Auto-Update: 2024-08-30T18:00:17.981062+00:00

This commit is contained in:
cad-safe-bot 2024-08-30 18:03:14 +00:00
parent a6ca0c6ca1
commit 2e9461ca51
70 changed files with 4343 additions and 395 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2022-1509",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-28T10:15:07.870",
"lastModified": "2024-02-14T20:40:46.587",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:08.003",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context."
"value": "Command Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context."
},
{
"lang": "es",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -88,7 +86,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
@ -98,12 +96,12 @@
]
},
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-77"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24379",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:10.620",
"lastModified": "2023-11-20T20:53:52.603",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:35:00.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38786",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:12.607",
"lastModified": "2023-11-25T02:26:54.603",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:35:01.737",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-284"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32662",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:26.987",
"lastModified": "2023-11-21T19:41:02.917",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:35:05.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-285"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34431",
"sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:28.417",
"lastModified": "2023-11-20T20:55:51.143",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T17:35:02.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20932",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-01-16T22:15:40.763",
"lastModified": "2024-02-14T20:46:22.083",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:35:09.817",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20952",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-01-16T22:15:42.477",
"lastModified": "2024-02-15T03:18:31.140",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:35:10.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,20 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22593",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T15:15:09.853",
"lastModified": "2024-01-20T18:49:24.957",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:35:11.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36448",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-05T10:15:32.913",
"lastModified": "2024-08-05T17:15:41.557",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T16:39:20.220",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "security@apache.org",
@ -22,7 +22,30 @@
"value": "** NO COMPATIBLE CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de Server-Side Request Forgery (SSRF) en Apache IoTDB Workbench. Este problema afecta a Apache IoTDB Workbench: desde 0.13.0. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -35,10 +58,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:iotdb_workbench:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.13.0",
"matchCriteriaId": "0DD114A8-8EB5-4C20-9D6D-7708B4A34E4B"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/d19p0vsm7nogp43q9m3tzm5jl6mzjj1x",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37079",
"sourceIdentifier": "security@vmware.com",
"published": "2024-06-18T06:15:11.350",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:33:59.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -39,10 +59,502 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndExcluding": "5.2",
"matchCriteriaId": "7FA8DFE6-9C74-4711-A8AF-3B170876A1F9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37080",
"sourceIdentifier": "security@vmware.com",
"published": "2024-06-18T06:15:11.640",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:35:29.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -39,10 +59,502 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndExcluding": "5.2",
"matchCriteriaId": "7FA8DFE6-9C74-4711-A8AF-3B170876A1F9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37954",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-20T09:15:08.557",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:46:38.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marcelotorres:simple_responsive_slider:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.2.2.5",
"matchCriteriaId": "0AB2C9BF-C390-4F60-9156-7FCEF19FA097"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-responsive-slider/wordpress-simple-responsive-slider-plugin-0-2-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37955",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-20T09:15:08.917",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T17:42:28.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:makegutenblock:gutslider:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.7.3",
"matchCriteriaId": "3DCFB1E0-17FE-44D9-999C-4301BDC170E7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/slider-blocks/wordpress-gutslider-all-in-one-block-slider-plugin-2-7-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37956",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-20T09:15:09.247",
"lastModified": "2024-08-01T13:15:10.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T17:48:10.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vektor-inc:vk_all_in_one_expansion_unit:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.99.2.0",
"matchCriteriaId": "68657A8B-215C-4BCE-8498-77861BBCA29E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/vk-all-in-one-expansion-unit/wordpress-vk-all-in-one-expansion-unit-plugin-9-97-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37957",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-20T09:15:09.550",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T17:56:23.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bradmax:bradmax_player:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.28",
"matchCriteriaId": "85460518-6D82-4A31-94B8-09D1B1556C0A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bradmax-player/wordpress-bradmax-player-plugin-1-1-27-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38795",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:26.460",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:31:03.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cridio:listingpro:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.9.4",
"matchCriteriaId": "F80EEF03-E851-4B54-A0AA-BF53B89513DA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/listingpro-plugin/wordpress-listingpro-plugin-2-9-3-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39620",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:26.710",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:30:39.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cridio:listingpro:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.9.4",
"matchCriteriaId": "F80EEF03-E851-4B54-A0AA-BF53B89513DA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/listingpro-plugin/wordpress-listingpro-plugin-2-9-3-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39622",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:26.900",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:30:11.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cridio:listingpro:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.9.4",
"matchCriteriaId": "F80EEF03-E851-4B54-A0AA-BF53B89513DA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/listingpro/wordpress-listingpro-theme-2-9-3-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39838",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-05T05:15:39.563",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T17:49:03.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,86 @@
"value": "Las versiones de firmware ZWX-2000CSW2-HN anteriores a la versi\u00f3n 0.3.15 utilizan credenciales codificadas, lo que puede permitir que un atacante adyacente a la red con privilegios administrativos altere la configuraci\u00f3n del dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zexelon:zwx-2000csw2-hn_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.15",
"matchCriteriaId": "C9F38FB9-D0CB-48E9-B09A-DF962CA0B0B6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zexelon:zwx-2000csw2-hn:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2349E09-CC89-41F6-AA4A-14B96D10EED8"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN70666401/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zexelon.co.jp/pdf/jvn70666401.pdf",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3980",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.210",
"lastModified": "2024-08-28T16:32:20.957",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:09.517",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-88"
"value": "CWE-22"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40096",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T10:15:33.197",
"lastModified": "2024-08-22T20:15:09.340",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T16:14:41.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "La aplicaci\u00f3n com.cascadialabs.who (tambi\u00e9n conocida como Who - Caller ID, Spam Block) 15.0 para Android coloca informaci\u00f3n confidencial en el registro del sistema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rd_labs_llc:who:15.0:*:*:*:*:android:*:*",
"matchCriteriaId": "00C6DD6F-64DC-4778-B3BF-A927014777CB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.quokka.io/blog/critical-pii-exposure-in-who-caller-id-spam-block-app",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.quokka.io/critical-vulnerabilities-exploits-cve",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41236",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.497",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:02:49.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02775C53-3AA5-4707-A166-D1FE5B1288EF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Admin.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41720",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-05T05:15:39.637",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T17:49:42.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,86 @@
"value": "Existe una asignaci\u00f3n de permisos incorrecta para problemas de recursos cr\u00edticos en versiones de firmware ZWX-2000CSW2-HN anteriores a la versi\u00f3n 0.3.15, lo que puede permitir que un atacante autenticado adyacente a la red altere la configuraci\u00f3n del dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zexelon:zwx-2000csw2-hn_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.15",
"matchCriteriaId": "C9F38FB9-D0CB-48E9-B09A-DF962CA0B0B6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zexelon:zwx-2000csw2-hn:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2349E09-CC89-41F6-AA4A-14B96D10EED8"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN70666401/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zexelon.co.jp/pdf/jvn70666401.pdf",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41889",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-05T05:15:39.697",
"lastModified": "2024-08-07T19:35:11.473",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T17:53:40.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,50 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimax:pitool:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA58FE7-BB18-4C77-82CE-944A16269EA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimax:play:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.21.01",
"matchCriteriaId": "27FB753D-1D9B-4AE3-95F0-C4156E3B5E45"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenMAR/PiTool",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN50850706/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://pimax.com/pages/downloads-manuals",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41918",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-29T03:15:05.130",
"lastModified": "2024-08-30T00:15:05.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:05:23.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rakuten:ichiba:*:*:*:*:*:iphone_os:*:*",
"versionEndIncluding": "11.7.0",
"matchCriteriaId": "D92566A8-E03C-4080-B048-5CAFA963BC44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rakuten:ichiba:*:*:*:*:*:android:*:*",
"versionEndIncluding": "12.4.0",
"matchCriteriaId": "F2D7973E-FC17-438D-B4F4-80D03D922CF4"
}
]
}
]
}
],
"references": [
{
"url": "https://apps.apple.com/jp/app/id419267350",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN56648919/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://play.google.com/store/apps/details?id=jp.co.rakuten.android&hl=en",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-4146",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-08T20:15:52.117",
"lastModified": "2024-07-19T19:03:00.867",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:09.813",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In lunary-ai/lunary version v1.2.13, an improper authorization vulnerability exists that allows unauthorized users to access and manipulate projects within an organization they should not have access to. Specifically, the vulnerability is located in the `checkProjectAccess` method within the authorization middleware, which fails to adequately verify if a user has the correct permissions to access a specific project. Instead, it only checks if the user is part of the organization owning the project, overlooking the necessary check against the `account_project` table for explicit project access rights. This flaw enables attackers to gain complete control over all resources within a project, including the ability to create, update, read, and delete any resource, compromising the privacy and security of sensitive information."
"value": "In lunary-ai/lunary version v1.2.13, an incorrect authorization vulnerability exists that allows unauthorized users to access and manipulate projects within an organization they should not have access to. Specifically, the vulnerability is located in the `checkProjectAccess` method within the authorization middleware, which fails to adequately verify if a user has the correct permissions to access a specific project. Instead, it only checks if the user is part of the organization owning the project, overlooking the necessary check against the `account_project` table for explicit project access rights. This flaw enables attackers to gain complete control over all resources within a project, including the ability to create, update, read, and delete any resource, compromising the privacy and security of sensitive information."
},
{
"lang": "es",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -78,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "CWE-863"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42447",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-05T08:15:56.397",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T17:35:29.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de expiraci\u00f3n de sesi\u00f3n insuficiente en Apache Airflow Providers FAB. Este problema afecta a Apache Airflow Providers FAB: 1.2.1 (cuando se utiliza con Apache Airflow 2.9.3) y FAB 1.2.0 para todas las versiones de Airflow. El proveedor FAB imped\u00eda que el usuario cerrara sesi\u00f3n. * El proveedor FAB 1.2.1 solo afectaba a Airflow 2.9.3 (las versiones anteriores y posteriores de Airflow no se ven afectadas) * El proveedor FAB 1.2.0 afect\u00f3 a todas las versiones de Airflow. Se recomienda a los usuarios que ejecutan Apache Airflow 2.9.3 que actualicen a Apache Airflow Providers FAB versi\u00f3n 1.2.2, que soluciona el problema. Se recomienda a los usuarios que ejecutan cualquier versi\u00f3n de Apache Airflow y tienen el proveedor FAB 1.2.0 que actualicen a Apache Airflow Providers FAB versi\u00f3n 1.2.2, que soluciona el problema. Tambi\u00e9n se recomienda actualizar Apache Airflow a la \u00faltima versi\u00f3n disponible. Nota: Las versiones anteriores de las im\u00e1genes de contenedor de referencia de Airflow 2.9.3 y los archivos de restricciones conten\u00edan la versi\u00f3n 1.2.1 del proveedor FAB, pero esto se solucion\u00f3 en las versiones actualizadas de las im\u00e1genes. Se recomienda a los usuarios que obtengan las im\u00e1genes m\u00e1s recientes de Airflow o que reinstalen el proveedor FAB seg\u00fan las restricciones actuales."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -28,14 +51,78 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:apache-airflow-providers-fab:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "323D66FA-F34A-45A9-AE18-CBC2C11F4506"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:apache:airflow:2.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72D10390-BAB9-4295-A395-BB062FCF5EF3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:apache-airflow-providers-fab:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B301FD-5C54-4477-93B6-3FA1816906B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:apache:airflow:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3175F2AE-AD9F-4D30-A411-5989E0445678"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/40784",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread/2zoo8cjlwfjhbfdxfgltcm0hnc0qmc52",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43939",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:29.633",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:29:15.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zynith:zynith:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "7.4.9",
"matchCriteriaId": "B984FCA7-FAA9-48EF-8E17-3B89C289FF89"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/zynith-seo/wordpress-z-y-n-i-t-h-plugin-7-4-9-unauthenticated-arbitrary-option-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43940",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:29.833",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:27:22.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zynith:zynith:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "7.4.9",
"matchCriteriaId": "B984FCA7-FAA9-48EF-8E17-3B89C289FF89"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/zynith-seo/wordpress-z-y-n-i-t-h-plugin-7-4-9-unauthenticated-plugin-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43950",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:11.770",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:20:26.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextbricks:bricksore:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.2.5",
"matchCriteriaId": "B9F23DAA-1E88-4C4A-8214-2B47567FF443"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/brickscore/wordpress-brickscore-plugin-1-4-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43951",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:12.060",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:17:20.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cryoutcreations:tempera:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.8.2",
"matchCriteriaId": "C9837CE4-4C4C-4FCF-AA24-A8ABF117EB7E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tempera/wordpress-tempera-theme-1-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43952",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:12.330",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:16:50.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cryoutcreations:esotera:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.5.1",
"matchCriteriaId": "D6602C38-504C-4539-AD0E-0E678C4ADFC1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/esotera/wordpress-esotera-theme-1-2-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43953",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:12.593",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:16:01.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpbakery:page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.0",
"matchCriteriaId": "BD7AFAD4-3BA4-4F05-88A4-990DDE17077B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/classic-addons-wpbakery-page-builder-addons/wordpress-classic-addons-wpbakery-page-builder-plugin-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43954",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.383",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:24:37.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeum:droip:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.1",
"matchCriteriaId": "D152E6F5-5E39-439D-B281-05F7B0E9999F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-subscriber-settings-change-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43955",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T16:15:09.570",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:23:35.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeum:droip:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.1",
"matchCriteriaId": "D152E6F5-5E39-439D-B281-05F7B0E9999F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/droip/wordpress-droip-plugin-1-1-1-unauthenticated-arbitrary-file-download-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43958",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:12.870",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:15:19.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gianniporto:intothedark:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.5",
"matchCriteriaId": "847FFF57-2609-4DBF-A1CB-8827AE1F5DD1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/intothedark/wordpress-into-the-dark-theme-1-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43960",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:13.133",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:12:24.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagebuilderaddons:web_and_woocommerce_addons_for_wpbakery_builder:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.6",
"matchCriteriaId": "4D7C7C67-C5B3-4299-A31D-6FE909EE80C3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/vc-addons-by-bit14/wordpress-web-and-woocommerce-addons-for-wpbakery-builder-plugin-1-4-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43963",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T18:15:13.673",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:10:16.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:waspthemes:yellowpencil:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.6.4",
"matchCriteriaId": "0496242E-0F2A-4759-95AF-9D99666881F1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yellow-pencil-visual-theme-customizer/wordpress-visual-css-style-editor-plugin-7-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44070",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-19T02:15:04.643",
"lastModified": "2024-08-21T14:35:15.433",
"vulnStatus": "Modified",
"lastModified": "2024-08-30T16:19:49.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
@ -87,6 +87,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44761",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T19:15:08.933",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:00:30.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gzequan:eq_enterprise_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.0",
"matchCriteriaId": "44CAF733-AA45-4AE2-8556-5C74A404030B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44913",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.707",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:01:54.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:irfanview:irfanview:4.67.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60281F4F-4DF5-4AAF-95E3-1129742AD5F2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yuhano/irfanview_Poc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44914",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.780",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:01:45.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:irfanview:irfanview:4.67.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60281F4F-4DF5-4AAF-95E3-1129742AD5F2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yuhano/irfanview_Poc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44915",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.863",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:01:10.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:irfanview:irfanview:4.67.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60281F4F-4DF5-4AAF-95E3-1129742AD5F2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yuhano/irfanview_Poc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-44916",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-30T16:15:09.623",
"lastModified": "2024-08-30T17:35:03.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in admin_ip.php in Seacms v13.1, when action=set, allows attackers to control IP parameters that are written to the data/admin/ip.php file and could result in arbitrary command execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "http://seacms.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44916.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/seacms-net",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44918",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-30T17:15:15.290",
"lastModified": "2024-08-30T17:15:15.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component admin_datarelate.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44918.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44919",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T17:15:08.670",
"lastModified": "2024-08-30T13:00:05.390",
"lastModified": "2024-08-30T16:15:09.720",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md",
"source": "cve@mitre.org"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45047",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-30T17:15:15.377",
"lastModified": "2024-08-30T17:15:15.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "svelte performance oriented web framework. A potential mXSS vulnerability exists in Svelte for versions up to but not including 4.2.19. Svelte improperly escapes HTML on server-side rendering. The assumption is that attributes will always stay as such, but in some situation the final DOM tree rendered on browsers is different from what Svelte expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). More specifically, this can occur when injecting malicious content into an attribute within a `noscript` tag. This issue has been addressed in release version 4.2.19. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/sveltejs/svelte/security/advisories/GHSA-8266-84wp-wv5c",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45232",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T00:15:09.177",
"lastModified": "2024-08-29T20:36:58.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:34:39.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "B62C9C43-F43A-465C-B046-0CC44487DF0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.5.0",
"matchCriteriaId": "7A816901-4C68-42FF-9096-204E2046A757"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "10.9.0",
"matchCriteriaId": "E21ABE99-FEC7-4155-BEB5-C76B842C492B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.4.0",
"matchCriteriaId": "03F37EE5-5FCA-49B7-8D09-C397236264AD"
}
]
}
]
}
],
"references": [
{
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-006",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45233",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T00:15:09.293",
"lastModified": "2024-08-29T20:36:59.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:33:56.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "B62C9C43-F43A-465C-B046-0CC44487DF0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.5.0",
"matchCriteriaId": "7A816901-4C68-42FF-9096-204E2046A757"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "10.9.0",
"matchCriteriaId": "E21ABE99-FEC7-4155-BEB5-C76B842C492B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.4.0",
"matchCriteriaId": "03F37EE5-5FCA-49B7-8D09-C397236264AD"
}
]
}
]
}
],
"references": [
{
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-006",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45435",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T03:15:05.357",
"lastModified": "2024-08-29T20:37:00.450",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:05:58.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chartist:chartist:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "E2F37E0B-37E0-4CE1-B68D-BA6DA7DFFB8A"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/tariqhawis/c67177164d3b7975210caddb25b60d62",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/chartist-js/chartist/issues/1427",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45436",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T03:15:05.460",
"lastModified": "2024-08-29T20:37:01.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:08:54.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.1.47",
"matchCriteriaId": "27B94204-E8CA-466C-88A1-4AF243FDA36A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ollama/ollama/compare/v0.1.46...v0.1.47",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ollama/ollama/pull/5314",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4872",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.890",
"lastModified": "2024-08-28T16:25:02.097",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:10.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,16 +69,6 @@
"value": "CWE-89"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6117",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-08-05T05:15:39.760",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T17:41:50.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hamastar:meetinghub_paperless_meetings:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "20415191-3043-4513-9DB2-688942E3AA1C"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-02",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6118",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-08-05T05:15:39.920",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-30T17:44:20.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "ART@zuso.ai",
"type": "Secondary",
@ -73,10 +105,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hamastar:meetinghub_paperless_meetings:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "20415191-3043-4513-9DB2-688942E3AA1C"
}
]
}
]
}
],
"references": [
{
"url": "https://zuso.ai/advisory/za-2024-03",
"source": "ART@zuso.ai"
"source": "ART@zuso.ai",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6204",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-08-30T17:15:15.610",
"lastModified": "2024-08-30T17:15:15.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine Exchange Reporter Plus versions before\u00a05715 are vulnerable to\u00a0SQL Injection in the reports module."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/exchange-reports/advisory/CVE-2024-6204.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-6227",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-08T19:15:10.673",
"lastModified": "2024-08-07T12:26:17.497",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:10.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to cause a denial of service by configuring the remote tracking server to point at itself. This results in the server endlessly connecting to itself, rendering it unable to respond to other connections."
