Auto-Update: 2024-07-29T23:55:17.408919+00:00

This commit is contained in:
cad-safe-bot 2024-07-29 23:58:11 +00:00
parent 064d78fdcf
commit 4389ef6f66
96 changed files with 2943 additions and 110 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27952",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.157",
"lastModified": "2023-07-27T04:15:19.543",
"lastModified": "2024-07-29T22:15:02.630",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -72,6 +72,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-38709",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.047",
"lastModified": "2024-06-10T17:16:12.647",
"lastModified": "2024-07-29T22:15:02.800",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58."
},
{
"lang": "es",
@ -44,6 +44,10 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/",
"source": "security@apache.org"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38823",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-20T20:15:07.357",
"lastModified": "2023-11-28T22:02:33.013",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-29T22:15:03.200",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -190,12 +190,8 @@
],
"references": [
{
"url": "https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
"url": "https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2023-38823/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45249",
"sourceIdentifier": "security@acronis.com",
"published": "2024-07-24T14:15:04.867",
"lastModified": "2024-07-26T12:48:15.370",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-29T23:15:09.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -136,6 +136,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/",
"source": "security@acronis.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52356",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-25T20:15:39.063",
"lastModified": "2024-03-11T13:15:52.753",
"lastModified": "2024-07-29T22:15:03.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -153,6 +153,38 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214116",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214117",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214122",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214123",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214124",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6277",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-24T19:15:07.643",
"lastModified": "2024-01-19T16:15:11.057",
"lastModified": "2024-07-29T22:15:03.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -186,6 +186,38 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240119-0002/",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214116",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214117",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214122",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214123",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214124",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2004",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-03-27T08:15:41.173",
"lastModified": "2024-07-03T01:52:57.560",
"lastModified": "2024-07-29T22:15:04.373",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,18 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240524-0006/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-23261",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.037",
"lastModified": "2024-07-29T23:15:10.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.8. An attacker may be able to read information belonging to another user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23296",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-05T20:16:01.553",
"lastModified": "2024-07-03T01:47:43.840",
"lastModified": "2024-07-29T22:15:03.750",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-03-06",
@ -225,6 +225,10 @@
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2379",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-03-27T08:15:41.230",
"lastModified": "2024-06-10T16:15:13.173",
"lastModified": "2024-07-29T22:15:04.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -36,6 +36,18 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240531-0001/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2398",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-03-27T08:15:41.283",
"lastModified": "2024-07-03T01:53:12.523",
"lastModified": "2024-07-29T22:15:04.563",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,18 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240503-0009/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24795",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.663",
"lastModified": "2024-06-10T18:15:27.003",
"lastModified": "2024-07-29T22:15:04.000",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -48,6 +48,10 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/",
"source": "security@apache.org"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2466",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-03-27T08:15:41.343",
"lastModified": "2024-05-03T13:15:21.893",
"lastModified": "2024-07-29T22:15:04.697",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -36,6 +36,18 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240503-0010/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27316",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.720",
"lastModified": "2024-07-22T09:15:04.603",
"lastModified": "2024-07-29T22:15:04.113",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -136,6 +136,10 @@
"Release Notes"
]
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "security@apache.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/03/16",
"source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27804",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:04.033",
"lastModified": "2024-07-03T01:50:51.930",
"lastModified": "2024-07-29T22:15:04.233",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -99,6 +99,10 @@
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214123",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27809",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.110",
