE-2024-34731,0,0,db99553d52ef10862db59395def4b447bf82c534bc82ff690124fb7e9aeaf33e,2024-08-16T15:35:07.050000 +CVE-2024-34734,0,0,2401da04401bc478efc817cf70bc2539da268544cddb84ea1022fb7b735e1a9a,2024-08-16T15:35:08.043000 CVE-2024-34736,0,0,e31a789529c464401dd83172b804c99ebe04c32cc188ce2e95f92b9abe1bc6ea,2024-08-15T22:15:06.400000 -CVE-2024-34737,0,1,47d73555cd102e0f18e45ab95ac3a6e267c7cd75e08fe880be1adf2bf0c8e2dd,2024-08-16T15:35:09.367000 -CVE-2024-34738,0,1,9bffb660d4578c23873bea39f77d81a9f59f5b4d9ddbe82ebb52e5c5dcb4a003,2024-08-16T15:35:09.537000 -CVE-2024-34739,0,1,29b4a468c9ec4e299c008f2fd536080f64baded03c66ae4ec0774f333537b18a,2024-08-16T15:35:09.703000 +CVE-2024-34737,0,0,47d73555cd102e0f18e45ab95ac3a6e267c7cd75e08fe880be1adf2bf0c8e2dd,2024-08-16T15:35:09.367000 +CVE-2024-34738,0,0,9bffb660d4578c23873bea39f77d81a9f59f5b4d9ddbe82ebb52e5c5dcb4a003,2024-08-16T15:35:09.537000 +CVE-2024-34739,0,0,29b4a468c9ec4e299c008f2fd536080f64baded03c66ae4ec0774f333537b18a,2024-08-16T15:35:09.703000 CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000 -CVE-2024-34740,0,1,7e6b7caee11d6bb2f72419f850600f936ccab908481703a9ea744b4d892dfa36,2024-08-16T14:35:02.640000 -CVE-2024-34741,0,0,ffc119c2b062b459351b84600fe5fda211e601923a32345a664710007a08e353,2024-08-15T22:15:06.820000 +CVE-2024-34740,0,0,7e6b7caee11d6bb2f72419f850600f936ccab908481703a9ea744b4d892dfa36,2024-08-16T14:35:02.640000 +CVE-2024-34741,0,1,9743d0fcf2b344299b6d8e57c3e5c047679ef45dcdbcc16f464446bb088cce71,2024-08-16T16:35:12.133000 CVE-2024-34742,0,0,810e6764d5ddb3d52b814c091bfdc919e6fb1c2ff52eaed58ccd0c8bd96c8188,2024-08-15T22:15:06.890000 CVE-2024-34743,0,0,e813f78a1c3c1f053825d2df9fc7d52e06e3c3fcd645217e4ada409f53307702,2024-08-15T22:15:06.957000 CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000 @@ -254275,7 +254275,7 @@ CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa79 CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44df61,2024-06-07T19:24:09.243000 CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000 CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000 -CVE-2024-36821,0,0,a101d59bf6e24c907bc18edaa02c1eaea1af6aad6d551ff1aa91ecf54c6663ec,2024-08-01T13:53:17.693000 +CVE-2024-36821,0,1,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000 CVE-2024-36823,0,0,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000 CVE-2024-36827,0,0,d5b65af3d7b9322aad3b5478f72ede9b79c676edb352f8fbc888d8aac5e59f92,2024-06-07T19:24:09.243000 CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e04b,2024-08-12T14:35:09.987000 @@ -254482,8 +254482,8 @@ CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3 CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000 CVE-2024-37089,0,0,9e292fe1dd11fba75d82973b2e1db6879968f554c93ecd19be42fbc3a656ef4b,2024-06-24T12:57:36.513000 -CVE-2024-37090,0,1,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 -CVE-2024-37091,0,1,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b460,2024-08-16T14:08:08.113000 +CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 +CVE-2024-37091,0,0,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b460,2024-08-16T14:08:08.113000 CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3a6b,2024-06-24T19:26:54.367000 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 @@ -254632,7 +254632,7 @@ CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14 CVE-2024-37287,0,0,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000 CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000 -CVE-2024-37293,0,0,efa095b0cfa3ac59ab9798514bc41970933da504bf684c09bb20230e55ad7e3a,2024-06-13T18:36:09.013000 +CVE-2024-37293,0,1,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000 CVE-2024-37294,0,0,b35339309cfb6110892ba6e3580c3b860149dc89948cc54efd20172fbcf6cac8,2024-06-13T18:36:45.417000 CVE-2024-37295,0,0,fbcc7bb2889d9597bfed9fd8e34bf110cdf869ea553c4d9c4889af667e21f7cd,2024-06-13T18:36:45.417000 CVE-2024-37296,0,0,f773e9b4096330bb10b1258fc1d1c3f8598fa34d0610a3d76b02b358a1c46fc9,2024-06-13T18:36:45.417000 @@ -254788,7 +254788,7 @@ CVE-2024-37507,0,0,4e09e288241de45505be5c9a204dc926ba463ec216fa96f5e2157f7702b56 CVE-2024-37509,0,0,dc88a6cc688b80a3d03a097d55abdc7d4cad7d3b7b2c546a1ea91a8173ea195a,2024-07-22T13:00:31.330000 CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000 CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000 -CVE-2024-37513,0,1,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000 +CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000 CVE-2024-37514,0,0,dc98e25e8fd49b90b1755d1a17af64cf14cc9a477edf02d5fac5f9675efa01ce,2024-07-22T13:00:31.330000 CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000 CVE-2024-37519,0,0,86f8ec4698a3f7ec42b8ff60d0401dd6d0a9f51f26071b5cfe16503b6f9ef5fb,2024-07-22T13:00:31.330000 @@ -255018,7 +255018,7 @@ CVE-2024-37949,0,0,55220a015847dc6b7bbbb605b8fd86a65c29f22d3366af728409225c777da CVE-2024-3795,0,0,f16f2517dca7ca05b3c4907d5c002f230ac9e36a749d3bc6fea553bc4f317d0d,2024-05-14T16:11:39.510000 CVE-2024-37950,0,0,b9d9c5157e1c031a5d4e7c44990db904f249de585cb32088fcff43b55d08f84a,2024-07-22T13:00:31.330000 CVE-2024-37951,0,0,1d7da26bc90367902aadb08526715ea13e2d2d70f6c886dc0633388d7fb4c227,2024-07-22T13:00:31.330000 -CVE-2024-37952,0,1,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000 +CVE-2024-37952,0,0,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000 CVE-2024-37953,0,0,4eb5938cacccd7a29bd6421c7b9d4f160d359c8ce01d9b3d6865ffcc482f476e,2024-07-22T13:00:31.330000 CVE-2024-37954,0,0,5da244531959717aea2bcb37c065da0b6b4234d99344e5c53987029f66f4ac92,2024-07-22T13:00:31.330000 CVE-2024-37955,0,0,0546cd1263e2bde71eb6a609e1ed7b710b22deaf856a78cfe13cb35decc79042,2024-07-22T13:00:31.330000 @@ -255146,28 +255146,28 @@ CVE-2024-38109,0,0,02eca01dc206383c5000f5bdb91703b385cc24e7f0ebef3584edd1fc31081 CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000 CVE-2024-38112,0,0,64430ceb275cf8da67da7c67aeb82862dd246ca5cb45dd22ee184d5f24377f9e,2024-08-14T16:56:54.473000 CVE-2024-38114,0,0,1282525a951ecf3124930865d1cd10f1ea2b2932c023f1714c8b23ef7351b831,2024-08-14T02:07:05.410000 -CVE-2024-38115,0,0,4704e56eea8b8b074f156e981474d632988785f88bf14ae388fb152ba6a674ba,2024-08-14T02:07:05.410000 -CVE-2024-38116,0,0,c2e2ceafbae9191663acb68769fbff52112a73f7e2608f4c3d97f9e8cb7a617d,2024-08-14T02:07:05.410000 -CVE-2024-38117,0,0,ca68cb4f7a878afdf154a0f25eed1ff20d4ef6133063c7fffb5553e86781d7c1,2024-08-14T02:07:05.410000 -CVE-2024-38118,0,0,26d18b3717d8ebfbb8bbc274785e430983473f457c5d8729b4244429ba71532b,2024-08-14T02:07:05.410000 +CVE-2024-38115,0,1,02e874a63c3ed8e836207d7ec5324587e06233688848e5986aceeba6b3647167,2024-08-16T16:32:49.573000 +CVE-2024-38116,0,1,cf5f9404ade8a272eaa60eac9416d676a7fec4246c36e11b4419656b9c2b876d,2024-08-16T16:36:12.337000 +CVE-2024-38117,0,1,02b7b7449a7b7b31a197bf1e7192817f8fc368d67a62c3b9bfb90b12627dfc8b,2024-08-16T16:40:43.667000 +CVE-2024-38118,0,1,059378b81a9f1bb6254755f38cf2c71d4b5127a9e95a1f8408020622caafceb0,2024-08-16T16:41:04.497000 CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da45,2024-05-20T13:00:34.807000 -CVE-2024-38120,0,0,c6d043ce60e7570a91ddabd7dc6cbb9101fe07ab797612d39ebfb98d20caa260,2024-08-14T02:07:05.410000 -CVE-2024-38121,0,0,171fc1d508881ec08c8f3d20c5a1da6f266ed783da35b3ccbae425ec88391deb,2024-08-14T02:07:05.410000 -CVE-2024-38122,0,0,24d80a04c2b8b72b5bc37449b1da731ceaa85ad71a0f7a82d1665cf0a1f2e913,2024-08-14T02:07:05.410000 -CVE-2024-38123,0,1,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000 -CVE-2024-38125,0,1,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000 -CVE-2024-38126,0,1,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000 -CVE-2024-38127,0,1,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000 -CVE-2024-38128,0,1,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000 +CVE-2024-38120,0,1,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088fb7,2024-08-16T17:12:59.383000 +CVE-2024-38121,0,1,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000 +CVE-2024-38122,0,1,ccd40c698ac79bd5e6ffae27158140be83eb08e1e0ee4a0ffabbae2b5e3808c8,2024-08-16T17:16:41.717000 +CVE-2024-38123,0,0,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000 +CVE-2024-38125,0,0,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000 +CVE-2024-38126,0,0,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000 +CVE-2024-38127,0,0,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000 +CVE-2024-38128,0,0,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000 CVE-2024-3813,0,0,d80bc8b1e8c714a4f8827190dc103e9bc726aeafa665606cb93627ea2cb076a3,2024-08-07T15:45:23.793000 -CVE-2024-38130,0,1,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000 -CVE-2024-38131,0,1,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000 -CVE-2024-38132,0,1,2a93ad01c2f6386608e424c1dfbafa21ec2ed5d60753f135cdd2c69c119de531,2024-08-16T15:33:07.097000 -CVE-2024-38133,0,1,5b117a31a499a24e7c20a3254e7045dc8befa477564278a1a29716f75bfec5a7,2024-08-16T15:25:05.590000 +CVE-2024-38130,0,0,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000 +CVE-2024-38131,0,0,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000 +CVE-2024-38132,0,0,2a93ad01c2f6386608e424c1dfbafa21ec2ed5d60753f135cdd2c69c119de531,2024-08-16T15:33:07.097000 +CVE-2024-38133,0,0,5b117a31a499a24e7c20a3254e7045dc8befa477564278a1a29716f75bfec5a7,2024-08-16T15:25:05.590000 CVE-2024-38134,0,0,b6bca1691f34ce239423b1778ddba4932cca47dfb244ff22d58ba4b41cb300da,2024-08-15T17:43:41.003000 CVE-2024-38135,0,0,98f14c37b10468e1351c51883d72765a25cb71664e0ecc84c4e130e6b7bd9ae5,2024-08-16T13:32:49.503000 -CVE-2024-38136,0,1,cfb5c77ae8e5a72e5b5f77bb0b7a3d12e21e298432360ac71bc0f1bdf1bb6039,2024-08-16T15:26:24.433000 -CVE-2024-38137,0,1,fab28c8133db0be5dde10db5a50f4bb03706666135c65b121b19727f3cc55898,2024-08-16T15:27:09.137000 +CVE-2024-38136,0,0,cfb5c77ae8e5a72e5b5f77bb0b7a3d12e21e298432360ac71bc0f1bdf1bb6039,2024-08-16T15:26:24.433000 +CVE-2024-38137,0,0,fab28c8133db0be5dde10db5a50f4bb03706666135c65b121b19727f3cc55898,2024-08-16T15:27:09.137000 CVE-2024-38138,0,0,abc0a81a70e51ce96788b041a13e6056800dddcef1d1b740392d66a01c072e6f,2024-08-14T02:07:05.410000 CVE-2024-3814,0,0,4b11a7d4126e6e627365a6c09d49c5b79c42112fff3bef28a2dbbe621feb8e3e,2024-07-26T13:36:51.523000 CVE-2024-38140,0,0,ee68c7b1f88cb35e19343ff179991211a8ff702f8244f123636f491f728a1f17,2024-08-14T02:07:05.410000 @@ -255216,7 +255216,7 @@ CVE-2024-38184,0,0,c835801cc9a652fb4d0e1f944198cfbcc8cd135504cb985a1202364a28f2d CVE-2024-38185,0,0,75ab73ca7d58e9b27e8fa6ff3eacfd93bb93d79005d1365847f0476f878e01f8,2024-08-14T02:07:05.410000 CVE-2024-38186,0,0,e48699951b83a13a8c545a7bb39dc766d490dd0a39c76d8a25aa85e46c5ed311,2024-08-14T02:07:05.410000 CVE-2024-38187,0,0,426ec9e92ff0a407b183738cdd31a21c97647274d94618ee0b6aa72a02fffbbf,2024-08-14T02:07:05.410000 -CVE-2024-38189,0,1,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000 +CVE-2024-38189,0,0,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000 CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000 CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000 CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000 @@ -256877,7 +256877,7 @@ CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fc CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000 CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000 CVE-2024-41262,0,0,48b0074f34ada1a302a3c7c2afcfaf4594d4fd732c8b7153c8377ab26e16ee3d,2024-08-01T16:35:11.627000 -CVE-2024-41264,0,1,332d92db5c905482198269e17be9fe322336114f0c994cd46df7b2596aa2cc30,2024-08-16T16:00:36.687000 +CVE-2024-41264,0,0,332d92db5c905482198269e17be9fe322336114f0c994cd46df7b2596aa2cc30,2024-08-16T16:00:36.687000 CVE-2024-41265,0,0,96664aad23c7dd63e002634cfc71189c6e2399a9d19b5373e19abde784e31cd7,2024-08-02T16:35:52.013000 CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000 CVE-2024-41270,0,0,af12a3d2be324bb3d9e2b16ff7d039367afc9e03066837308e275993680c0e05,2024-08-12T18:25:28.583000 @@ -257163,7 +257163,7 @@ CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385f CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000 CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000 CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000 -CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000 +CVE-2024-41962,0,1,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000 CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-41976,0,0,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000 @@ -257430,12 +257430,12 @@ CVE-2024-42458,0,0,5dc7de7c18fc9a4762e6600de6bc88b5c8771baaff2409a2a19314905b1c9 CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000 CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000 CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000 -CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449bf17,2024-08-07T19:35:13.447000 -CVE-2024-42462,1,1,bd842e4078213663fb9634d032edf846d5a7dcdcf5e81621d6a22c94c7d85215,2024-08-16T14:15:13.253000 -CVE-2024-42463,1,1,a938019478eeaf319f9b08147b37054c25ff2382e54c40bd90ca30afae7c0b7f,2024-08-16T14:15:13.650000 -CVE-2024-42464,1,1,3e63a708074ce366f3461fc42631850434e6ccbd81b25ac91329e1979960a870,2024-08-16T14:15:13.933000 -CVE-2024-42465,1,1,1c0b6edc320d8750d70e421efe32a64e97e1bb73fcf59fbb24c5bad282598f4e,2024-08-16T14:15:14.133000 -CVE-2024-42466,1,1,d86a0ebc4dcb18aca1621b0b7b556b13b3a067e20f4525c591e0df9bbf718bc2,2024-08-16T14:15:14.343000 +CVE-2024-42461,0,1,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000 +CVE-2024-42462,0,0,bd842e4078213663fb9634d032edf846d5a7dcdcf5e81621d6a22c94c7d85215,2024-08-16T14:15:13.253000 +CVE-2024-42463,0,0,a938019478eeaf319f9b08147b37054c25ff2382e54c40bd90ca30afae7c0b7f,2024-08-16T14:15:13.650000 +CVE-2024-42464,0,0,3e63a708074ce366f3461fc42631850434e6ccbd81b25ac91329e1979960a870,2024-08-16T14:15:13.933000 +CVE-2024-42465,0,0,1c0b6edc320d8750d70e421efe32a64e97e1bb73fcf59fbb24c5bad282598f4e,2024-08-16T14:15:14.133000 +CVE-2024-42466,0,0,d86a0ebc4dcb18aca1621b0b7b556b13b3a067e20f4525c591e0df9bbf718bc2,2024-08-16T14:15:14.343000 CVE-2024-42467,0,0,4d22b6210d07d5f3c254f02dd41ae3cecad0c4d515c80021ed5ec249d7082a04,2024-08-12T13:41:36.517000 CVE-2024-42468,0,0,76cb3122a8232cee530b0374441c48dedc4c3d24ff695d723500b8a92fe30bc6,2024-08-12T13:41:36.517000 CVE-2024-42469,0,0,b65049b5c4751d92c1e0b91c507812510fe11805ae8aa9f7a38c440861e678c6,2024-08-12T13:41:36.517000 @@ -257450,11 +257450,11 @@ CVE-2024-42477,0,0,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf3 CVE-2024-42478,0,0,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000 CVE-2024-42479,0,0,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000 CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34 -CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c017c,2024-08-12T18:57:29.247000 +CVE-2024-42480,0,1,a493fdcfd2cab0bed771f4294216832fdd84bd63bcd8976ed48629d61d56dc9b,2024-08-16T16:24:40.430000 CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000 CVE-2024-42482,0,0,b30158f5b674bded8c099de403a1859157e22ee6eae596b9cbf6c6cda1ffed96,2024-08-12T18:57:17.383000 CVE-2024-42485,0,0,fe887079979720fde6a2564dece883024602b52e3edd829141a610d95ce6aeb6,2024-08-12T18:57:17.383000 -CVE-2024-42486,1,1,0cf9b72eb06e426c9ae9c3be7c0a8751b5c461e1fe82a33b1cb1479b5f7e9ef5,2024-08-16T15:15:28.777000 +CVE-2024-42486,0,0,0cf9b72eb06e426c9ae9c3be7c0a8751b5c461e1fe82a33b1cb1479b5f7e9ef5,2024-08-16T15:15:28.777000 CVE-2024-42487,0,0,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000 CVE-2024-42488,0,0,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000 CVE-2024-42489,0,0,1203b17e47b8d78391ae8374fec72a221549be23a40702733d44133e504634fc,2024-08-12T18:57:17.383000 @@ -257488,6 +257488,7 @@ CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb4 CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000 CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000 CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000 +CVE-2024-42634,1,1,315cb6187375dc5de6e54eacb8a432704aa3e96d9692e54bbe2981f665b8fc7d,2024-08-16T16:15:06.670000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 @@ -257540,7 +257541,7 @@ CVE-2024-42942,0,0,22160e7a51aba7ec4c2a442eda5365016c21f50a3ce436f5593e17d4a4e43 