"value": "A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to cause an infinite loop by configuring the remote tracking server to point at itself. This results in the server endlessly connecting to itself, rendering it unable to respond to other connections."
},
{
"lang": "es",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -63,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
@ -73,12 +71,12 @@
]
},
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-835"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6255",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-31T01:15:09.847",
"lastModified": "2024-08-27T13:30:55.460",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:10.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,15 +36,13 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV30": [
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -63,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
@ -73,12 +71,12 @@
]
},
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
"value": "CWE-22"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6331",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-08-04T00:15:47.863",
"lastModified": "2024-08-20T19:55:35.153",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-30T16:15:10.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,15 +36,13 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -63,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
@ -73,12 +71,12 @@
]
},
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-74"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-7051",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-08-30T16:15:10.960",
"lastModified": "2024-08-30T16:15:10.960",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-7712",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-08-30T16:15:11.050",
"lastModified": "2024-08-30T16:15:11.050",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-8064",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-08-30T16:15:11.120",
"lastModified": "2024-08-30T16:15:11.120",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8194",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-28T23:15:06.160",
"lastModified": "2024-08-29T20:37:10.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:34:53.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
@ -61,14 +91,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "128.0.6613.113",
"matchCriteriaId": "011E99EA-D99F-4382-8AA1-C1E58952549A"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/360533914",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8235",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-30T17:15:15.783",
"lastModified": "2024-08-30T17:15:15.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-8235",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308680",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8250",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-08-29T00:15:09.370",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-30T16:32:16.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -51,14 +81,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.0.17",
"matchCriteriaId": "F37A16F6-57A7-4EC6-8E17-524FB330505D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "5763B5AD-7F9C-4239-95CF-B46F245E9924"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19943",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2024-11.html",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8342",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-30T16:15:12.537",
"lastModified": "2024-08-30T16:15:12.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Petshop Management System 1.0. This issue affects some unknown processing of the file /controllers/add_client.php. The manipulation of the argument image_profile leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Petshop_Management_System/Petshop_Management_System%20add_client.php%20any%20file%20upload.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276221",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276221",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.399662",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8343",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-30T16:15:13.037",
"lastModified": "2024-08-30T16:15:13.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Sentiment Based Movie Rating System 1.0. Affected is an unknown function of the file /classes/Users.php?f=save_client of the component User Registration Handler. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-SQLi-Sentiment-Based-Moive-Rating.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276222",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276222",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.399711",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8344",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-30T17:15:16.510",
"lastModified": "2024-08-30T17:15:16.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Campcodes Supplier Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_area.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yooo0oo0/cve_report/blob/main/supplier-management-system/SQLi-2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276223",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276223",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.400185",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8345",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-30T17:15:16.937",
"lastModified": "2024-08-30T17:15:16.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Music Gallery Site 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/GAO-UNO/cve/blob/main/sql3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276224",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276224",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.400192",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-30T16:00:18.181842+00:00
2024-08-30T18:00:17.981062+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-30T15:59:08.873000+00:00
2024-08-30T17:56:23.977000+00:00
```
### Last Data Feed Release
@ -33,50 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261585
261597
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `12`
- [CVE-2024-8336](CVE-2024/CVE-2024-83xx/CVE-2024-8336.json) (`2024-08-30T14:15:17.840`)
- [CVE-2024-8337](CVE-2024/CVE-2024-83xx/CVE-2024-8337.json) (`2024-08-30T14:15:18.297`)
- [CVE-2024-8338](CVE-2024/CVE-2024-83xx/CVE-2024-8338.json) (`2024-08-30T15:15:19.973`)
- [CVE-2024-8339](CVE-2024/CVE-2024-83xx/CVE-2024-8339.json) (`2024-08-30T15:15:20.453`)
- [CVE-2024-8340](CVE-2024/CVE-2024-83xx/CVE-2024-8340.json) (`2024-08-30T15:15:20.903`)
- [CVE-2024-8341](CVE-2024/CVE-2024-83xx/CVE-2024-8341.json) (`2024-08-30T15:15:21.340`)
- [CVE-2024-44916](CVE-2024/CVE-2024-449xx/CVE-2024-44916.json) (`2024-08-30T16:15:09.623`)
- [CVE-2024-44918](CVE-2024/CVE-2024-449xx/CVE-2024-44918.json) (`2024-08-30T17:15:15.290`)
- [CVE-2024-45047](CVE-2024/CVE-2024-450xx/CVE-2024-45047.json) (`2024-08-30T17:15:15.377`)
- [CVE-2024-6204](CVE-2024/CVE-2024-62xx/CVE-2024-6204.json) (`2024-08-30T17:15:15.610`)
- [CVE-2024-7051](CVE-2024/CVE-2024-70xx/CVE-2024-7051.json) (`2024-08-30T16:15:10.960`)
- [CVE-2024-7712](CVE-2024/CVE-2024-77xx/CVE-2024-7712.json) (`2024-08-30T16:15:11.050`)
- [CVE-2024-8064](CVE-2024/CVE-2024-80xx/CVE-2024-8064.json) (`2024-08-30T16:15:11.120`)
- [CVE-2024-8235](CVE-2024/CVE-2024-82xx/CVE-2024-8235.json) (`2024-08-30T17:15:15.783`)
- [CVE-2024-8342](CVE-2024/CVE-2024-83xx/CVE-2024-8342.json) (`2024-08-30T16:15:12.537`)
- [CVE-2024-8343](CVE-2024/CVE-2024-83xx/CVE-2024-8343.json) (`2024-08-30T16:15:13.037`)
- [CVE-2024-8344](CVE-2024/CVE-2024-83xx/CVE-2024-8344.json) (`2024-08-30T17:15:16.510`)
- [CVE-2024-8345](CVE-2024/CVE-2024-83xx/CVE-2024-8345.json) (`2024-08-30T17:15:16.937`)
### CVEs modified in the last Commit
Recently modified CVEs: `70`
Recently modified CVEs: `56`
- [CVE-2024-44340](CVE-2024/CVE-2024-443xx/CVE-2024-44340.json) (`2024-08-30T14:56:38.207`)
- [CVE-2024-44341](CVE-2024/CVE-2024-443xx/CVE-2024-44341.json) (`2024-08-30T14:57:07.260`)
- [CVE-2024-44342](CVE-2024/CVE-2024-443xx/CVE-2024-44342.json) (`2024-08-30T14:57:40.020`)
- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-08-30T15:55:41.137`)
- [CVE-2024-45264](CVE-2024/CVE-2024-452xx/CVE-2024-45264.json) (`2024-08-30T15:02:34.610`)
- [CVE-2024-45491](CVE-2024/CVE-2024-454xx/CVE-2024-45491.json) (`2024-08-30T14:35:09.057`)
- [CVE-2024-45492](CVE-2024/CVE-2024-454xx/CVE-2024-45492.json) (`2024-08-30T14:35:09.790`)
- [CVE-2024-5469](CVE-2024/CVE-2024-54xx/CVE-2024-5469.json) (`2024-08-30T14:15:16.703`)
- [CVE-2024-5651](CVE-2024/CVE-2024-56xx/CVE-2024-5651.json) (`2024-08-30T14:15:16.820`)
- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-08-30T14:15:16.947`)
- [CVE-2024-6595](CVE-2024/CVE-2024-65xx/CVE-2024-6595.json) (`2024-08-30T14:15:17.063`)
- [CVE-2024-6632](CVE-2024/CVE-2024-66xx/CVE-2024-6632.json) (`2024-08-30T14:07:18.443`)
- [CVE-2024-6633](CVE-2024/CVE-2024-66xx/CVE-2024-6633.json) (`2024-08-30T14:11:45.287`)
- [CVE-2024-6783](CVE-2024/CVE-2024-67xx/CVE-2024-6783.json) (`2024-08-30T15:15:18.623`)
- [CVE-2024-7606](CVE-2024/CVE-2024-76xx/CVE-2024-7606.json) (`2024-08-30T15:43:41.773`)
- [CVE-2024-7607](CVE-2024/CVE-2024-76xx/CVE-2024-7607.json) (`2024-08-30T15:41:02.407`)
- [CVE-2024-8193](CVE-2024/CVE-2024-81xx/CVE-2024-8193.json) (`2024-08-30T15:52:33.747`)
- [CVE-2024-8198](CVE-2024/CVE-2024-81xx/CVE-2024-8198.json) (`2024-08-30T15:52:02.687`)
- [CVE-2024-8199](CVE-2024/CVE-2024-81xx/CVE-2024-8199.json) (`2024-08-30T15:04:28.803`)
- [CVE-2024-8200](CVE-2024/CVE-2024-82xx/CVE-2024-8200.json) (`2024-08-30T15:08:24.643`)
- [CVE-2024-8294](CVE-2024/CVE-2024-82xx/CVE-2024-8294.json) (`2024-08-30T15:38:13.437`)
- [CVE-2024-8295](CVE-2024/CVE-2024-82xx/CVE-2024-8295.json) (`2024-08-30T15:37:41.510`)
- [CVE-2024-8296](CVE-2024/CVE-2024-82xx/CVE-2024-8296.json) (`2024-08-30T15:36:36.383`)
- [CVE-2024-8297](CVE-2024/CVE-2024-82xx/CVE-2024-8297.json) (`2024-08-30T15:28:50.863`)
- [CVE-2024-8301](CVE-2024/CVE-2024-83xx/CVE-2024-8301.json) (`2024-08-30T15:24:09.830`)
- [CVE-2024-43952](CVE-2024/CVE-2024-439xx/CVE-2024-43952.json) (`2024-08-30T16:16:50.360`)
- [CVE-2024-43953](CVE-2024/CVE-2024-439xx/CVE-2024-43953.json) (`2024-08-30T16:16:01.360`)
- [CVE-2024-43954](CVE-2024/CVE-2024-439xx/CVE-2024-43954.json) (`2024-08-30T16:24:37.460`)
- [CVE-2024-43955](CVE-2024/CVE-2024-439xx/CVE-2024-43955.json) (`2024-08-30T16:23:35.187`)
- [CVE-2024-43958](CVE-2024/CVE-2024-439xx/CVE-2024-43958.json) (`2024-08-30T16:15:19.047`)
- [CVE-2024-43960](CVE-2024/CVE-2024-439xx/CVE-2024-43960.json) (`2024-08-30T16:12:24.113`)
- [CVE-2024-43963](CVE-2024/CVE-2024-439xx/CVE-2024-43963.json) (`2024-08-30T16:10:16.647`)
- [CVE-2024-44070](CVE-2024/CVE-2024-440xx/CVE-2024-44070.json) (`2024-08-30T16:19:49.587`)
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-30T16:00:30.557`)
- [CVE-2024-44913](CVE-2024/CVE-2024-449xx/CVE-2024-44913.json) (`2024-08-30T16:01:54.347`)
- [CVE-2024-44914](CVE-2024/CVE-2024-449xx/CVE-2024-44914.json) (`2024-08-30T16:01:45.013`)
- [CVE-2024-44915](CVE-2024/CVE-2024-449xx/CVE-2024-44915.json) (`2024-08-30T16:01:10.753`)
- [CVE-2024-44919](CVE-2024/CVE-2024-449xx/CVE-2024-44919.json) (`2024-08-30T16:15:09.720`)
- [CVE-2024-45232](CVE-2024/CVE-2024-452xx/CVE-2024-45232.json) (`2024-08-30T16:34:39.270`)