"lastModified": "2024-07-29T23:15:10.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2024-27823",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.170",
"lastModified": "2024-07-29T23:15:10.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-27826",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.240",
"lastModified": "2024-07-29T23:15:10.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27853",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.297",
"lastModified": "2024-07-29T23:15:10.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4. A maliciously crafted ZIP archive may bypass Gatekeeper checks."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27862",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.363",
"lastModified": "2024-07-29T23:15:10.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6. Enabling Lockdown Mode while setting up a Mac may cause FileVault to become unexpectedly disabled."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-27863",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.423",
"lastModified": "2024-07-29T23:15:10.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to determine kernel memory layout."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-27871",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.490",
"lastModified": "2024-07-29T23:15:10.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27872",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.557",
"lastModified": "2024-07-29T23:15:10.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.6. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-27873",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.620",
"lastModified": "2024-07-29T23:15:10.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing a maliciously crafted video file may lead to unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-27877",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.690",
"lastModified": "2024-07-29T23:15:10.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Processing a maliciously crafted file may lead to a denial-of-service or potentially disclose memory contents."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27878",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.747",
"lastModified": "2024-07-29T23:15:10.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6. An app with root privileges may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-27881",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.807",
"lastModified": "2024-07-29T23:15:10.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access information about a user\u2019s contacts."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-27882",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.877",
"lastModified": "2024-07-29T23:15:10.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-27883",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.940",
"lastModified": "2024-07-29T23:15:10.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-27884",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.010",
"lastModified": "2024-07-29T23:15:11.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with a new entitlement. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, visionOS 1.2, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27886",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.067",
"lastModified": "2024-07-29T23:15:11.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sonoma 14.4. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27887",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.127",
"lastModified": "2024-07-29T23:15:11.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-27888",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.183",
"lastModified": "2024-07-29T23:15:11.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Sonoma 14.4. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-3219",
"sourceIdentifier": "cna@python.org",
"published": "2024-07-29T22:15:04.970",
"lastModified": "2024-07-29T22:15:04.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe\n \u201csocket\u201d module provides a pure-Python fallback to the \nsocket.socketpair() function for platforms that don\u2019t support AF_UNIX, \nsuch as Windows. This pure-Python implementation uses AF_INET or \nAF_INET6 to create a local connected pair of sockets. The connection \nbetween the two sockets was not verified before passing the two sockets \nback to the user, which leaves the server socket vulnerable to a \nconnection race from a malicious local peer.\n\nPlatforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/python/cpython/issues/122133",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/pull/122134",
"source": "cna@python.org"
},
{
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/",
"source": "cna@python.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-38271",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-06-26T16:15:11.560",
"lastModified": "2024-06-27T12:47:19.847",
"lastModified": "2024-07-29T22:15:04.757",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quickshare or above"
"value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quick Share or above"
},
{
"lang": "es",
@ -74,6 +74,10 @@
}
],
"references": [
{
"url": "https://github.com/google/nearby/pull/2402",
"source": "cve-coordination@google.com"
},
{
"url": "https://github.com/google/nearby/pull/2433",
"source": "cve-coordination@google.com"
@ -81,6 +85,10 @@
{
"url": "https://github.com/google/nearby/pull/2435",
"source": "cve-coordination@google.com"
},
{
"url": "https://github.com/google/nearby/pull/2589",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-38272",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-06-26T16:15:11.733",
"lastModified": "2024-06-27T12:47:19.847",
"lastModified": "2024-07-29T22:15:04.883",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists a vulnerability in Quickshare/Nearby where an attacker can bypass the accept file dialog on QuickShare Windows.\u00a0Normally in QuickShare Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quickshare or above"