CVE-2024-42943,0,0,89c464dfd8c5f51926e53bbc150c1d5fb409b705cb2bcd9dfb7d1af986ed8796,2024-08-15T19:32:41.770000 CVE-2024-42944,0,0,6a290ba62a9fff3904840cadfe2b37e39d360c8330bb30550edf0cc0dbc5dd2d,2024-08-15T19:35:13.737000 CVE-2024-42945,0,0,b51c554c7b4c6d19cac5e4b0d4a01832b1af734dc7e9521d8a5997f778081806,2024-08-15T18:35:13.343000 -CVE-2024-42946,0,0,93fe4893c0cedb4738a7e308b70ad69c3528d6545aadd1d60c711d4757ed44f7,2024-08-15T19:31:54.883000 +CVE-2024-42946,0,1,d0f7e8d7d1788119449618db3b1da4ffbfa720ab07647edae28d1ada00373d08,2024-08-16T17:35:08.227000 CVE-2024-42947,0,0,e7d01f7003d2f409e61d4e637f7500689fb65c07673a6b4b02e4e7886d96fafe,2024-08-16T13:32:05.103000 CVE-2024-42948,0,0,59733d9ea03ff832cdda58530fe7794aa6dde194a9927e51f986b168d6545b07,2024-08-15T19:31:38.217000 CVE-2024-42949,0,0,9d545118cba6649782b54ae27c38f1aa504bb881d29e0b9897d5de790ac29d20,2024-08-15T18:35:14.430000 @@ -257550,7 +257551,7 @@ CVE-2024-42951,0,0,85275541fa923c811c363f65806be15ab72ba82c78bd854fd99c466c7c580 CVE-2024-42952,0,0,b65ff3219b833a55817e0927e7de1af3e44121268840902e5ccda1d541c6cdf9,2024-08-15T19:30:38.387000 CVE-2024-42953,0,0,58c878dc5f5cca4ba3f36cfc4bba965c4a1c2ae0257b6ccf0d5ee87f2b28abe9,2024-08-15T18:35:15.460000 CVE-2024-42954,0,0,21936edb6d76a1dd8ac96611d3a88660fcfb4cf78730c9339bc7845c4b218f07,2024-08-15T18:35:16.510000 -CVE-2024-42955,0,0,9320f4344c94707c19eb1638f7623083e78d4d0cac1d427a8b445dec8cf0f81b,2024-08-15T19:29:55.033000 +CVE-2024-42955,0,1,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000 CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000 CVE-2024-42966,0,0,2183a7825b02d826715434a606b8e0e88607ae49ea211d2b913cb8ef25e10f0a,2024-08-16T13:35:28.477000 CVE-2024-42967,0,0,7e74ee4a2d6a17af6b0f12f00eb90c60c9c52c49e61e430789bbc0c38446386e,2024-08-16T13:34:29.780000 @@ -257559,27 +257560,29 @@ CVE-2024-42969,0,0,ceb7831a2a6e34194193b49c18930eef13b8b53d9526a7c509fe06bf6f41d CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828d7,2024-04-29T12:42:03.667000 CVE-2024-42973,0,0,d5485c43677896de6fa08dcef41d866080793d4ea6f42d62bb087be9a42b86ec,2024-08-15T18:35:18.647000 CVE-2024-42974,0,0,61d1e7965783de08549ceb87497ce958d38b08adcba4b51b3e7dd7cf76abda57,2024-08-15T18:35:19.710000 -CVE-2024-42976,0,0,fdeb1058f309a6b1c2e03e5041022acb93160f1fd65f5954096327060d87628a,2024-08-16T13:31:28.890000 +CVE-2024-42976,0,1,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000 CVE-2024-42977,0,0,feb7f28f54f84204165e37a00b44b1e384cb0d1f0ba15a6d5127e74a8ec2aae1,2024-08-16T13:31:11.107000 CVE-2024-42978,0,0,b1f4d5128465b01f205b47353b8c0b280ab205530bf41f8f4bc128c131592e31,2024-08-16T13:30:54.670000 CVE-2024-42979,0,0,fec579a62e68a4a25550b4929302262929d70ec750534fbc7a3c9c744abc20d4,2024-08-15T18:35:20.827000 CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000 CVE-2024-42980,0,0,aae73890d46507cd39a47700993c5d676f70df0e2e17eb3d4e6489411e40562b,2024-08-16T13:30:25.787000 CVE-2024-42981,0,0,305e4d194b20329fbf4e53ae71462711a1b6a79d86ab57d0c8e5b6861c13f109,2024-08-16T13:30:08.427000 -CVE-2024-42982,0,1,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613f62,2024-08-16T14:35:03.793000 +CVE-2024-42982,0,0,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613f62,2024-08-16T14:35:03.793000 CVE-2024-42983,0,0,2ff07324e83d99eb1dc609eafc4c3fb864fe9bede7cebb3f3a45d534c9241118,2024-08-15T18:35:21.960000 CVE-2024-42984,0,0,bab3f2f7207ff98837835928f6ef37efbc1f08e16988e1becb88b00c2369e868,2024-08-15T18:35:23.283000 -CVE-2024-42985,0,0,c7e7a8fb8466a6c9eed5915b1babd484e4e0a3d29e5fa5926690e0b009cd701f,2024-08-16T13:29:27.497000 +CVE-2024-42985,0,1,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000 CVE-2024-42986,0,0,729f44b69d8ed274bedf72a20b1cd0e83d0be1662a818f8ffd16806b1da8caa0,2024-08-16T13:26:43.100000 CVE-2024-42987,0,0,be14eefacd9f282e13e394cb1aeefe62ea3c84389f7783546c46d3192df9881f,2024-08-16T13:26:27.123000 CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000 +CVE-2024-42994,1,1,929e4934cc5ce20c828654d19893b5f26f36240698af23914c05b184721c7515,2024-08-16T17:15:15.153000 +CVE-2024-42995,1,1,0ea9659999eca75719977ad75316ad87471a8f88bfd82595d5287f10dccdda95,2024-08-16T17:15:15.273000 CVE-2024-4300,0,0,9683d559686bc261042c0ad86aeb3d06ca0ebb649bc8d0eaba9f4d32c108bd00,2024-04-29T12:42:03.667000 CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000 CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 -CVE-2024-43044,0,0,2dbbef33f99d7cbcabcc19e81e19ebf43163c5d81893c4595ee6a39205a72744,2024-08-07T15:17:46.717000 -CVE-2024-43045,0,0,6c09b38c22660d5e17b2c923e52895837b1f6e1429e2502f70318f1f62bcf3fa,2024-08-07T15:17:46.717000 +CVE-2024-43044,0,1,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 +CVE-2024-43045,0,1,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000 CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 @@ -257675,7 +257678,7 @@ CVE-2024-43370,0,0,59b87d7d60e811132be75fab5860fc7d531485b8890b7e3ad6ed1f41f6548 CVE-2024-43373,0,0,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000 CVE-2024-43374,0,0,7644def70e08cd7a711b128ad560c089ada83dcf140f909f0ac36102735face9,2024-08-16T02:15:17.687000 CVE-2024-43378,0,0,d0e1086da4bd21519e32eff9bfa155f1714d7bd494c9d21a9f49685aa5f864a3,2024-08-16T02:15:17.877000 -CVE-2024-43381,1,1,8ad255b17aef678316f5fdfb44e36b31d5b5d1db82172614569592481d1fec5a,2024-08-16T15:15:29 +CVE-2024-43381,0,0,8ad255b17aef678316f5fdfb44e36b31d5b5d1db82172614569592481d1fec5a,2024-08-16T15:15:29 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 @@ -257716,11 +257719,11 @@ CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000 CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 -CVE-2024-43807,1,1,611e8f9d418d5e15c9aad30fc27b0390a7fb66137bd3721a251de12fedfbc97f,2024-08-16T15:15:29.197000 -CVE-2024-43808,1,1,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13eba5,2024-08-16T15:15:29.417000 -CVE-2024-43809,1,1,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000 +CVE-2024-43807,0,0,611e8f9d418d5e15c9aad30fc27b0390a7fb66137bd3721a251de12fedfbc97f,2024-08-16T15:15:29.197000 +CVE-2024-43808,0,0,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13eba5,2024-08-16T15:15:29.417000 +CVE-2024-43809,0,0,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 -CVE-2024-43810,1,1,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000 +CVE-2024-43810,0,0,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000 CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000 CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000 CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000 @@ -258060,7 +258063,7 @@ CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da7348723 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000 CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000 -CVE-2024-4763,1,1,6636f17cd3a0c4133c37d5ed7e2fab0443c459d266364d8c96c024b20b18973f,2024-08-16T15:15:30.563000 +CVE-2024-4763,0,0,6636f17cd3a0c4133c37d5ed7e2fab0443c459d266364d8c96c024b20b18973f,2024-08-16T15:15:30.563000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 CVE-2024-4765,0,0,8a392c26e3db622097fdbc028abf6a874c53118cfa805a98650695a7c92a19e0,2024-05-14T19:17:55.627000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 @@ -258078,8 +258081,8 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 -CVE-2024-4781,1,1,b694f46118d4cccc5c5bcdb3d30f110d4d06f54bef2c3bd5967fb05b14fef8a8,2024-08-16T15:15:30.783000 -CVE-2024-4782,1,1,18e9f0fb9ad043cb162fddc8d4b5d979fca1582ad25f7d3183bf4fb975a4dc81,2024-08-16T15:15:30.967000 +CVE-2024-4781,0,0,b694f46118d4cccc5c5bcdb3d30f110d4d06f54bef2c3bd5967fb05b14fef8a8,2024-08-16T15:15:30.783000 +CVE-2024-4782,0,0,18e9f0fb9ad043cb162fddc8d4b5d979fca1582ad25f7d3183bf4fb975a4dc81,2024-08-16T15:15:30.967000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-4784,0,0,9aaebc683fa580787b3fd96a509a375fe0be341d6b1720ff572edca3637a16b2,2024-08-08T13:04:18.753000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 @@ -258440,8 +258443,8 @@ CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e38 CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca4436,2024-06-17T19:15:59.190000 CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000 CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000 -CVE-2024-5209,1,1,a68bca98dfe872b23aaa0a9014ede2a53549ec319bf752a6f798da9369698c69,2024-08-16T15:15:31.150000 -CVE-2024-5210,1,1,0c9453286818a64466348ad4ea2fe1c9bda56f0c4d89e3d6bd52256cf7397211,2024-08-16T15:15:31.337000 +CVE-2024-5209,0,0,a68bca98dfe872b23aaa0a9014ede2a53549ec319bf752a6f798da9369698c69,2024-08-16T15:15:31.150000 +CVE-2024-5210,0,0,0c9453286818a64466348ad4ea2fe1c9bda56f0c4d89e3d6bd52256cf7397211,2024-08-16T15:15:31.337000 CVE-2024-5211,0,0,98a88a37609463fc748729234fb7fa88ed6b19a9a862440dab2a89ae616c7fd0,2024-06-13T18:36:09.010000 CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000 CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000 @@ -258850,7 +258853,7 @@ CVE-2024-5687,0,0,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000 CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000 CVE-2024-5690,0,0,d97da1ed16aadcb18dbcdccf4095ed3e100e24ec0426a177c2c96faa76e14b0a,2024-08-09T13:43:37.807000 -CVE-2024-5691,0,1,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000 +CVE-2024-5691,0,0,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000 CVE-2024-5692,0,0,da86a3e71defc1a5762f0a215e21c8d6ad0bb48702dddd9796e84e537e21cbce,2024-08-01T13:59:56.967000 CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000 CVE-2024-5694,0,0,275b578189d93f8e1ff5fb24ee08b4deeac272512e00405f2d220d413d57023d,2024-06-11T13:54:12.057000 @@ -259057,7 +259060,7 @@ CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000 CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 CVE-2024-5975,0,0,fa255d4ef912d8f8da76e1022132a17caf8538a1c8cca7df81e3eaadac5c5086,2024-08-01T14:00:06.617000 -CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000 +CVE-2024-5976,0,1,77b9cc86c9238f37d2799be9bfcfd76dc8bf6ab8aad4ffdc48881bdede83c5f6,2024-08-16T17:53:25.450000 CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da75815823,2024-07-19T18:27:34.967000 CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000 @@ -259076,7 +259079,7 @@ CVE-2024-5996,0,0,ab938dbc15262bb65cf82c58e85d96d3d9a41bba3218e574f8e961fd3a4906 CVE-2024-5997,0,0,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000 CVE-2024-6000,0,0,4ab86aa4bce235d1120437fd5cb3b34fb6bdae181005ebaa070e8c0afe83cf87,2024-06-17T12:42:04.623000 CVE-2024-6003,0,0,14279c0384813c4cf50ab75a79953f2b0469d9bedd7f76c2b6cebfd90962fd14,2024-06-17T16:15:16.027000 -CVE-2024-6004,1,1,7ebd9046422c77bdfb40b7ec5eac36784e20ab47d0f1e37aeb7d86e4bdd1a2a4,2024-08-16T15:15:31.527000 +CVE-2024-6004,0,0,7ebd9046422c77bdfb40b7ec5eac36784e20ab47d0f1e37aeb7d86e4bdd1a2a4,2024-08-16T15:15:31.527000 CVE-2024-6005,0,0,4d74c6c4a521a164f63a9fe529c141dc8da0592a0575e27e0e62d822beb9b877,2024-06-17T12:42:04.623000 CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d5f,2024-06-17T15:15:52.693000 CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000 @@ -259149,7 +259152,7 @@ CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7e CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000 CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000 -CVE-2024-6098,1,1,932d25e2016531c902cfc4db6b2a32ff7be61dd1665ae909731e83ee7ccd342c,2024-08-16T15:15:31.737000 +CVE-2024-6098,0,0,932d25e2016531c902cfc4db6b2a32ff7be61dd1665ae909731e83ee7ccd342c,2024-08-16T15:15:31.737000 CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000 CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000 CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000 @@ -259180,7 +259183,7 @@ CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000 CVE-2024-6133,0,0,2337ffd9cad2357491c8f783d0b691c0b27d4405be8ab2d34dc8ce60f34a6000,2024-08-13T01:18:26.570000 -CVE-2024-6134,0,0,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000 +CVE-2024-6134,0,1,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000 CVE-2024-6136,0,0,b5f2fd8869742060eab1f7acc4116cefd24c0a3b003f1c5a14cb58f5ac02f037,2024-08-13T01:18:26.820000 CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000 CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000 @@ -259264,7 +259267,7 @@ CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3 CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000 CVE-2024-6237,0,0,8762afad911d25272cef1e25e793265b79c2ac5f7d12b159ff8ab393df4b7ad2,2024-08-12T13:38:38.977000 CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ffd0,2024-06-25T18:50:42.040000 -CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000 +CVE-2024-6239,0,1,f9926b0cd048febae2346520b44e3c86bff18a382e32c768152365d4c8d177e9,2024-08-16T16:15:06.760000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 @@ -259349,7 +259352,7 @@ CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdca CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 -CVE-2024-6347,0,1,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000 +CVE-2024-6347,0,0,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 @@ -259375,7 +259378,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 -CVE-2024-6384,0,1,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000 +CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 @@ -259746,7 +259749,7 @@ CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03 CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000 CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000 CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000 -CVE-2024-6990,0,1,0326ecf1bc9a8efec80f09c5dfd50b62c0d815fc632f7f111159a058f9ccd9e8,2024-08-16T15:21:14.383000 +CVE-2024-6990,0,0,0326ecf1bc9a8efec80f09c5dfd50b62c0d815fc632f7f111159a058f9ccd9e8,2024-08-16T15:21:14.383000 CVE-2024-6991,0,0,d11c88ce8a351ab3495759c45368576c695eaeac0cf5e78c45b41aed7a267a71,2024-08-07T22:09:36.353000 CVE-2024-6994,0,0,9960b5d210859f33c1958dbd6accb9b3cfa02ad5092a4aa4cfe1209e8d35090e,2024-08-07T22:10:04.740000 CVE-2024-6995,0,0,9e1a01449fcee7bd95abf904254e638fb274f5eefbc5fb1951ae014eb09df4e6,2024-08-07T20:35:26.507000 @@ -259809,8 +259812,8 @@ CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583 CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000 CVE-2024-7136,0,0,800009dc095d757e18cd07243220b156b5e1378ab0cdc8e3a6c11dcf096f0c2b,2024-08-16T11:15:04.027000 CVE-2024-7143,0,0,444409226f2889debaa1b6cea63b846cc438f1a41258f2e601b106b9c83baf18,2024-08-07T19:09:46.290000 -CVE-2024-7144,1,1,956345c30ac91703cc6247a06908da0b5850fed46bf6b704798f3fbd677362a9,2024-08-16T14:15:14.690000 -CVE-2024-7145,1,1,8008e4f01c2164733d1a7678bcf08be4de0dc8b1ace04bc419ca0832fa2e5456,2024-08-16T14:15:15.187000 +CVE-2024-7144,0,0,956345c30ac91703cc6247a06908da0b5850fed46bf6b704798f3fbd677362a9,2024-08-16T14:15:14.690000 +CVE-2024-7145,0,0,8008e4f01c2164733d1a7678bcf08be4de0dc8b1ace04bc419ca0832fa2e5456,2024-08-16T14:15:15.187000 CVE-2024-7146,0,0,1125a4692c6fb48bbab5140d3c4102c44a646d58d32c16ab6b96c4c0e4b7524f,2024-08-16T11:15:04.230000 CVE-2024-7147,0,0,25a2551577bf2ff9e0ee13fa7c6e048a893e4216beb8bb4e8ed94704fa47c0a8,2024-08-16T11:15:04.423000 CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000 @@ -259893,11 +259896,11 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8 CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000 CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000 CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000 -CVE-2024-7255,0,1,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000 +CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 -CVE-2024-7262,0,1,f691c718a5a63454dd0ad05ebe1b7dabdfe7c97003cd8aba2b437046cee7544f,2024-08-16T14:25:42.820000 -CVE-2024-7263,0,1,aad826c9d28e2bc52cb4f35b11d432222b44358d7b79f7294e5895302e02069b,2024-08-16T14:25:46.027000 +CVE-2024-7262,0,0,f691c718a5a63454dd0ad05ebe1b7dabdfe7c97003cd8aba2b437046cee7544f,2024-08-16T14:25:42.820000 +CVE-2024-7263,0,0,aad826c9d28e2bc52cb4f35b11d432222b44358d7b79f7294e5895302e02069b,2024-08-16T14:25:46.027000 CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000 CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000 CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000