- [CVE-2024-45233](CVE-2024/CVE-2024-452xx/CVE-2024-45233.json) (`2024-08-30T16:33:56.720`)
- [CVE-2024-45435](CVE-2024/CVE-2024-454xx/CVE-2024-45435.json) (`2024-08-30T16:05:58.803`)
- [CVE-2024-45436](CVE-2024/CVE-2024-454xx/CVE-2024-45436.json) (`2024-08-30T16:08:54.840`)
- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-08-30T16:15:10.100`)
- [CVE-2024-6117](CVE-2024/CVE-2024-61xx/CVE-2024-6117.json) (`2024-08-30T17:41:50.753`)
- [CVE-2024-6118](CVE-2024/CVE-2024-61xx/CVE-2024-6118.json) (`2024-08-30T17:44:20.537`)
- [CVE-2024-6227](CVE-2024/CVE-2024-62xx/CVE-2024-6227.json) (`2024-08-30T16:15:10.203`)
- [CVE-2024-6255](CVE-2024/CVE-2024-62xx/CVE-2024-6255.json) (`2024-08-30T16:15:10.467`)
- [CVE-2024-6331](CVE-2024/CVE-2024-63xx/CVE-2024-6331.json) (`2024-08-30T16:15:10.710`)
- [CVE-2024-8194](CVE-2024/CVE-2024-81xx/CVE-2024-8194.json) (`2024-08-30T16:34:53.210`)
- [CVE-2024-8250](CVE-2024/CVE-2024-82xx/CVE-2024-8250.json) (`2024-08-30T16:32:16.917`)
## Download and Usage

View File

@ -166434,7 +166434,7 @@ CVE-2021-2012,0,0,a7497abc79a132cbd33fc617e50925f2242fda24645cad961e1ea637ac2286
CVE-2021-20120,0,0,fc42e2fcc67c6abc4f94788f41d9fdadbae18c36b471de42b55c6234c4410cc7,2021-10-27T12:19:28.913000
CVE-2021-20121,0,0,c2d936c682cb4b093e51b4f8ec52f1c64330b86cc67891ab1a0ca5b68295cc37,2021-10-18T18:44:13.643000
CVE-2021-20122,0,0,b4fb94bc0a558b850232f8792e2996ff453015fcafdf1875ab2f6621f59911b9,2022-06-28T14:11:45.273000
CVE-2021-20123,0,1,1de84df3032ac94928739eb9069b2969a5f97ec63f0863ede977079c3531b210,2024-08-30T14:35:00.660000
CVE-2021-20123,0,0,1de84df3032ac94928739eb9069b2969a5f97ec63f0863ede977079c3531b210,2024-08-30T14:35:00.660000
CVE-2021-20124,0,0,5d999e0933e2aac28e4400be99a3b6228da04904846c7adcfdba0c4a87edd059,2022-07-12T17:42:04.277000
CVE-2021-20125,0,0,53f895aeed66324b20a83d10d5f271d8f051f6cc798daa7850821732c14258d9,2021-10-19T16:53:47.787000
CVE-2021-20126,0,0,06315eba694191411cf0fddf956e398a37b8e3cf205d58b10a4327d33930199b,2021-10-19T17:38:16.187000
@ -188881,7 +188881,7 @@ CVE-2022-1505,0,0,9c124e512ffd426168727357af55dc595fdeb83172622c10dacb70bc5149c9
CVE-2022-1506,0,0,c9e9751d0864822af91977def5ef5322e608ac8efc7ceae8d77eea084e2b967a,2022-06-15T13:19:29.593000
CVE-2022-1507,0,0,9ae146dae7632e64748d0577816fe5c49d6c9ef4d7753a63a3d20584d5956448,2023-11-07T03:41:58.370000
CVE-2022-1508,0,0,ec15b912a95225485616421abf9643bb39e910e62b17b51d9b8276cd7a60e2b8,2022-09-06T19:43:02.387000
CVE-2022-1509,0,0,cc8d25e80b2491d1291a0b4b7d1e98ba2720a6444e6792b0a6aa8ed9b240cb31,2024-02-14T20:40:46.587000
CVE-2022-1509,0,1,2da46c7f9fadfc2fe0e2310a33c441f135af55b669b91775181db68f76aa4aa4,2024-08-30T16:15:08.003000
CVE-2022-1510,0,0,29876efa057e17ae4a374f409d3c032843850a21c730a9b58bdfb46698bfcd6c,2023-08-08T14:21:49.707000
CVE-2022-1511,0,0,bf20950069a5850ba56be5f4b2a547e2da75f289bc3ecb40f049695f6236f2ff,2024-02-15T21:31:56.087000
CVE-2022-1512,0,0,bbed2cbe40df761154b66997258076ff8e758991961f0d25f3b69fa0f51cd108,2022-05-25T01:31:56.243000
@ -193425,7 +193425,7 @@ CVE-2022-24375,0,0,86df9240b1c06a85f69341f63b4c1d873f819cd109847b545442844b0461a
CVE-2022-24376,0,0,0c0303a35db7b569719c7021735f7a90ae2f12c6c71f885e8f420dffb36469ac,2023-08-08T14:21:49.707000
CVE-2022-24377,0,0,a404db8222549b2491c6392315249601b90ad89cee680781512aac4404dcb1e6,2023-08-08T14:21:49.707000
CVE-2022-24378,0,0,e331a4c17e87ea4a8e33a9bfc08e23e79150772561cf0d087386b6d4d7bcde47,2022-08-19T20:04:21.067000
CVE-2022-24379,0,0,6351664fbc8a37f51b751f5ab8b2a9ca5645f60a10a3ac7191af4ad392ab2342,2023-11-20T20:53:52.603000
CVE-2022-24379,0,1,7ed908e794322a0f748d388e754db8aa49f0611bce862e98ea2ef7090a7fbdbd,2024-08-30T16:35:00.640000
CVE-2022-2438,0,0,7d6053a15ebeb486b2084064ce3ce84efbccc2ea75d86fda8415e1054a8b9502,2023-11-07T03:46:35.240000
CVE-2022-24381,0,0,6fe4cbc66ffc25d1be00aa3f591d6fe1fb10d2295fefc25f5ee32ef68465ece8,2022-08-25T20:39:41.347000
CVE-2022-24382,0,0,ba93ddc540373efad971603f9a206db956cdaaf1b473d7d4bace33197f1d1a7f,2022-05-23T18:16:46.347000
@ -205071,7 +205071,7 @@ CVE-2022-38779,0,0,6f3cb7051bea5ae388a730dfd2bd6270eb4fbdd808bdbd19eee1358dfd9ba
CVE-2022-3878,0,0,cc473779c7f7967655924d40bf4b1cdd7abe9e48584c08d6f7e431ba3eec1336,2023-11-07T03:51:54.900000
CVE-2022-38784,0,0,45df4c233316acd5436465939570608a4300eeba4f38bbeb6d3e9d21bcfd1ee8,2023-11-07T03:50:16.403000
CVE-2022-38785,0,0,abe2c2c7cdde80a847c8c3daaa3ee1234be9974fbe6127e474723db161662dc5,2023-11-07T03:50:16.487000
CVE-2022-38786,0,0,3efab7ef6ea3d7c8a6311c11c559e928afe1d7a514cd63e55531eb2065f06e0c,2023-11-25T02:26:54.603000
CVE-2022-38786,0,1,df1afc4c3c20e607fa2a39ce22f5ec13d0c0dde91304c4795153a0aa6fc72dc1,2024-08-30T16:35:01.737000
CVE-2022-38787,0,0,644dadb2f5397bfefb011c41074d65c42b19f8456ff08c56e01bbd5a0ca5b7ad,2023-11-07T03:50:16.530000
CVE-2022-38788,0,0,0894daf04823747675866ed87b914e88cae9f4c10f36e5a5aae65656ac1af356,2022-09-20T14:05:11.257000
CVE-2022-38789,0,0,f628e49ff6d2e3e239afc6bc765959eb518a463b1e17ecf3c7c5cd0337ba3457,2022-09-20T14:20:49.407000
@ -205865,7 +205865,7 @@ CVE-2022-39987,0,0,935e129be5736816f1f64b48bbd72f708d4658000d85ae733b0eebdff57e6
CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3854,2022-10-06T23:35:22.903000
CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000
CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000
CVE-2022-39996,0,1,e3bdff178a99add8306a65002c53a9cfcfa62f90b9d0f047f17a48ae32323404,2024-08-30T15:17:40.717000
CVE-2022-39996,0,0,e3bdff178a99add8306a65002c53a9cfcfa62f90b9d0f047f17a48ae32323404,2024-08-30T15:17:40.717000
CVE-2022-39997,0,0,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000
CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000
CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000
@ -224629,7 +224629,7 @@ CVE-2023-32659,0,0,33c897e9468ed9779d7dda06fa70bc87399a58ede8b67a6164c15386aac48
CVE-2023-3266,0,0,d90476b9dbe6afad3644b435982161b27433396faa349601f75afe29da344de0,2023-08-22T16:19:57.563000
CVE-2023-32660,0,0,3408416a1c84f2ff8871a3a1f78e61af7639c89d34aa5f9fb82643a56894aa05,2023-11-20T20:57:55.033000
CVE-2023-32661,0,0,8d18b934b37fb434426f5d91d0372110ee5c4cae8e5916c53319bf25d8d44601,2023-11-20T20:57:14.177000
CVE-2023-32662,0,0,fae61b7eff0b0564f624f87df6d228f0204de43ce75909f68850a0a0f92d9498,2023-11-21T19:41:02.917000
CVE-2023-32662,0,1,1a816704968c2efa8e4765320bef90eb5460203d0547bdcade7a3e102e9f4514,2024-08-30T16:35:05.833000
CVE-2023-32663,0,0,aa722753cc6a2f97566ea5e0dd94f5706a512281e4f1093c3f5a341651d9e601,2023-08-21T17:15:47.183000
CVE-2023-32664,0,0,6fc53c28d80fa2fce0318122fef95b3973bb1a124d2327846194737257eb1e5f,2023-09-15T19:15:07.340000
CVE-2023-32665,0,0,0366e044a496efaf06045ae3cb0f4411640987a4368071e86eb3d51c32ab096a,2024-04-26T09:15:07.333000
@ -226083,7 +226083,7 @@ CVE-2023-34427,0,0,909a8be83af7eacd05331f9fd55192a7e6e6804f01177a90a05a5ec37d9b4
CVE-2023-34429,0,0,b54009279affbb5911b5dbbbcf73c88c3c18c4cbb8c7b199f375dab53b6c2ed4,2023-07-26T16:17:36.467000
CVE-2023-3443,0,0,b69f680be7cd85ae03b42754e66153a6a2f86898ac3dcab322205322858ec4cc,2023-12-06T18:31:10.727000
CVE-2023-34430,0,0,ef3e68a9be1bc378dfb1f2f6d81c7da7a9b9a185a7dbc043f94e1437cf93eaad,2023-11-21T19:57:33.780000
CVE-2023-34431,0,0,ed943bfcbbb540b1c236910983f918329a14c931f192a2cbb259b86515f9a275,2023-11-20T20:55:51.143000
CVE-2023-34431,0,1,e1fa9e682a8aa6a6a3337ff6115c4f89b5d1ee0c85ace6bbcfde4edb2aea008c,2024-08-30T17:35:02.720000
CVE-2023-34432,0,0,b12d8eb8f9df668fcba97655ac9742e7d6fb90a6de55c0b2c9a35ada92c88142,2023-11-07T04:15:36.383000
CVE-2023-34433,0,0,bd7f2dc553ec0c6d874bc6acb520cef9256d0ae59cd88ce9c90a104182e694f1,2023-07-14T17:58:46.747000
CVE-2023-34434,0,0,9df4f90eedc6c36e91d2a4b60bb890bb2358f5af0c3b1319a1f7270daf569c66,2023-08-02T03:53:15.197000
@ -240824,7 +240824,7 @@ CVE-2023-6950,0,0,2ea33d6aa9986466b9dcd4e1cdc7f6b7576fa990477f369fd2576954029da4
CVE-2023-6951,0,0,2d0b3112fa249cad8de506992400bfeb297240f38415795d6179d5ede864bd9a,2024-04-02T12:50:42.233000
CVE-2023-6953,0,0,049acf0127c7ad8d23801ce9be6768c1adc281ba394b914bdc6c40e63b989b4b,2024-02-22T03:39:59.017000
CVE-2023-6954,0,0,38083f7de1fe9a5b161f9cbaae0c7bbc9ee6d77a4ee5f94afc743432cd2c4b87,2024-03-13T18:16:18.563000
CVE-2023-6955,0,1,f07930d72215dd47b2562b244dca586d4bff972348a319e8508326b1d31762e7,2024-08-30T14:15:14.797000
CVE-2023-6955,0,0,f07930d72215dd47b2562b244dca586d4bff972348a319e8508326b1d31762e7,2024-08-30T14:15:14.797000
CVE-2023-6956,0,0,ebab8c4d5b24405f0d58e5a99fa9a736eda2c65adad9bc90f9186d3a4f452f2e,2024-07-18T15:59:12.007000
CVE-2023-6957,0,0,07959fb3f32e925a62f4301abfce36bb0dff388d72f0d4f67e8b6a8fe0020487,2024-03-13T18:16:18.563000
CVE-2023-6958,0,0,dfa9f23d52119de772dd91366d6bc1b2e70ca715d55949e74432bb3d34dda7cd,2024-01-24T20:47:14.900000
@ -240891,7 +240891,7 @@ CVE-2023-7024,0,0,0b0d6e2cd8a55b4494cdd2b77e9f647f33c47f79573c34c6c5e8c28805a72b
CVE-2023-7025,0,0,e7834d97731a235cf0f177f71735e5ca7d5fcff5ac726923c8b5198da81ec286,2024-05-17T02:34:03.957000
CVE-2023-7026,0,0,1cc936e616463b5ff1b033dcc860db201e66a8dd5c5dbaeca22f086a6f79ffd6,2024-05-17T02:34:04.063000
CVE-2023-7027,0,0,fc1293543654e15b720c38a66bb6f2ec15c9fc5eb3fe91f4129c0466a44102c9,2024-02-02T16:30:28.857000
CVE-2023-7028,0,1,f40a12927af87d10b267447cacfa464009eae7fa88a59d293cbd140eb4ecada9,2024-08-30T14:15:14.943000
CVE-2023-7028,0,0,f40a12927af87d10b267447cacfa464009eae7fa88a59d293cbd140eb4ecada9,2024-08-30T14:15:14.943000
CVE-2023-7029,0,0,0b2077503389563a2cf8a194211de95f4cbe22ad4680ab3928b7bbbf465fb95d,2024-02-13T18:49:46.303000
CVE-2023-7030,0,0,f49772cf48990c4178ee421660106a6fa59de551116b4fc6d8b00fd41a2d7e54,2024-05-02T18:00:37.360000
CVE-2023-7031,0,0,fd21885ac32f4e4ebf79a0a01265d00a38f09b08812eedc920f03ba00e1c3538,2024-01-25T16:32:53.153000
@ -242451,8 +242451,8 @@ CVE-2024-1488,0,0,882c78fbd7b0e9fe7403aeecbc9ce3b63d8e8855dfc05e684b04e2f8c2e6ba
CVE-2024-1489,0,0,a34275ea6c4bb8516e035d729e8f7c545dca1bcc4ae724ed4234bb24b7160ab5,2024-03-13T18:15:58.530000
CVE-2024-1491,0,0,4902ce9a581ddd4666d08b211372eca700dbe290cec1b79a72d1103d94b7a724,2024-05-28T17:15:09.103000
CVE-2024-1492,0,0,842fd2ad2d3b77be2ed098e72c6e674500bb67958325ad29b19d2b30460d5fb9,2024-02-29T13:49:29.390000
CVE-2024-1493,0,1,94e2ffd39271bbaa34f23c89909bb2cd1862573d5d6899e5e494b694638f268e,2024-08-30T14:15:15.167000
CVE-2024-1495,0,1,d5112f9ba0843e4274caef5c7ec135de9dd03baeb09c42d5b844478309614199,2024-08-30T14:15:15.293000
CVE-2024-1493,0,0,94e2ffd39271bbaa34f23c89909bb2cd1862573d5d6899e5e494b694638f268e,2024-08-30T14:15:15.167000
CVE-2024-1495,0,0,d5112f9ba0843e4274caef5c7ec135de9dd03baeb09c42d5b844478309614199,2024-08-30T14:15:15.293000
CVE-2024-1496,0,0,6d82aec60af8d476c91ca34384ad10e78487be89418dc120e728f3cc21539daa,2024-02-29T13:49:29.390000
CVE-2024-1497,0,0,84872ffc192cc6e6ec0b81370997b466156a4cb279965af745199f9ad4beea1a,2024-03-13T18:15:58.530000
CVE-2024-1498,0,0,94d0064bdd5fe476a6746d7b679a0e3488837d916d20f3fa70fb1f3acb6bc5ca,2024-04-10T13:24:00.070000
@ -242663,7 +242663,7 @@ CVE-2024-1731,0,0,6081722b0fe7c7148e0b5194379412103d8160c8fab19963501893765ed8f7
CVE-2024-1732,0,0,834564798b34803457a0ec9cad4eefb5bcc466f88b5c86130580cd8ef81bdf66,2024-04-02T12:50:42.233000
CVE-2024-1733,0,0,1de98e53179418755768544ec663a550e1c566834940320a34ae086f141e0f3f,2024-03-17T22:38:29.433000
CVE-2024-1735,0,0,d5d30fc000c2cb1bb165a9c01c00d55a797d1a347c4b21fcf662bb09cf8edd31,2024-08-26T17:35:03.340000
CVE-2024-1736,0,1,0135c1eb1397a994768a81e9e9f4e835fac116fc8b4d5445ab136b9d3489ccb5,2024-08-30T14:15:15.450000