"value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can bypass the accept file dialog on Quick Share Windows.\u00a0Normally in Quick Share Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quick Share or above"
},
{
"lang": "es",

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-40774",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.250",
"lastModified": "2024-07-29T23:15:11.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. An app may be able to bypass Privacy preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40775",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.317",
"lastModified": "2024-07-29T23:15:11.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to leak sensitive user information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40776",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.387",
"lastModified": "2024-07-29T23:15:11.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-40777",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.457",
"lastModified": "2024-07-29T23:15:11.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40778",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.527",
"lastModified": "2024-07-29T23:15:11.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. Photos in the Hidden Photos Album may be viewed without authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40779",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.590",
"lastModified": "2024-07-29T23:15:11.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40780",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.660",
"lastModified": "2024-07-29T23:15:11.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40781",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.727",
"lastModified": "2024-07-29T23:15:11.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40782",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.790",
"lastModified": "2024-07-29T23:15:11.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40783",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.853",
"lastModified": "2024-07-29T23:15:11.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious application may be able to bypass Privacy preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40784",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.923",
"lastModified": "2024-07-29T23:15:11.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40785",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:11.997",
"lastModified": "2024-07-29T23:15:11.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to a cross site scripting attack."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40786",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.070",
"lastModified": "2024-07-29T23:15:12.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view sensitive user information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-40787",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.133",
"lastModified": "2024-07-29T23:15:12.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2024-40788",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.200",
"lastModified": "2024-07-29T23:15:12.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to cause unexpected system shutdown."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40789",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.270",
"lastModified": "2024-07-29T23:15:12.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-40793",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.337",
"lastModified": "2024-07-29T23:15:12.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40794",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.410",
"lastModified": "2024-07-29T23:15:12.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, Safari 17.6. Private Browsing tabs may be accessed without authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40795",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.477",
"lastModified": "2024-07-29T23:15:12.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved data protection. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to read sensitive location information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40796",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.540",
"lastModified": "2024-07-29T23:15:12.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Private browsing may leak some browsing history."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40798",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.600",
"lastModified": "2024-07-29T23:15:12.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to read Safari's browsing history."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2024-40799",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.667",
"lastModified": "2024-07-29T23:15:12.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40800",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.743",
"lastModified": "2024-07-29T23:15:12.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An input validation issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40802",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.810",
"lastModified": "2024-07-29T23:15:12.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40803",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.873",
"lastModified": "2024-07-29T23:15:12.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An attacker may be able to cause unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40804",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.947",
"lastModified": "2024-07-29T23:15:12.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. A malicious application may be able to access private information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40805",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.017",
"lastModified": "2024-07-29T23:15:13.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2024-40806",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.083",