CVE-2024-1736,0,0,0135c1eb1397a994768a81e9e9f4e835fac116fc8b4d5445ab136b9d3489ccb5,2024-08-30T14:15:15.450000
CVE-2024-1737,0,0,431ef45da0f4b4670d42afc3c1240d1e4f77449968f30478ad5d3ddba17c5c7f,2024-08-01T13:46:11.850000
CVE-2024-1738,0,0,65086d20a025a8acdbd054263ca4cd14eb5b5ba61d808610c94ef2eec44edd2f,2024-05-15T16:15:09.807000
CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000
@ -242879,7 +242879,7 @@ CVE-2024-1959,0,0,20773b09a03765316a8a30eab375cea71fea1425346dc1ce35f18b661dfaac
CVE-2024-1960,0,0,c755cb8cb954b0b1fd45e3b2b2de1bed153c08b47450f36752ad68952963c3e6,2024-04-10T13:23:38.787000
CVE-2024-1961,0,0,dc2f9d3f3b67fb9e1c6125531b0d8e4d845cdbbf4294ea07c79e7fd65b2f59e9,2024-04-16T13:24:07.103000
CVE-2024-1962,0,0,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000
CVE-2024-1963,0,1,6490d3cda92d4283b18d317f0502737ed9712d406302073ebfd8b50283399244,2024-08-30T14:15:15.577000
CVE-2024-1963,0,0,6490d3cda92d4283b18d317f0502737ed9712d406302073ebfd8b50283399244,2024-08-30T14:15:15.577000
CVE-2024-1965,0,0,5cf0344d0ba6ffdf46e178c3a3f0a22dafc37cdaf493620506aae0773081ac04,2024-02-28T14:06:45.783000
CVE-2024-1968,0,0,5d386d638a6745d5972e3da785c6fa3ef4f25b00eef921490d278858d9e57670,2024-05-20T13:00:04.957000
CVE-2024-1969,0,0,f69c98da43c82ba0223a7bad81bd76b37ab27a86dfdf24f5ab1b3124adecbf86,2024-04-30T13:11:16.690000
@ -243464,7 +243464,7 @@ CVE-2024-20929,0,0,6a334fcb9e1a38537d0030d6dc1d1c00c6b32fe3e7ffe70a766d4d253c5ce
CVE-2024-2093,0,0,079d9e9604827a4c25e77eb9350d5db2178004f91f7910b9b24cbd37a234888f,2024-04-10T13:23:38.787000
CVE-2024-20930,0,0,b32f422ab4d45b84995bbdb96ed692f89844b097060f0942fe72da2764953d01,2024-01-20T18:36:08.060000
CVE-2024-20931,0,0,d7d592e6df501a8144029118e8a788945ee86ad4acaf922aff06dbb38e4f65d6,2024-02-20T19:51:05.510000
CVE-2024-20932,0,0,b0d29626d576647295cf2550e1056b91c2b080b21e94a1d5e537c9d603aff129,2024-02-14T20:46:22.083000
CVE-2024-20932,0,1,b6a5e08f31bc64d8dfd7f42e9d3e9b939e7b79c077de8ac45ea3d3d631b33901,2024-08-30T16:35:09.817000
CVE-2024-20933,0,0,a5bb1ca13772c5cf38572f5de702a270d60fabb0e63c4a0fbf4a9ad976d93f9e,2024-04-26T16:03:09.047000
CVE-2024-20934,0,0,5acabbe49edd58ec131b480cc50d69da0378844497a0eb69036f3b8449dd657a,2024-01-20T18:35:47.127000
CVE-2024-20935,0,0,47973a6d787dac96f84797f9cffe113a23daf9fe3790cd7bf0778215187cf83f,2024-04-26T16:03:04.253000
@ -243484,7 +243484,7 @@ CVE-2024-20948,0,0,12e9e8a4ba5f0d4d5a3ec7d1b0d3211c79a9e2d1eccf174b1829b4aa21974
CVE-2024-20949,0,0,a2a9e2bb1ecc05c1ef53d90345f7a09727513acaa3e67eae682ecc91fa3b450c,2024-02-20T19:51:05.510000
CVE-2024-20950,0,0,a8dcbd8cc1ddfff3d855b715bc3cb1c5e0aab4e149120b29bfe9971dd0c3b192,2024-01-20T18:32:03.153000
CVE-2024-20951,0,0,136b65627b34330961bc58be5e8715a36943c88348a722dbeba06d29218077c3,2024-02-20T19:51:05.510000
CVE-2024-20952,0,0,fb9759b12afe3ed6ba66d77d033048d477b379f8729b7bd964e4cd152b1519d7,2024-02-15T03:18:31.140000
CVE-2024-20952,0,1,ee7670e91d33e31160e61df658911f1f989f8a5d8151285943b5c8af49a8a00e,2024-08-30T16:35:10.593000
CVE-2024-20953,0,0,46cccee01b693cef9c9646cac2e0fd84e85cf6e77caa7c1816c2e535a0c5b0f7,2024-02-20T19:51:05.510000
CVE-2024-20954,0,0,57a73413d0e3acca6ee4a29e076cb030f710aa01f467c3e7bf98fabced0d9135,2024-04-17T12:48:31.863000
CVE-2024-20955,0,0,3ef5989170bb1b485154f91fb8591afd4cb71f457c0fd734cc9a4a4e8a7d2a89,2024-02-09T02:26:25.517000
@ -244754,7 +244754,7 @@ CVE-2024-2259,0,0,47e9716e08a8a64152636e816d65e3ceba79ed2969d2637cad811811cd8275
CVE-2024-22590,0,0,d6412fa08202703f5ad227553f1802d67a899aa26e46c95f53e4a8e42002c8bc,2024-08-22T20:35:03.440000
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
CVE-2024-22592,0,0,268d0bb3e8d404d0087cf60d681467b452c81f0d7e52d485caa72c08138c2725,2024-01-20T18:49:41.750000
CVE-2024-22593,0,0,a9ca57d36c76f00065303d1015def590eb9e5a76ce97b84afb4d13dfe83ee2a6,2024-01-20T18:49:24.957000
CVE-2024-22593,0,1,2467562dcdb298d5c4dca68f2ef85b02e65460fe241eb9ee49dceb82fe1beadf,2024-08-30T16:35:11.453000
CVE-2024-2260,0,0,d237748ae68b04ec0e8b308a9264a7bfcc2df1f036367829588718b7aa93c97c,2024-04-16T13:24:07.103000
CVE-2024-22601,0,0,01fc61698b671d9d41699ae801e07d490ff49371417b94a20b73f1e5a18d5d63,2024-01-23T14:23:11.057000
CVE-2024-22603,0,0,309894547e614c5d21c5fa6f92f5bedf8f5e1b1421f7223a169ad2a441b96068,2024-08-29T21:35:06.313000
@ -248539,7 +248539,7 @@ CVE-2024-27996,0,0,5aaae661a6fb92b939550d770c3ab033edc85310e1d2be696c3be929f4996
CVE-2024-27997,0,0,38211b675f4409064c6233281099da5f5fa00ff059690325dad2c59b915c01fd,2024-03-20T13:00:16.367000
CVE-2024-27998,0,0,4b6f230fe964647fb680f6367b279bba522ac93005c2e8f6d523205374f3e144,2024-03-20T13:00:16.367000
CVE-2024-27999,0,0,eb71f5e78ce23e710caf587ffd7cde1246a6fc9b58a11c7b1c6cbe38842e0f52,2024-03-28T12:42:56.150000
CVE-2024-2800,0,1,ea2a35c266bf0a55163052690a6364650b6a2a82a790e86495e46ba622554f64,2024-08-30T14:15:15.760000
CVE-2024-2800,0,0,ea2a35c266bf0a55163052690a6364650b6a2a82a790e86495e46ba622554f64,2024-08-30T14:15:15.760000
CVE-2024-28000,0,0,dcbcdb07e783b0eac6cec7509b17aba150c696f13ae2755e18949eb0be1e9868,2024-08-21T16:06:23.153000
CVE-2024-28001,0,0,769e60058cb29be891e3bd26013be397b6ae5a2c1de4b96ae3237e85af5cdd26,2024-03-28T12:42:56.150000
CVE-2024-28002,0,0,979c468740a66c74eeb1c5784ee90077b381a78255d231d99fff807000c5cb6b,2024-03-28T12:42:56.150000
@ -249523,16 +249523,16 @@ CVE-2024-2969,0,0,8544d89f42684c11ff0ce4f59b9b332aa5f1a74abb30a148c14e95ecc35686
CVE-2024-2970,0,0,fc9de7221826a902f3a6cf19f3180d33eaf927389762bf1e23aea5c70762ccb6,2024-03-29T12:45:02.937000
CVE-2024-2971,0,0,9515cf628b34137ac014a8bc7d614bd445c5e05c6a07bb53515b2fc0d7b4fdaa,2024-03-27T12:29:30.307000
CVE-2024-2972,0,0,3771d0e64c82e60dbf132bba6647e15b9ad9d47823c5e525c2ccab39d1c1d845,2024-04-24T13:39:42.883000
CVE-2024-29723,0,1,b7139407866a4d0c3c74493e169fad2361c20cb65140190a37dca61872dd4fc8,2024-08-30T15:51:01.163000
CVE-2024-29724,0,1,ceacd4a2f791def541ffe93f6110a7b011c520d0699a7865293966ac2a1edd5f,2024-08-30T15:50:50.157000
CVE-2024-29725,0,1,7a66c63e1611b48a173971a6d4aa0ccd80d620484476d04f91be7b57e4aa5ad6,2024-08-30T15:50:40.927000
CVE-2024-29726,0,1,b9573a94243a04ee9f4901fcc1ba164353789bfea88d854275ba4b3d401fa67f,2024-08-30T15:50:30.467000
CVE-2024-29727,0,1,928793bbf242c5ebc924ddc94d5acb0d7c315f917cc7e946d52f2558a921a4a5,2024-08-30T15:43:13.940000
CVE-2024-29728,0,1,8a4f66f2ea0931cf994552e7dc167997ac8de7dfe3210c4e841b68f25111578f,2024-08-30T15:49:53.347000
CVE-2024-29729,0,1,65b4933dcb11ea77f23be30eacdbe6b3edfd98fa2606c87c0f9dfc4e81ea4e17,2024-08-30T15:49:44.607000
CVE-2024-29723,0,0,b7139407866a4d0c3c74493e169fad2361c20cb65140190a37dca61872dd4fc8,2024-08-30T15:51:01.163000
CVE-2024-29724,0,0,ceacd4a2f791def541ffe93f6110a7b011c520d0699a7865293966ac2a1edd5f,2024-08-30T15:50:50.157000
CVE-2024-29725,0,0,7a66c63e1611b48a173971a6d4aa0ccd80d620484476d04f91be7b57e4aa5ad6,2024-08-30T15:50:40.927000
CVE-2024-29726,0,0,b9573a94243a04ee9f4901fcc1ba164353789bfea88d854275ba4b3d401fa67f,2024-08-30T15:50:30.467000
CVE-2024-29727,0,0,928793bbf242c5ebc924ddc94d5acb0d7c315f917cc7e946d52f2558a921a4a5,2024-08-30T15:43:13.940000
CVE-2024-29728,0,0,8a4f66f2ea0931cf994552e7dc167997ac8de7dfe3210c4e841b68f25111578f,2024-08-30T15:49:53.347000
CVE-2024-29729,0,0,65b4933dcb11ea77f23be30eacdbe6b3edfd98fa2606c87c0f9dfc4e81ea4e17,2024-08-30T15:49:44.607000
CVE-2024-2973,0,0,e93d65866932c82af8b50e3b7af91564bce393a65c7a315e9b3d7b174fddfb22,2024-06-28T10:27:00.920000
CVE-2024-29730,0,1,b186c5b3880379c585659498d231a4340abc326b0fc3ca68ca709580571956e0,2024-08-30T15:49:36.833000
CVE-2024-29731,0,1,68b136b744379f26748e41e0fdbaa75d019b3aa6b49c48f975004138369bd863,2024-08-30T15:49:30.047000
CVE-2024-29730,0,0,b186c5b3880379c585659498d231a4340abc326b0fc3ca68ca709580571956e0,2024-08-30T15:49:36.833000
CVE-2024-29731,0,0,68b136b744379f26748e41e0fdbaa75d019b3aa6b49c48f975004138369bd863,2024-08-30T15:49:30.047000
CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710f0b,2024-03-21T12:58:51.093000
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
@ -250662,11 +250662,11 @@ CVE-2024-31136,0,0,fc3cbe768e48d4625e33825c87e8160fa75cbd797dbb2249521e321016035
CVE-2024-31137,0,0,24dca0985c04b079d91e4a71b8f459f589e7387b6e8baa6268bf1899b5ce24d9,2024-04-08T22:41:02.117000
CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01be5e,2024-04-08T22:41:43.087000
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
CVE-2024-3114,0,1,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
CVE-2024-3115,0,1,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000
@ -252768,7 +252768,7 @@ CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a919
CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000
CVE-2024-34191,0,0,bd52790a370d66146af5913c4f73ac5963a55bf27933a93d7abd4c4f67c70b7f,2024-08-29T20:36:44.733000
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
CVE-2024-34195,0,1,e936f15231dfa4d6a6e17686f81aced8b75779a489cec0fad79bd9273174e57c,2024-08-30T15:59:08.873000
CVE-2024-34195,0,0,e936f15231dfa4d6a6e17686f81aced8b75779a489cec0fad79bd9273174e57c,2024-08-30T15:59:08.873000
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
CVE-2024-34198,0,0,64762b78b18144217b11a78982a1bc311c217ced71d9dd99c5d6d58d14f2ea5c,2024-08-29T20:36:45.497000
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
@ -254074,7 +254074,7 @@ CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635
CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000
CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000
CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000
CVE-2024-36068,0,1,8b31731eb347ae7e58833061fb99c12a798a6414a234257a762115bc06cf53d3,2024-08-30T15:26:36.340000
CVE-2024-36068,0,0,8b31731eb347ae7e58833061fb99c12a798a6414a234257a762115bc06cf53d3,2024-08-30T15:26:36.340000
CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000
CVE-2024-36070,0,0,beb228b364090611e3dd2a48abbf51047e75d9810a4335130915a1f3e879cf31,2024-05-20T13:00:04.957000
CVE-2024-36071,0,0,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000
@ -254354,7 +254354,7 @@ CVE-2024-36443,0,0,38195f7df8580deaa4dd036c38bb714d8d18d45a4faa64844c80b85de41e3
CVE-2024-36444,0,0,525183f83037435f2af5637e8716083a8f0d5fddba9d30b5cea6213924652f0d,2024-08-26T15:35:11.977000
CVE-2024-36445,0,0,7d7e8c131c3075facba288799c042e0db5cd29389714aa43c2d4864faad7bb19,2024-08-23T16:18:28.547000
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000
CVE-2024-36448,0,1,f7f2ccfd6392d72a44247290ace1d30cada1f6b8b579c50676cd28d048778959,2024-08-30T16:39:20.220000
CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000
CVE-2024-36450,0,0,700527b7e7e1ebac8a4794e042f6b829b1a1f942eb0939907744fde9a0923a2e,2024-07-31T14:47:05.423000
CVE-2024-36451,0,0,0282b5798612593892f8b22f51a38ce8164272f8754ea7af1c514e9b953ab154,2024-07-11T15:05:47.857000
@ -254727,9 +254727,9 @@ CVE-2024-37066,0,0,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3ef
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
CVE-2024-37079,0,0,13a839c99b6b0f6673c96fa0a4061f3d17516ad80e35ce77bcfae72d6eb9189a,2024-06-20T12:44:01.637000
CVE-2024-37079,0,1,82b979f10f365a85d100214f0fb7af7a3eb5d21de28fec4391bf5c3ae307fb19,2024-08-30T16:33:59.787000
CVE-2024-3708,0,0,d5d3127cf1ebbe4d1277dc91ebc9f2ee01faea98cb7a29c27942fe94c97d6c50,2024-07-09T15:15:11.623000
CVE-2024-37080,0,0,f0a9bd7effb46ac30e1d20f1d1aa7a7b386c0ee7e62089b4e1cc310e9f341fd9,2024-06-20T12:44:01.637000
CVE-2024-37080,0,1,de459bd2ddfc409fc8457e24456550c53d34fe3f29bc2ee8121467f738fa3fa0,2024-08-30T16:35:29.797000
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000
CVE-2024-37084,0,0,e8df0694fdec2710f267b23abcc1607a09f45be7ad027071682046814f69bbe8,2024-08-26T16:11:27.507000
@ -255278,10 +255278,10 @@ CVE-2024-37950,0,0,b9d9c5157e1c031a5d4e7c44990db904f249de585cb32088fcff43b55d08f
CVE-2024-37951,0,0,1d7da26bc90367902aadb08526715ea13e2d2d70f6c886dc0633388d7fb4c227,2024-07-22T13:00:31.330000
CVE-2024-37952,0,0,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000
CVE-2024-37953,0,0,4eb5938cacccd7a29bd6421c7b9d4f160d359c8ce01d9b3d6865ffcc482f476e,2024-07-22T13:00:31.330000
CVE-2024-37954,0,0,5da244531959717aea2bcb37c065da0b6b4234d99344e5c53987029f66f4ac92,2024-07-22T13:00:31.330000
CVE-2024-37955,0,0,0546cd1263e2bde71eb6a609e1ed7b710b22deaf856a78cfe13cb35decc79042,2024-07-22T13:00:31.330000
CVE-2024-37956,0,0,5f66e06fced66697c8dd42dc6ba4042113614ce499cc127002b050863d307618,2024-08-01T13:15:10.750000
CVE-2024-37957,0,0,675b217ad56affa2884e85d3b0deb25785c89c650a678cff87048993c692151e,2024-07-22T13:00:31.330000
CVE-2024-37954,0,1,1c640ac4df37ea3331e68a9257565ea5d4e7ed6d0ee04d4617a78b61ae0ab68a,2024-08-30T16:46:38.627000
CVE-2024-37955,0,1,1f83806c1a4a98ae814f120c689a6da4330d601dcf8c25cf09a16809c7e086d7,2024-08-30T17:42:28.193000
CVE-2024-37956,0,1,c41ea1913ade9caa6b192d2ef5b13bc4f5eb0fc89d8d3ffee93b50c23f53761c,2024-08-30T17:48:10.377000
CVE-2024-37957,0,1,a0468b4cfb8afdff98ec12eab4bfff265258e3b4400edc48618af5233a27e7a2,2024-08-30T17:56:23.977000
CVE-2024-37958,0,0,bc287f5f20457f05c8d3137e84685755cf9e9acda7ed8c8b8e1d2674983eb6e8,2024-07-22T13:00:31.330000
CVE-2024-37959,0,0,0a89e2045c7690120907a9b888ad211603cf619468902002241d7d50995a3d3b,2024-07-22T13:00:31.330000
CVE-2024-3796,0,0,5bae4d416035885a0192c05970d5fd8edbaa05fe9b0acf97b8394b245a69cda0,2024-05-14T16:11:39.510000
@ -255909,7 +255909,7 @@ CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
CVE-2024-38793,0,0,a8fd48aed5b75b541d296823be3a1e58abe69599744d420c44bb0f22ac5d40d7,2024-08-30T13:00:05.390000
CVE-2024-38795,0,0,e01c3b081ed49f9384d7469e99dab9c7ed6c3989c91fb0152edf9c1ae6b6c6cc,2024-08-30T13:00:05.390000
CVE-2024-38795,0,1,83e6ed558db6ed1b1b849abb4b7528bc0fb3b0856b9448de9d080b54c41c3121,2024-08-30T16:31:03.887000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
@ -256109,7 +256109,7 @@ CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c943
CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000
CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000
CVE-2024-3930,0,0,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000
CVE-2024-39300,0,1,7f09a8e374c1c79c4b6cbf0d170fb946832af7b3ecb8528ee4eb570ef71b1e11,2024-08-30T15:35:03.273000
CVE-2024-39300,0,0,7f09a8e374c1c79c4b6cbf0d170fb946832af7b3ecb8528ee4eb570ef71b1e11,2024-08-30T15:35:03.273000
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000
@ -256351,9 +256351,9 @@ CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fd
CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000
CVE-2024-39619,0,0,eba9a3263593a35724815600925b04c780a0fc23aea386d231775aed259a1e52,2024-08-02T12:59:43.990000
CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000
CVE-2024-39620,0,0,e76d50d823e813bcb01060bb3e9df6cbf737da7218616b86379de2a6474e16bc,2024-08-30T13:00:05.390000
CVE-2024-39620,0,1,8135803ed41925e53730b72fe1e4456337953372d2cdda9216648b7c8361f3e4,2024-08-30T16:30:39.210000
CVE-2024-39621,0,0,0c249e1c45f38e7803d96351e629758e9c24acaebc0fdee9ecbe6f2310164e1b,2024-08-02T12:59:43.990000
CVE-2024-39622,0,0,9b892abdf85a2d6b1e68529dfd5cf24434be8220c37475ddf087071daf308215,2024-08-30T13:00:05.390000
CVE-2024-39622,0,1,5e7d7bcbe4d60960bcc7d0a35a948631371ae2277c1c9eb9831f372ee1fb98f9,2024-08-30T16:30:11.797000
CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000
CVE-2024-39626,0,0,d18b40bac7879d91efce41316f457b002a06c0098fd8a51342c25f4f7011fae6,2024-08-02T12:59:43.990000
CVE-2024-39627,0,0,f6ecb8eb87a0844a06d33fd61ce1655e1dc35cf5d41af8bf595cbdcdb232937f,2024-08-02T12:59:43.990000
@ -256436,7 +256436,7 @@ CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4
CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f676db,2024-08-26T16:15:08.633000
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
CVE-2024-39713,0,1,b3e3e0d8b3515d4d46b8be4682c466cda0b8a7349b24f7e16d49f1073ff7de9b,2024-08-30T15:47:55.637000
CVE-2024-39713,0,0,b3e3e0d8b3515d4d46b8be4682c466cda0b8a7349b24f7e16d49f1073ff7de9b,2024-08-30T15:47:55.637000
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
@ -256470,7 +256470,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
CVE-2024-3980,0,0,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
CVE-2024-3980,0,1,af7d02bc503a7625123fe3e6728981b9674a4164c60a7ca3f7e7e1561da1eb07,2024-08-30T16:15:09.517000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000
CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000
@ -256493,7 +256493,7 @@ CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a
CVE-2024-39832,0,0,4e3934d2762f9f7037c319199b04232a1818dd1ced3ad84be4d619c335cdb24b,2024-08-23T14:35:13.670000
CVE-2024-39836,0,0,0d5fe8c5e6b07786a6f137526c846390a0820f10bee6c12207bd00a1009c33ce,2024-08-23T16:16:18.757000
CVE-2024-39837,0,0,c60120742f41154fefe3eaf4e38584ef459a2d1a28dab13e5a0225dc3e52fb1e,2024-08-01T16:45:25.400000
CVE-2024-39838,0,0,f1d266ac929ac8ff4f1b378f7710d38ca9858e2e9c50d8f3f7b866349ff32783,2024-08-05T12:41:45.957000
CVE-2024-39838,0,1,95968d26b9b642ab64b4cc3d1724bddc9c7d1141d1aebd702fece4a9bd0629d3,2024-08-30T17:49:03.730000
CVE-2024-39839,0,0,c4552c9b1ee7cea8a178134078e247b54a0ce7f628fb8b4d8589f1118253544d,2024-08-01T16:45:25.400000
CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000
CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000
@ -256605,10 +256605,10 @@ CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
CVE-2024-40096,0,0,f4d93815f52e3c16c28040ba21795a35002b57c191156f911baad6e63290a17a,2024-08-22T20:15:09.340000
CVE-2024-40096,0,1,7067973a4296a7a70beea7b209cd71d2a86d44a9bdfd60035b86d8848d99631b,2024-08-30T16:14:41.957000
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
CVE-2024-40101,0,0,886521863c96c11be959a1cf217c3eefcb0791bdf3b877e4dc348f32f4062dae,2024-08-29T16:57:16.727000
CVE-2024-4011,0,1,1484f28c8125b702be19148770f89c8b6b993aafff3c3ded37de5b6fc9a35488,2024-08-30T14:15:16.590000
CVE-2024-4011,0,0,1484f28c8125b702be19148770f89c8b6b993aafff3c3ded37de5b6fc9a35488,2024-08-30T14:15:16.590000
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca1da,2024-08-26T17:35:05.733000
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
@ -256653,7 +256653,7 @@ CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c746
CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000
CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000
CVE-2024-40395,0,1,3ba6dbce46079967e0577ccca7056038a218abcb260e702c86d066887bd846b4,2024-08-30T14:35:38.087000
CVE-2024-40395,0,0,3ba6dbce46079967e0577ccca7056038a218abcb260e702c86d066887bd846b4,2024-08-30T14:35:38.087000
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000
CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000
@ -257167,7 +257167,7 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-41236,0,0,3cbbab435b95a57b894a4463aee8e4605d344dcd712f9c37eefe09a1162931d1,2024-08-29T13:25:27.537000
CVE-2024-41236,0,1,be448d605b1e60c187be198662d1bb9951811e6c057df5c799b75e6bea3c62e1,2024-08-30T16:02:49.257000
CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
@ -257219,9 +257219,9 @@ CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3c
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
CVE-2024-41345,0,0,ebfe2de1698c778225ce129d764399fd9c8e2701cd9f886e923d11bdfb8b2cb1,2024-08-30T13:00:05.390000
CVE-2024-41346,0,1,42661e5058004473797db6f1d9dbf113bd8033baec39d03e654b0a8142c6b669,2024-08-30T14:35:04.550000
CVE-2024-41347,0,1,89a9504ea9ee2a5c8ecde7062a87dadb645c768c7135b7d1367bd472cc86fc01,2024-08-30T14:35:05.457000
CVE-2024-41348,0,1,50ed5721bc7d3535ca5c903d1069021e321cb28c79b83af6694b32cbc2906455,2024-08-30T14:35:06.393000
CVE-2024-41346,0,0,42661e5058004473797db6f1d9dbf113bd8033baec39d03e654b0a8142c6b669,2024-08-30T14:35:04.550000
CVE-2024-41347,0,0,89a9504ea9ee2a5c8ecde7062a87dadb645c768c7135b7d1367bd472cc86fc01,2024-08-30T14:35:05.457000
CVE-2024-41348,0,0,50ed5721bc7d3535ca5c903d1069021e321cb28c79b83af6694b32cbc2906455,2024-08-30T14:35:06.393000
CVE-2024-41349,0,0,5767b39a74561aab777e8dd33eef996bd5af8a9d2851fc6c6d2dcaa58b11af06,2024-08-30T13:00:05.390000
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
CVE-2024-41350,0,0,c6cafe3c7aa4cd07ee3fb46385537ce7354b4a494fea1c69adc3b04b374595f5,2024-08-30T13:00:05.390000
@ -257232,15 +257232,15 @@ CVE-2024-41355,0,0,767668ff7ebdee8b739a5a908dea06e5bc0b0c20c93aa5d0d74d6f0af3b47
CVE-2024-41356,0,0,d47682e9106c793d1fcf2a2f339a3fd1e5f827ed311819123df3924448767650,2024-08-01T13:58:35.803000
CVE-2024-41357,0,0,0e1eb56990d81b0e95b5da12b2577b60f5c4a370d94ba23fe25086e49a9417c2,2024-08-01T13:58:36.627000
CVE-2024-41358,0,0,4fbb66c56c60bd3542dceed6bf39a9339e2ab98767e13b23c055f4a2ea0f7dc3,2024-08-30T13:00:05.390000
CVE-2024-41361,0,1,9b63532534a357866c517cb3f1e731a56d47e38e24268e5ebb5e8dc6d0f4294e,2024-08-30T15:35:04.133000
CVE-2024-41364,0,1,45937b95344ee2b4062cece0526795bc8603ddb0a52a6d146d2940f1a8f5df1e,2024-08-30T15:35:05.150000
CVE-2024-41366,0,1,dd5dfac884d29b20b8511d6688144e432242ddf4af2a298f3c9ffd2d1f1bfb7e,2024-08-30T15:35:06.153000
CVE-2024-41367,0,1,3b2dec504f8e36a8b04fd28240dda396cc189e208b46f2a68f6b65a8dd06dcff,2024-08-30T15:35:07.170000
CVE-2024-41368,0,1,9301acccc1aaace6545f9b83cc1f2926b82f14a7de0e72e4763697d4097f1725,2024-08-30T15:35:08.497000
CVE-2024-41369,0,1,3dc6349ecf352e26029c1056e7b0099a336d9585ee19e84aaa0a52e84286aa8f,2024-08-30T15:35:09.570000
CVE-2024-41370,0,1,0991748eaf86e034f410fa985babcc5ae3d444100a6df7fe2828d979778ffddd,2024-08-30T14:35:07.547000
CVE-2024-41371,0,1,6730c9a8cf444fa509c755d3e78d034a549b65c09d0acdbc55e36d8f56b5ca92,2024-08-30T15:35:10.803000
CVE-2024-41372,0,1,6a72cdb3a2a01c1388d381d41904962acf5958e9dc7a54764166c2bc484f1a91,2024-08-30T14:35:08.307000
CVE-2024-41361,0,0,9b63532534a357866c517cb3f1e731a56d47e38e24268e5ebb5e8dc6d0f4294e,2024-08-30T15:35:04.133000
CVE-2024-41364,0,0,45937b95344ee2b4062cece0526795bc8603ddb0a52a6d146d2940f1a8f5df1e,2024-08-30T15:35:05.150000
CVE-2024-41366,0,0,dd5dfac884d29b20b8511d6688144e432242ddf4af2a298f3c9ffd2d1f1bfb7e,2024-08-30T15:35:06.153000
CVE-2024-41367,0,0,3b2dec504f8e36a8b04fd28240dda396cc189e208b46f2a68f6b65a8dd06dcff,2024-08-30T15:35:07.170000
CVE-2024-41368,0,0,9301acccc1aaace6545f9b83cc1f2926b82f14a7de0e72e4763697d4097f1725,2024-08-30T15:35:08.497000
CVE-2024-41369,0,0,3dc6349ecf352e26029c1056e7b0099a336d9585ee19e84aaa0a52e84286aa8f,2024-08-30T15:35:09.570000
CVE-2024-41370,0,0,0991748eaf86e034f410fa985babcc5ae3d444100a6df7fe2828d979778ffddd,2024-08-30T14:35:07.547000
CVE-2024-41371,0,0,6730c9a8cf444fa509c755d3e78d034a549b65c09d0acdbc55e36d8f56b5ca92,2024-08-30T15:35:10.803000
CVE-2024-41372,0,0,6a72cdb3a2a01c1388d381d41904962acf5958e9dc7a54764166c2bc484f1a91,2024-08-30T14:35:08.307000
CVE-2024-41373,0,0,529d42be06af1c8cedd9a8d606fcdb9f3c484729e69057461e74c09cda6cdb4d,2024-08-01T13:58:37.403000
CVE-2024-41374,0,0,9bef11df38a244f32a4572e98232b7466fb732ad8e92ed12a90e2f30a0970836,2024-08-01T13:58:38.380000
CVE-2024-41375,0,0,454a14cadb578cd2f6f20f7a0316c6f62edc522562d34d42ff53a951c64bda15,2024-08-01T13:58:39.487000
@ -257263,7 +257263,7 @@ CVE-2024-41443,0,0,1be6f511e21ef9a107685136f15f3c2750b611a333337ffc199f4824cee06
CVE-2024-41444,0,0,abf00e890aab3eab79de5f49a6550430273c34dfb216bb88f1c4a5e644eb4c70,2024-08-26T19:10:09.607000