"lastModified": "2024-07-29T23:15:13.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40807",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.147",
"lastModified": "2024-07-29T23:15:13.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40809",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.207",
"lastModified": "2024-07-29T23:15:13.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40811",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.273",
"lastModified": "2024-07-29T23:15:13.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-40812",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.330",
"lastModified": "2024-07-29T23:15:13.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214123",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40813",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.397",
"lastModified": "2024-07-29T23:15:13.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lock screen issue was addressed with improved state management. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6. An attacker with physical access may be able to use Siri to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40814",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.460",
"lastModified": "2024-07-29T23:15:13.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6. An app may be able to bypass Privacy preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-40815",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.523",
"lastModified": "2024-07-29T23:15:13.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40816",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.583",
"lastModified": "2024-07-29T23:15:13.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to cause unexpected system shutdown."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40817",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.647",
"lastModified": "2024-07-29T23:15:13.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved UI handling. This issue is fixed in macOS Sonoma 14.6, Safari 17.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Visiting a website that frames malicious content may lead to UI spoofing."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214121",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-40818",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.703",
"lastModified": "2024-07-29T23:15:13.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An attacker with physical access may be able to use Siri to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40821",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.770",
"lastModified": "2024-07-29T23:15:13.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Third party app extensions may not receive the correct sandbox restrictions."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40822",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.840",
"lastModified": "2024-07-29T23:15:13.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. An attacker with physical access to a device may be able to access contacts from the lock screen."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40823",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.920",
"lastModified": "2024-07-29T23:15:13.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40824",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.990",
"lastModified": "2024-07-29T23:15:13.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40827",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.067",
"lastModified": "2024-07-29T23:15:14.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40828",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.130",
"lastModified": "2024-07-29T23:15:14.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious app may be able to gain root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40829",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.193",
"lastModified": "2024-07-29T23:15:14.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view restricted content from the lock screen."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40832",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.257",
"lastModified": "2024-07-29T23:15:14.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to view a contact's phone number in system logs."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40833",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.333",
"lastModified": "2024-07-29T23:15:14.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-40834",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.413",
"lastModified": "2024-07-29T23:15:14.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to bypass sensitive Shortcuts app settings."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-40835",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.487",
"lastModified": "2024-07-29T23:15:14.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to use sensitive data with certain actions without prompting the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214118",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-40836",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.570",
"lastModified": "2024-07-29T23:15:14.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. A shortcut may be able to use sensitive data with certain actions without prompting the user."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214116",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4879",
"sourceIdentifier": "psirt@servicenow.com",
"published": "2024-07-10T17:15:12.117",
"lastModified": "2024-07-11T22:15:02.260",
"lastModified": "2024-07-29T23:15:14.650",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -103,6 +103,10 @@
{
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154",
"source": "psirt@servicenow.com"
},
{
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit",
"source": "psirt@servicenow.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5217",
"sourceIdentifier": "psirt@servicenow.com",
"published": "2024-07-10T17:15:12.373",
"lastModified": "2024-07-11T22:15:02.647",