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000
CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
CVE-2024-4146,0,1,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000
CVE-2024-41460,0,0,c083c888decef1f6a25386395c954e7130328fe40eb807fb48aeb706487a4b23,2024-08-01T13:58:43.920000
CVE-2024-41461,0,0,29e4ea2e6c0449f9c564b466527c20a02d07c4c6d50d9f1be0a40101bb5592e5,2024-08-01T13:58:44.983000
CVE-2024-41462,0,0,7dbe5aff525bed125a538ee4652d679dba96e46bb328711bc0224d78949e0a92,2024-08-01T13:58:45.997000
@ -257314,7 +257314,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a
CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000
CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
CVE-2024-41622,0,1,44ca2934b754519243a779c6615220559421c07f2d4e7de3fb58db6e584b3b36,2024-08-30T14:55:54.423000
CVE-2024-41622,0,0,44ca2934b754519243a779c6615220559421c07f2d4e7de3fb58db6e584b3b36,2024-08-30T14:55:54.423000
CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
@ -257385,7 +257385,7 @@ CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb11
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000
CVE-2024-41720,0,1,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000
@ -257479,7 +257479,7 @@ CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a46674
CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
CVE-2024-41888,0,0,551a193b56683c8a955974406454da46e806e6e58f5cbc2dcb8dc5dd231b91d3,2024-08-29T12:55:09.210000
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
CVE-2024-41889,0,1,c2f8146a4c074f06a28a6e2235a6e3d92ccee3a8823a7bd377c0c9b959c16c5c,2024-08-30T17:53:40.897000
CVE-2024-41890,0,0,a90af16c8c7558e5227ebbc511a4c71519b3a4532e07b0a451c0d8da1663fee0,2024-08-29T12:56:47.413000
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
CVE-2024-41903,0,0,67dddda11208425a9dbc345fc58604fc5d7cb0caf7e9b81aadfd0fc331e40c63,2024-08-14T18:39:21.207000
@ -257496,7 +257496,7 @@ CVE-2024-41913,0,0,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000
CVE-2024-41918,0,0,ff1e1fb0cfcc6b97a7cea1317502d0a3e9967697061e2f0c48808799a7489efd,2024-08-30T00:15:05.117000
CVE-2024-41918,0,1,444713f57f29ae6ab3503ccd6ce1c7bde4d2698bbfadab74cd1692649dedb241,2024-08-30T16:05:23.737000
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
@ -257874,7 +257874,7 @@ CVE-2024-42439,0,0,08f9e0083219c02517835f74d205a3e990d7afc9a56ebae8a3bd402fa7b88
CVE-2024-4244,0,0,0a1e4c7b4cff7996944f75b62aaefc0f51495a17918fe625b6507a3d9892e7a7,2024-06-04T19:20:33.593000
CVE-2024-42440,0,0,19ccc0e809e3e2bf1e830128a29110680f7fa87923d96851d116e1e89bcae87a,2024-08-28T23:59:01.537000
CVE-2024-42441,0,0,f25ce01d00bee15651b5d0ef3b027baaf54cad0dca0cb0ace6ef530480ea5aeb,2024-08-28T23:58:06.960000
CVE-2024-42447,0,0,5078c1ccaef6ae250b7b7b656b1c885fd621178e8f6f41f6a63c32726263e429,2024-08-05T12:41:45.957000
CVE-2024-42447,0,1,68027c21ffcefe32f56a7a559d44cc2a1c6b0b32c4ec80fa56a1f1b8e20a917b,2024-08-30T17:35:29.533000
CVE-2024-4245,0,0,bc150cb423e680075dcbfa7aff18f43429f7c6ca789bf05cb5f53de998c993ba,2024-06-04T19:20:33.693000
CVE-2024-42458,0,0,5dc7de7c18fc9a4762e6600de6bc88b5c8771baaff2409a2a19314905b1c968f,2024-08-07T16:35:17.090000
CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000
@ -258074,7 +258074,7 @@ CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f0
CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000
CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000
CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000
CVE-2024-42793,0,1,c34b0c01a33da3f3b96951729540996987faac6763a3b4211067000d740419d1,2024-08-30T15:56:51.510000
CVE-2024-42793,0,0,c34b0c01a33da3f3b96951729540996987faac6763a3b4211067000d740419d1,2024-08-30T15:56:51.510000
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
@ -258087,7 +258087,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
CVE-2024-42851,0,1,f841f745f513412557e0c00ae557a507c262bbcf9e2f6ddfb2d4220b405d360a,2024-08-30T15:30:44.113000
CVE-2024-42851,0,0,f841f745f513412557e0c00ae557a507c262bbcf9e2f6ddfb2d4220b405d360a,2024-08-30T15:30:44.113000
CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000
CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000
CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000
@ -258386,7 +258386,7 @@ CVE-2024-43406,0,0,854367aefb2456ec94d3be7f3dee319c12b7f5f1a1af5dbd89c34dcd70789
CVE-2024-43407,0,0,e2ea80f87c66143027da11cf79f2cd80121ef59cc1cf87c24a28fe2c518a474a,2024-08-23T16:20:42.363000
CVE-2024-43408,0,0,d4537cc05369b1073eab6be6b0c0270081103ca8bf402f8fafe9ed3f7a29471a,2024-08-21T12:30:33.697000
CVE-2024-43409,0,0,a42b7406eee825ee22fc12b5886825141398e49597504678e6e46efb8ce725f2,2024-08-26T18:31:26.197000
CVE-2024-4341,0,1,c1be2299b8a85166f5701f470f8a0c3853c6b802dab3cad3703461b748b378a9,2024-08-30T15:44:26.727000
CVE-2024-4341,0,0,c1be2299b8a85166f5701f470f8a0c3853c6b802dab3cad3703461b748b378a9,2024-08-30T15:44:26.727000
CVE-2024-43410,0,0,34c0de7d3aba2e2bf754c89b4a746899ed92baa2a863da3cba07091015a18558,2024-08-21T17:25:08.560000
CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c5063c5,2024-08-21T17:25:08.560000
CVE-2024-43414,0,0,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000
@ -258438,7 +258438,7 @@ CVE-2024-43782,0,0,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d
CVE-2024-43783,0,0,68cfe59aff11ea0ac165b5589cd2ccc9f899d9b23a7fe8b7accfeb70a176ce47,2024-08-27T18:33:14.247000
CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000
CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000
CVE-2024-43788,0,1,6f75ff333beaf8829a6a1bc6651ce3043a53e6a3c4b202b90d5574c9a5264bae,2024-08-30T15:13:21.340000
CVE-2024-43788,0,0,6f75ff333beaf8829a6a1bc6651ce3043a53e6a3c4b202b90d5574c9a5264bae,2024-08-30T15:13:21.340000
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000
CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000
@ -258446,7 +258446,7 @@ CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59d
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
CVE-2024-43805,0,1,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
@ -258578,8 +258578,8 @@ CVE-2024-43931,0,0,d74e610d5124f68f8bec4cb90dab68421bf7defe29841aa92d1066c54a657
CVE-2024-43934,0,0,02ae49237eb0ca3ddb69bb7c0c18623c302f35abdd4f5fc93e679bbccb4705a3,2024-08-30T13:00:05.390000
CVE-2024-43935,0,0,e264478e8dfe41ac236d9dd1e1917ef755cbbc7ac4a0fd933ae3529845ae8469,2024-08-30T13:00:05.390000
CVE-2024-43936,0,0,c3d56486fd2b8cfcea44bfd8e51042faa595caea22c6c1ac30db5d582f68982e,2024-08-30T13:00:05.390000
CVE-2024-43939,0,0,732edb5d83a185c1ff0679cde7caea1837ef16b9217770aff51844261e5dce67,2024-08-30T13:00:05.390000
CVE-2024-43940,0,0,2f2e305e339a2e6cfbb7c4d905d7e80e6712a317a468b4dddc205c3917f95623,2024-08-30T13:00:05.390000
CVE-2024-43939,0,1,d426ea6c624de2aac782301aee13dd37ea340c14d42e40cc8485be204e0f41b4,2024-08-30T16:29:15.177000
CVE-2024-43940,0,1,1c00f3798e1667265ee707181635deee289bf65cd84317a4bdc295f8b6b4065a,2024-08-30T16:27:22.270000
CVE-2024-43941,0,0,51da6628d50618fc8f152eebc9db91e71523891a7db90b265f812b78f3b13ead,2024-08-30T13:00:05.390000
CVE-2024-43942,0,0,e407f19e5fd9829011f6787f9c7691b398ead09a08db45a3953ea472df2a562a,2024-08-30T13:00:05.390000
CVE-2024-43943,0,0,3e393391698d09fd81d5d7be23db1feaee575a46747a1104ac77289691928f07,2024-08-30T13:00:05.390000
@ -258589,17 +258589,17 @@ CVE-2024-43947,0,0,edb3b36ddc37170b66cbc416c5321e1a097a5eee8071b3a104c96d4792d08
CVE-2024-43948,0,0,62da4ce69bd218a239dde32118aa73fdff38cb0b8d3274452c2e2a35eb6ccfc7,2024-08-30T13:00:05.390000
CVE-2024-43949,0,0,53cb787590ba7708354e80461e922b0cc2c1c65c512885ec8763c3e6ed5e1fb7,2024-08-30T13:00:05.390000
CVE-2024-4395,0,0,7eb8bb55518c25270e2cdb5da345e646a2437fce6bdd0ba1dda9f1e27539a52c,2024-07-03T02:07:30.800000
CVE-2024-43950,0,0,5dcee2167846f38650b3d090f4a0c9103e3c4a1e410765c04983b930548ca5c5,2024-08-30T13:00:05.390000
CVE-2024-43951,0,0,49964c0b7bf80dc4e8e6905f7ea49831ad0597f4604030a0e24dc1ad68f6cc34,2024-08-30T13:00:05.390000
CVE-2024-43952,0,0,8873b39785b32134b23b4d7dcc05271947a1b44e14c12829224434691047b82c,2024-08-30T13:00:05.390000
CVE-2024-43953,0,0,486651833eff44984b45841925bd08fd4a3dd26beb47ddf79f817bcbd72b5e8d,2024-08-30T13:00:05.390000
CVE-2024-43954,0,0,6608795c7257d6e02220fae7308a5949f52a183b99417ac6b6c9e3d7ac103720,2024-08-30T13:00:05.390000
CVE-2024-43955,0,0,50e08f0ae36f84c332d90222555687c8f5c3b715aa2776d89030e9054a3570e1,2024-08-30T13:00:05.390000
CVE-2024-43950,0,1,e5132b91dd15cac35c9308614d7196bb7ccaac4f082bdb23a9ebba21185c7e74,2024-08-30T16:20:26.173000
CVE-2024-43951,0,1,eebec757f62fed72f4a8ea8bbf15837fce42895dd78744d490c100a7ed47e1ba,2024-08-30T16:17:20.900000
CVE-2024-43952,0,1,2e8649a5292a35453d82489b6a0bd45c22add9f038806d90bd84b3869928be37,2024-08-30T16:16:50.360000
CVE-2024-43953,0,1,56af89b2bc051a2a3fa3c2433004559f7117fb9158a81b84197c9f70495951ba,2024-08-30T16:16:01.360000
CVE-2024-43954,0,1,76c216e4287ea3e21df8a5c42687b7643218c83658145d7a54c571f2f9829fc0,2024-08-30T16:24:37.460000
CVE-2024-43955,0,1,4ede473467403747b1a04930906c4ff684161a593463954ac3ec5bae261e5e01,2024-08-30T16:23:35.187000
CVE-2024-43957,0,0,58ecfe6fe3943775d4c6ef06e67cd4ae5d3c7397b5566e3b648b22f38e8b8fe6,2024-08-30T13:00:05.390000
CVE-2024-43958,0,0,0a63803aef631af335eb5495d2c89a2ed2078ddbce150957a088a76ee1e971e1,2024-08-30T13:00:05.390000
CVE-2024-43960,0,0,d4fe49466974e72c9189f1649edc829bafbb59db29327bd88076dd3f1488e630,2024-08-30T13:00:05.390000
CVE-2024-43958,0,1,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1b4b,2024-08-30T16:15:19.047000
CVE-2024-43960,0,1,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000
CVE-2024-43961,0,0,fc0c25e77def1081886110717c1745e96221babc8d9d376dd02221e26610d343,2024-08-30T13:00:05.390000
CVE-2024-43963,0,0,3f357b8e2df137098008e54ef730d46165e201ce25650fb33973b7ba954221ca,2024-08-30T13:00:05.390000
CVE-2024-43963,0,1,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000
CVE-2024-43964,0,0,bc32f4a153e6dcf4e86584279d8891537ac8aafde77ba6c4ee6c0bc4b7914cd2,2024-08-30T13:00:05.390000
CVE-2024-43965,0,0,08b6ad4a1a4b1ffdd93dbbd7fa720075997c0aeeaa32e6ecff18f58a8c42dd84,2024-08-30T13:00:05.390000
CVE-2024-43966,0,0,cd3d16dd9709908a4a64e6a13b6fef840bd6c4e6049b114619dc3ea375d7306a,2024-08-26T15:15:23.727000
@ -258616,7 +258616,7 @@ CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb
CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000
CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000
CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000
CVE-2024-44070,0,0,335509dea99ada6c9ff96f06f0e87dab6ba3af229752b80bde023da9415a33b1,2024-08-21T14:35:15.433000
CVE-2024-44070,0,1,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000
CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000
CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000
CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
@ -258634,16 +258634,16 @@ CVE-2024-4424,0,0,f0ec85c26b242f03f1dda01796c703344a9d3cb93681b5b37fa83e955b9558
CVE-2024-4425,0,0,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000
CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000
CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000
CVE-2024-4428,0,1,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000
CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000
CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000
CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000
CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000
CVE-2024-44340,0,1,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000
CVE-2024-44341,0,1,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000
CVE-2024-44342,0,1,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb76b2,2024-08-30T14:57:40.020000
CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000
CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000
CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb76b2,2024-08-30T14:57:40.020000
CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000
CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000
CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000
@ -258699,8 +258699,8 @@ CVE-2024-44717,0,0,dee9b73c7e1050c45e1039cf251f198a0d3363f43b50bb034142fe420de59
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44760,0,1,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
CVE-2024-44761,0,0,a7d79c4d2b06f52558db31c99909309cd5baa976e0824d4726ec990dfa036bf1,2024-08-29T13:25:27.537000
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
CVE-2024-44761,0,1,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
CVE-2024-44776,0,0,28ae5db6f882f425142c0c1059cbd5a1c8ad65f7a4cfef3ef61dc0e39bea3c2e,2024-08-30T13:00:05.390000
CVE-2024-44777,0,0,cde3cdcf6f920db7b620a51993a8b22bac61a970df2497f8ed04c8a930b1d684,2024-08-30T13:00:05.390000
@ -258725,10 +258725,12 @@ CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50a
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
CVE-2024-44913,0,0,b6a472d5fd19f3234cb94f535078ee5f4ccf42464ba38a6cbd2f0b0b0d56c911,2024-08-29T13:25:27.537000
CVE-2024-44914,0,0,cdab06c38600f9663e7e3d6a83c73bbea13a8eac91f638774262eedf9129b83e,2024-08-29T13:25:27.537000
CVE-2024-44915,0,0,189fc1c6cfc0d9d55a03d683dcd4ceecbf61c3a051a5df8bd60ce5a5dfbbadd4,2024-08-29T13:25:27.537000
CVE-2024-44919,0,0,faaee9efffcc723471cf86e5cf371ac1454f294b893a4a81dd04344d800c2658,2024-08-30T13:00:05.390000
CVE-2024-44913,0,1,332529f8a2f25e9795d6a65fec291670cc1d8fe0aef2e9fae357f99f95186d81,2024-08-30T16:01:54.347000
CVE-2024-44914,0,1,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d420b,2024-08-30T16:01:45.013000
CVE-2024-44915,0,1,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000
CVE-2024-44916,1,1,9d35622ab55f872b55ffb0fe1419e573ff503dcec49f4f29721a94b7337826c8,2024-08-30T17:35:03.740000
CVE-2024-44918,1,1,c269f5414e9ec700540eb87631d1afc6e1f303a3c98c1683843d9399d3448166,2024-08-30T17:15:15.290000
CVE-2024-44919,0,1,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
CVE-2024-44930,0,0,7742e471af6d813844c83bc1edc4d2c34bd92450c44640698d5e16549d2fbbfc,2024-08-30T13:00:05.390000
@ -258763,6 +258765,7 @@ CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f34
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45045,0,0,a2c6a8d3ca359aad7e3c010bad910cf2259709611515d3a05c1006324ee49723,2024-08-30T13:00:05.390000
CVE-2024-45046,0,0,4d7016da74eaf67c450dc439af799ed2952384706074b1964aaa74d9bd45c737,2024-08-29T13:25:27.537000
CVE-2024-45047,1,1,f1f70b99a45b1ff699473b32fa1ab6084fc42294cfde2486098e3639761a785a,2024-08-30T17:15:15.377000
CVE-2024-45048,0,0,f84a03b52c4e4737f004ef4638c6c48a715aa1051c897955680d1101538ffe4e,2024-08-29T13:25:27.537000
CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000
CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000
@ -258803,8 +258806,8 @@ CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000
CVE-2024-45232,0,0,d4de15e9cdd706de40ae41b45bc213dd1910cfd8415d1fe31e94c5badd27af4d,2024-08-29T20:36:58.797000
CVE-2024-45233,0,0,49264848eb534534c0d5039c251ddd4aaf30955736b61e8b6a30a4801c1454b4,2024-08-29T20:36:59.610000
CVE-2024-45232,0,1,d2eccd07147c0ab2f9f7e5560b5b1bac422f5ad79377d7ed727039bcaf25bbd4,2024-08-30T16:34:39.270000
CVE-2024-45233,0,1,5285670af66f459db0801c25719b83bc6fb78721d233b9411020bb578be83355,2024-08-30T16:33:56.720000
CVE-2024-45234,0,0,4b3eecbe75c64cf8d46066aeb4347cf8775538d743d35431815d363ef479920c,2024-08-27T15:45:44.560000
CVE-2024-45235,0,0,12ffac5ccf9101959e31fcf0cfbde69d544eaa4a6e68395ec661cd3f82a2da19,2024-08-26T17:35:17.953000
CVE-2024-45236,0,0,9f46d1e309d244d60318b2e583a075d74d8dfa3f46db84beb50215ce95ea0169,2024-08-27T15:48:05.687000
@ -258819,7 +258822,7 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d
CVE-2024-45256,0,0,4a4b83adefef92d16e6e4183f85729c0b386c1024d8d0fd2baaf64a1cf5545c2,2024-08-26T13:35:02.937000
CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000
CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000
CVE-2024-45264,0,1,822145f9a1da648532bc7a1b41e14edccb94fd2d8996f04c204c8fc97c8f117a,2024-08-30T15:02:34.610000
CVE-2024-45264,0,0,822145f9a1da648532bc7a1b41e14edccb94fd2d8996f04c204c8fc97c8f117a,2024-08-30T15:02:34.610000
CVE-2024-45265,0,0,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000
CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000
CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000
@ -258841,8 +258844,8 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000
CVE-2024-45435,0,0,4652d4250446605e4eb3dfcd7024eabc20200afac96221525daad6ab14c4bcf3,2024-08-29T20:37:00.450000
CVE-2024-45436,0,0,dd29dc79f84acfcf185623035902d59c21b78da8ec91dc1d2852d9d0983ed65b,2024-08-29T20:37:01.210000
CVE-2024-45435,0,1,5433f0f03bb0062f42648419a87874aef4d44b44ce06804d4bf8e499928756ec,2024-08-30T16:05:58.803000
CVE-2024-45436,0,1,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000
CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000
CVE-2024-45440,0,0,48f137caa1abb077b1075de2faba6a6806a147fc385fe9803d57e1539cd03295,2024-08-29T13:25:27.537000
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
@ -258852,8 +258855,8 @@ CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08e
CVE-2024-45488,0,0,a51189d35a08d4e93065317ae409e3cc6b796679c34f65f5440d918b8fe0bb24,2024-08-30T13:00:05.390000
CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde15796,2024-07-03T02:07:44.057000
CVE-2024-45490,0,0,6e2855e694873f311778105c33853c5a1aaaaf3146958c0e6ada3573a0d2b524,2024-08-30T13:00:05.390000
CVE-2024-45491,0,1,d50817a58309934ce1e6c9f069c18968451a3af67ad0b3f9c4ed58ff8571c85d,2024-08-30T14:35:09.057000
CVE-2024-45492,0,1,cab4c5ca84baf34dea16b84281c2356a238ac9571c230c2d937a4646809be15a,2024-08-30T14:35:09.790000
CVE-2024-45491,0,0,d50817a58309934ce1e6c9f069c18968451a3af67ad0b3f9c4ed58ff8571c85d,2024-08-30T14:35:09.057000
CVE-2024-45492,0,0,cab4c5ca84baf34dea16b84281c2356a238ac9571c230c2d937a4646809be15a,2024-08-30T14:35:09.790000
CVE-2024-4551,0,0,5eadeaa2a7f21f0b3297f45277617c137a52e984170b931f9145e745d378c040,2024-06-17T12:42:04.623000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
@ -259141,7 +259144,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
CVE-2024-4872,0,0,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
CVE-2024-4872,0,1,d3552ad5e455a2f03e0985e27ab9fdd410d5c0a63d6a88f9e1f6765e28d6bcca,2024-08-30T16:15:10.100000
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
@ -259670,7 +259673,7 @@ CVE-2024-5465,0,0,c54306dfcc71e50bcd77c603fadee0b02af76d4cc30340f017524a72c7deac
CVE-2024-5466,0,0,7210eb30821301ab6ac0b6aaa79a17e39c84346dbb1ec0b37d3f9aca66c7a349,2024-08-27T13:32:50.803000
CVE-2024-5467,0,0,d5f2177f9d3ea444dfbcd8018e7c02f38607b067be38c512aaf8da3b2751677c,2024-08-27T14:35:48.977000
CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000
CVE-2024-5469,0,1,2b1f02bc4b651b767de9138333ca1493d00343771be32540c7c4d36f10b2a10e,2024-08-30T14:15:16.703000
CVE-2024-5469,0,0,2b1f02bc4b651b767de9138333ca1493d00343771be32540c7c4d36f10b2a10e,2024-08-30T14:15:16.703000
CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000
CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000
CVE-2024-5472,0,0,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000
@ -259818,7 +259821,7 @@ CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda1
CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000
CVE-2024-5649,0,0,34e3eeab6e168b1c5f2adbcb96ea45c2ac0ef86ad5d890f401ea3f073a254f2e,2024-08-16T20:35:08.120000
CVE-2024-5650,0,0,c39b4a582c551c0a2a7178518ad417e8ac9a87e5b86c36cc6d93d2e99ad988c5,2024-06-17T12:42:04.623000
CVE-2024-5651,0,1,6054d1145665813088d11bcbaf4142da6b639bd5a41aba674876b0270b505add,2024-08-30T14:15:16.820000
CVE-2024-5651,0,0,6054d1145665813088d11bcbaf4142da6b639bd5a41aba674876b0270b505add,2024-08-30T14:15:16.820000
CVE-2024-5652,0,0,7e423119960d286a82f2194dff7590cb101783621bba898f5af7050faa75102a,2024-07-12T17:14:32.033000
CVE-2024-5653,0,0,b1d5d7ca6c03c0860bfa9c89a981cb1e40654b9c0dd686ee52416437c8a7183f,2024-07-25T12:45:19.830000
CVE-2024-5654,0,0,be6d98376b5bde79348830f6677e04bc437e5abfb9a06a2bd0a591f9c8d1c938,2024-06-10T02:52:08.267000
@ -260189,8 +260192,8 @@ CVE-2024-6113,0,0,0258a013a0633b4223d3b34fa713df1179bb149b5036cecf3e425f58a1718b
CVE-2024-6114,0,0,807e490413847463615484f6207707764c80caa646855a88799bba65a3d69870,2024-08-23T16:38:30.133000
CVE-2024-6115,0,0,15dd6157449ec10d31fd4366fb8ca14f8fe35af7e4b7d4c1bf3f3f7159a1a698,2024-08-23T02:20:09.017000
CVE-2024-6116,0,0,f2ada37f40e94dafdc5d43df86df5904a49741c82bcc90227e41dbb655a1d08c,2024-08-23T02:19:51.723000
CVE-2024-6117,0,0,945b820f6f991f5a73623e522c44ca579eef282abb0425df98e1503fa24d0166,2024-08-05T12:41:45.957000
CVE-2024-6118,0,0,f3ae8e44c8d6ad2d05743a03f110c1037996a141d851edbbf3b28f2880774027,2024-08-05T12:41:45.957000
CVE-2024-6117,0,1,d5912ee8b7e4ddbb2a8f1ef197795383d392b808369f9562b5d5244a004a10d9,2024-08-30T17:41:50.753000
CVE-2024-6118,0,1,1a4b8c8391abe6767f17dfe565807cd043bd462cdba8832490fc6733cc9b8f4a,2024-08-30T17:44:20.537000
CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187c6,2024-06-24T20:03:04.363000
CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000
CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000
@ -260263,6 +260266,7 @@ CVE-2024-6200,0,0,722d981d84658a736a5a6764f93f4a9ccec1590f7bef592a19ce39ecef9883
CVE-2024-6201,0,0,598d56b506e8c445cb59964b9db6d77d5a9f4c1b7b2ffecffa9033ad60685adc,2024-08-29T17:52:07.493000
CVE-2024-6202,0,0,247631a9e2647b82d3ccde2f575b6ac32697ff24a61656c143ef0145416ab9ec,2024-08-29T17:48:43.723000
CVE-2024-6203,0,0,3b9c553aeaabf6b65504ab651e97d9d81983015dea0894c7aa9459e33da609dc,2024-08-29T17:46:28.790000
CVE-2024-6204,1,1,8d55b27213dd98d84bdbd5358332480610be1b7252d205a38ede36b1412502b8,2024-08-30T17:15:15.610000
CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000
CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
@ -260282,7 +260286,7 @@ CVE-2024-6223,0,0,c2a5a51fdbbd77355d74c750a6e6733ae6781c6b296fb53463ed7d53ba9a33
CVE-2024-6224,0,0,254379a5da630d5f422fd8da5211494e4e22117328ba82ab9e812041fec1026b,2024-08-01T14:00:16.047000
CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000
CVE-2024-6226,0,0,ce2ab5c61eaa56df1ae1e99a9106ee57b45fa6f536c072cda0c4750b16109344,2024-08-01T14:00:16.260000
CVE-2024-6227,0,0,df3e7ada9854d1a1b8b7661eb1b8a664fd613a9b7a812c98d737a05bff8beff9,2024-08-07T12:26:17.497000
CVE-2024-6227,0,1,4dda552b45e491a3aea14a6a0cebc6297d597cc5b3fd65f2a3ad4f72b819801b,2024-08-30T16:15:10.203000
CVE-2024-6229,0,0,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000
CVE-2024-6230,0,0,bf151baddd2ddda2ffc17d61da16c35249c79c364900f3698bb671ab91ccc431,2024-08-01T22:15:41.963000
CVE-2024-6231,0,0,17c4018e99632a925bda52d838c86b1f2075d6f0c7798f87d32fed09cbff22a1,2024-08-01T14:00:16.470000
@ -260301,7 +260305,7 @@ CVE-2024-6251,0,0,4ff3c6977b6838552fca6fd96450148c0a810a0b49d59064a41fd5d7df8c39
CVE-2024-6252,0,0,f925951499780a86ba894fc39baf0f6088fcb6c4e2787ea242a732a2e35ea460,2024-06-26T19:15:14.383000
CVE-2024-6253,0,0,d70df9ffdc81f7d3511638a8a32373070f208c5646ec9496ca814b85bf15f7ca,2024-06-25T18:15:12
CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a35,2024-08-08T13:04:18.753000
CVE-2024-6255,0,0,af869f9f4d4795eaeb2f2001309a5d5a1a9aad353ed8763808ec7aaba59c9014,2024-08-27T13:30:55.460000
CVE-2024-6255,0,1,4b23bc0ba79484acd9ec84f5e33767095b874b70e803764459f9fd056777671c,2024-08-30T16:15:10.467000
CVE-2024-6256,0,0,cd0156365b21d4bea53ae3ad70dcec4b1c8c7fe2a610d4e79db68145fb523cc9,2024-07-12T16:53:35.083000
CVE-2024-6257,0,0,9068db2cec3557427b4184684513a4bf48773ad544b747d98a6b6caebef9018b,2024-06-25T18:50:42.040000
CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc3623e,2024-06-27T12:47:19.847000
@ -260363,14 +260367,14 @@ CVE-2024-6319,0,0,a7e6ba0611df1872f885f28b22290254a0a0617427fbf4cb3644f1333e4d6a
CVE-2024-6320,0,0,283f9bb36ccc5b92b087cc9c4a1fe708efc80654f72e1f9e7ff8264ce58552c9,2024-07-09T18:19:14.047000
CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced507d,2024-07-09T18:19:14.047000
CVE-2024-6322,0,0,8d7a1084476b1bbfe0beb3b2fb5fe7b67eda10da654967af54513f67a857c5e5,2024-08-21T12:30:33.697000
CVE-2024-6323,0,1,a8c029b32e829c43ccf3c11a8270c2ae0731a8026bd5838a4f5f1ead94546347,2024-08-30T14:15:16.947000
CVE-2024-6323,0,0,a8c029b32e829c43ccf3c11a8270c2ae0731a8026bd5838a4f5f1ead94546347,2024-08-30T14:15:16.947000
CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c00880,2024-07-16T18:00:02.110000
CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000
CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
CVE-2024-6329,0,0,86251ab842ffcb900239f67c839645a87676821122e9a881854a92c1e2f082f5,2024-08-23T17:01:34.227000
CVE-2024-6330,0,0,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90cd8,2024-08-19T16:35:30.907000
CVE-2024-6331,0,0,170e6a9ca8d17834b0d067352ac524c06575a24a7d50c9bc89357069533d125d,2024-08-20T19:55:35.153000
CVE-2024-6331,0,1,52c1c6ef5119330812f0b8f9d4c8f908510020273352e90ad354980012c782b6,2024-08-30T16:15:10.710000
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000
CVE-2024-6337,0,0,2e78350836fa8817ff4aec79c82f6f0f98d78739985b39708ec542654e5f48f4,2024-08-21T12:30:33.697000
@ -260559,7 +260563,7 @@ CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
CVE-2024-6595,0,1,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000
CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000
@ -260588,8 +260592,8 @@ CVE-2024-6627,0,0,c1ab91b855386d03fb23ec47d7ea95469618609ded94a66bedffee95371608
CVE-2024-6629,0,0,e7fb6a99ed3ad0ead40ca75ee8e19034c6248a18a082e5cb8e8eaa0368a38b0a,2024-08-14T19:26:41.113000
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
CVE-2024-6631,0,0,1e6b5531619b1da5a2d5ea58f6eb35ebd283fdf27dc23509e38939480091d853,2024-08-26T12:47:20.187000
CVE-2024-6632,0,1,ada138b2fbfd07ba035d896141eaa720e349f3be9aa07f06088ed0728152f096,2024-08-30T14:07:18.443000
CVE-2024-6633,0,1,afac48b93e561cf4f6db84286248ec51c5cf09c5c99b62a4cc541b38805f1970,2024-08-30T14:11:45.287000
CVE-2024-6632,0,0,ada138b2fbfd07ba035d896141eaa720e349f3be9aa07f06088ed0728152f096,2024-08-30T14:07:18.443000
CVE-2024-6633,0,0,afac48b93e561cf4f6db84286248ec51c5cf09c5c99b62a4cc541b38805f1970,2024-08-30T14:11:45.287000
CVE-2024-6634,0,0,20e842ed204ff1f080594226c009c0585274acd37661b69fb1d6603728f53ffe,2024-07-29T14:12:08.783000
CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84fff,2024-07-22T13:00:31.330000
CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000
@ -260698,7 +260702,7 @@ CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b970252070
CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e844e,2024-08-21T06:15:09.290000
CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
CVE-2024-6783,0,1,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000
CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
@ -260845,6 +260849,7 @@ CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c8
CVE-2024-7032,0,0,3560b48f27bfff69db1e59c5bf5a8bf1115ef48945752de496fcc7dee3f42d1d,2024-08-21T12:30:33.697000
CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000
CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000
CVE-2024-7051,1,1,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
@ -261223,8 +261228,8 @@ CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198
CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000
CVE-2024-7603,0,0,026c301c8508bb2890d37936199245036e5a5160d5195c848eb9252477eef559,2024-08-23T16:36:28.327000
CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df51,2024-08-23T16:37:09.107000
CVE-2024-7606,0,1,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000
CVE-2024-7607,0,1,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000
CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000
CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000
CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000
CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
@ -261291,6 +261296,7 @@ CVE-2024-7706,0,0,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16
CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000
CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000
CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000
CVE-2024-7712,1,1,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000
@ -261459,6 +261465,7 @@ CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
CVE-2024-8041,0,0,530afb8d20f30d401c1d7f8908c798a45edf30b2f924035dda7c4300ee7ef6f4,2024-08-23T16:18:28.547000
CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000
CVE-2024-8064,1,1,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000
CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000
CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
CVE-2024-8073,0,0,9b209032e2ee03e5591085b2e1095a0cad7be8b64d09d59daa7771a73ff32c4b,2024-08-26T12:47:20.187000
@ -261523,13 +261530,13 @@ CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b
CVE-2024-8181,0,0,118bc11b2b4900ec5fff0bf86d3a0383942e5b4916d0cc73cb03ffe17b7de9f2,2024-08-30T13:53:29.953000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8193,0,1,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
CVE-2024-8194,0,0,ac19fba88b406af144043fab3f5eab659bb55ee6761ad0917efa47742f410e15,2024-08-29T20:37:10.630000
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
CVE-2024-8194,0,1,0e377807b4cb936d43f2e66a722c2d573026df321eb087fd34789423400e78c7,2024-08-30T16:34:53.210000
CVE-2024-8195,0,0,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000
CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000
CVE-2024-8198,0,1,ae88aaa83fc11075d32a275c58ebf5badbfadaf84787111050f38bf28c955c58,2024-08-30T15:52:02.687000
CVE-2024-8199,0,1,7b5202bc541243d8e740bbcd5073b5b7be00bce7ffd00083423898ed42012b72,2024-08-30T15:04:28.803000
CVE-2024-8200,0,1,94c62dce4d246efe9142b24670f17ae1bfd93e135c6c83ca7322f2e39d21a126,2024-08-30T15:08:24.643000
CVE-2024-8198,0,0,ae88aaa83fc11075d32a275c58ebf5badbfadaf84787111050f38bf28c955c58,2024-08-30T15:52:02.687000
CVE-2024-8199,0,0,7b5202bc541243d8e740bbcd5073b5b7be00bce7ffd00083423898ed42012b72,2024-08-30T15:04:28.803000
CVE-2024-8200,0,0,94c62dce4d246efe9142b24670f17ae1bfd93e135c6c83ca7322f2e39d21a126,2024-08-30T15:08:24.643000
CVE-2024-8207,0,0,8c9895649b6f3ddbe54a742e7758748700be0de26d40f4212a560e46ba28d1e1,2024-08-30T13:07:46.613000
CVE-2024-8208,0,0,3f393cbce0f1d113de710d532681141cada8ef6f9dabc882bcef6792a38ba6dd,2024-08-29T17:27:02.397000
CVE-2024-8209,0,0,011c93b978693cad1f1840a0255528b9ea24513efb93d121a5e919ef5bade0bf,2024-08-29T17:23:42.873000
@ -261555,16 +261562,17 @@ CVE-2024-8229,0,0,b4e82f248689c551a8c2d56510132af8816aa6c16d8f7b5aa18c38850899c5
CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb4e,2024-08-29T00:08:24.643000
CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
CVE-2024-8250,0,0,74fb86f8fe2035c18dd497ff04e870378212b13108551159d2a1c3008bad35b8,2024-08-29T13:25:27.537000
CVE-2024-8235,1,1,0a54a81474e5aee1b522fe1f7adbdd0c8755450d63ea53ebfd6d437def338295,2024-08-30T17:15:15.783000
CVE-2024-8250,0,1,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
CVE-2024-8252,0,0,f4e1dbfa0b6d48720eeed9955e08877eeab027a9e95da449606e54f658411a7b,2024-08-30T13:00:05.390000
CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
CVE-2024-8260,0,0,f101d670db69158c5137b9cf48a8e7cb0ec0fce3493e5bb1cee914b2ce3bf746,2024-08-30T13:15:12.347000
CVE-2024-8274,0,0,2e72bc43a203eeb2ca1fcfae541f54785b8e5b3521a9432105d2a793d09a50c0,2024-08-30T13:00:05.390000
CVE-2024-8294,0,1,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000
CVE-2024-8295,0,1,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000
CVE-2024-8296,0,1,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000
CVE-2024-8297,0,1,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000
CVE-2024-8301,0,1,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000
CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000
CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000
CVE-2024-8297,0,0,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000
CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
CVE-2024-8302,0,0,bda50b555854cd31882c0ef2167f779bd3ff1746a67f4e225a03fe8a32f42f3f,2024-08-30T13:00:05.390000
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
CVE-2024-8304,0,0,02fe3479f6e17fb07e472eabe123127bcfa4991aa0aa38b065a739eef0a9393c,2024-08-30T13:00:05.390000
@ -261578,9 +261586,13 @@ CVE-2024-8332,0,0,fd3412423441f0861e5abc670422141a85b6dd6226a10ba7ddbbe277f10d60
CVE-2024-8333,0,0,6f1ea39c4f9d2633b88ba89972fd9ac57009b75876255dbdb47a9abfdb00a2be,2024-08-30T06:15:05.577000
CVE-2024-8334,0,0,56add0acfdbbbc32d47b30be9758fffde7851e815211184cb90be071dc7a30a3,2024-08-30T13:15:12.587000
CVE-2024-8335,0,0,35650854e0043a380afe9fb8312433f837d6652c9df3661d058dac021b52b290,2024-08-30T13:15:13.103000
CVE-2024-8336,1,1,eaead2264f253b84d864af9faf927dcd685bb56b3ed81d74db3d5cb877fd2047,2024-08-30T14:15:17.840000
CVE-2024-8337,1,1,ad9482cb832e8390add2705561b5fdd17032f9e6f9c92626adedb2d4bb2265fd,2024-08-30T14:15:18.297000
CVE-2024-8338,1,1,834d33b33067d3480ef10d62893e58a6036b3c2ffc4c06acca37e9736fceaae9,2024-08-30T15:15:19.973000
CVE-2024-8339,1,1,4ed6ada317f3a70da083604c7a00f5fb95deb7a091b1dbf1025e0e9cf02ddcb8,2024-08-30T15:15:20.453000
CVE-2024-8340,1,1,704ecf5af235a98587ea2c8151afe4c231ebf634efb263f92476eb538836232c,2024-08-30T15:15:20.903000
CVE-2024-8341,1,1,f55dd9e1356807e4ab4994d2c62c5ad3cff3007eaadbf27aee274c7155b25b5e,2024-08-30T15:15:21.340000
CVE-2024-8336,0,0,eaead2264f253b84d864af9faf927dcd685bb56b3ed81d74db3d5cb877fd2047,2024-08-30T14:15:17.840000
CVE-2024-8337,0,0,ad9482cb832e8390add2705561b5fdd17032f9e6f9c92626adedb2d4bb2265fd,2024-08-30T14:15:18.297000
CVE-2024-8338,0,0,834d33b33067d3480ef10d62893e58a6036b3c2ffc4c06acca37e9736fceaae9,2024-08-30T15:15:19.973000
CVE-2024-8339,0,0,4ed6ada317f3a70da083604c7a00f5fb95deb7a091b1dbf1025e0e9cf02ddcb8,2024-08-30T15:15:20.453000
CVE-2024-8340,0,0,704ecf5af235a98587ea2c8151afe4c231ebf634efb263f92476eb538836232c,2024-08-30T15:15:20.903000
CVE-2024-8341,0,0,f55dd9e1356807e4ab4994d2c62c5ad3cff3007eaadbf27aee274c7155b25b5e,2024-08-30T15:15:21.340000
CVE-2024-8342,1,1,eee880c20acbf22e832a8e4e3c41b685bf26cc008b877c369a7374c41d1faf05,2024-08-30T16:15:12.537000
CVE-2024-8343,1,1,e843e77336a59dacd806ba78c994483621bcb7bb8da20f092918bb15b9c7f48d,2024-08-30T16:15:13.037000
CVE-2024-8344,1,1,86f7115343a46e52a7e5759eaf147cdf5383a02ca6bdd3e053a1fc43de84761f,2024-08-30T17:15:16.510000
CVE-2024-8345,1,1,64e0a45eab2d63ed1ca49430f715da68fb3efa7fec84d2122cc6f0b48b771218,2024-08-30T17:15:16.937000

Can't render this file because it is too large.