"lastModified": "2024-07-29T23:15:14.807",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -103,6 +103,10 @@
{
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313",
"source": "psirt@servicenow.com"
},
{
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit",
"source": "psirt@servicenow.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6387",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-01T13:15:06.467",
"lastModified": "2024-07-29T09:15:02.853",
"lastModified": "2024-07-29T22:15:05.043",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -896,6 +896,18 @@
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214118",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214119",
"source": "secalert@redhat.com"
},
{
"url": "https://support.apple.com/kb/HT214120",
"source": "secalert@redhat.com"
},
{
"url": "https://ubuntu.com/security/CVE-2024-6387",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7248",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-07-29T22:15:05.553",
"lastModified": "2024-07-29T22:15:05.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comodo Internet Security Pro Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the update mechanism. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-19055."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-953/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7249",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-07-29T22:15:05.817",
"lastModified": "2024-07-29T22:15:05.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comodo Firewall Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the application to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21794."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-954/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7250",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-07-29T22:15:06.100",
"lastModified": "2024-07-29T22:15:06.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22829."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-955/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7251",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-07-29T22:15:06.283",
"lastModified": "2024-07-29T22:15:06.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22832."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-956/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7252",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-07-29T22:15:06.497",
"lastModified": "2024-07-29T22:15:06.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22831."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-957/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-29T22:00:16.610489+00:00
2024-07-29T23:55:17.408919+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-29T21:15:12.047000+00:00
2024-07-29T23:15:14.807000+00:00
```
### Last Data Feed Release
@ -33,47 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
258335
258410
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `75`
- [CVE-2017-3755](CVE-2017/CVE-2017-37xx/CVE-2017-3755.json) (`2024-07-29T21:15:10.993`)
- [CVE-2017-3766](CVE-2017/CVE-2017-37xx/CVE-2017-3766.json) (`2024-07-29T21:15:11.060`)
- [CVE-2017-3769](CVE-2017/CVE-2017-37xx/CVE-2017-3769.json) (`2024-07-29T21:15:11.107`)
- [CVE-2019-19759](CVE-2019/CVE-2019-197xx/CVE-2019-19759.json) (`2024-07-29T20:15:02.963`)
- [CVE-2019-19760](CVE-2019/CVE-2019-197xx/CVE-2019-19760.json) (`2024-07-29T20:15:03.067`)
- [CVE-2019-19761](CVE-2019/CVE-2019-197xx/CVE-2019-19761.json) (`2024-07-29T20:15:03.143`)
- [CVE-2019-6162](CVE-2019/CVE-2019-61xx/CVE-2019-6162.json) (`2024-07-29T21:15:11.167`)
- [CVE-2019-6164](CVE-2019/CVE-2019-61xx/CVE-2019-6164.json) (`2024-07-29T21:15:11.227`)
- [CVE-2019-6174](CVE-2019/CVE-2019-61xx/CVE-2019-6174.json) (`2024-07-29T21:15:11.280`)
- [CVE-2019-6185](CVE-2019/CVE-2019-61xx/CVE-2019-6185.json) (`2024-07-29T21:15:11.337`)
- [CVE-2022-4038](CVE-2022/CVE-2022-40xx/CVE-2022-4038.json) (`2024-07-29T20:15:03.317`)
- [CVE-2022-48185](CVE-2022/CVE-2022-481xx/CVE-2022-48185.json) (`2024-07-29T20:15:03.250`)
- [CVE-2023-40396](CVE-2023/CVE-2023-403xx/CVE-2023-40396.json) (`2024-07-29T21:15:11.453`)
- [CVE-2023-40398](CVE-2023/CVE-2023-403xx/CVE-2023-40398.json) (`2024-07-29T21:15:11.537`)
- [CVE-2023-42918](CVE-2023/CVE-2023-429xx/CVE-2023-42918.json) (`2024-07-29T21:15:11.610`)
- [CVE-2023-42925](CVE-2023/CVE-2023-429xx/CVE-2023-42925.json) (`2024-07-29T21:15:11.670`)
- [CVE-2023-42943](CVE-2023/CVE-2023-429xx/CVE-2023-42943.json) (`2024-07-29T21:15:11.740`)
- [CVE-2023-42948](CVE-2023/CVE-2023-429xx/CVE-2023-42948.json) (`2024-07-29T21:15:11.803`)
- [CVE-2023-42949](CVE-2023/CVE-2023-429xx/CVE-2023-42949.json) (`2024-07-29T21:15:11.867`)
- [CVE-2023-42957](CVE-2023/CVE-2023-429xx/CVE-2023-42957.json) (`2024-07-29T21:15:11.930`)
- [CVE-2023-42958](CVE-2023/CVE-2023-429xx/CVE-2023-42958.json) (`2024-07-29T21:15:11.983`)
- [CVE-2023-42959](CVE-2023/CVE-2023-429xx/CVE-2023-42959.json) (`2024-07-29T21:15:12.047`)
- [CVE-2024-6620](CVE-2024/CVE-2024-66xx/CVE-2024-6620.json) (`2024-07-29T20:15:03.910`)
- [CVE-2024-40811](CVE-2024/CVE-2024-408xx/CVE-2024-40811.json) (`2024-07-29T23:15:13.273`)
- [CVE-2024-40812](CVE-2024/CVE-2024-408xx/CVE-2024-40812.json) (`2024-07-29T23:15:13.330`)
- [CVE-2024-40813](CVE-2024/CVE-2024-408xx/CVE-2024-40813.json) (`2024-07-29T23:15:13.397`)
- [CVE-2024-40814](CVE-2024/CVE-2024-408xx/CVE-2024-40814.json) (`2024-07-29T23:15:13.460`)
- [CVE-2024-40815](CVE-2024/CVE-2024-408xx/CVE-2024-40815.json) (`2024-07-29T23:15:13.523`)
- [CVE-2024-40816](CVE-2024/CVE-2024-408xx/CVE-2024-40816.json) (`2024-07-29T23:15:13.583`)
- [CVE-2024-40817](CVE-2024/CVE-2024-408xx/CVE-2024-40817.json) (`2024-07-29T23:15:13.647`)
- [CVE-2024-40818](CVE-2024/CVE-2024-408xx/CVE-2024-40818.json) (`2024-07-29T23:15:13.703`)
- [CVE-2024-40821](CVE-2024/CVE-2024-408xx/CVE-2024-40821.json) (`2024-07-29T23:15:13.770`)
- [CVE-2024-40822](CVE-2024/CVE-2024-408xx/CVE-2024-40822.json) (`2024-07-29T23:15:13.840`)
- [CVE-2024-40823](CVE-2024/CVE-2024-408xx/CVE-2024-40823.json) (`2024-07-29T23:15:13.920`)
- [CVE-2024-40824](CVE-2024/CVE-2024-408xx/CVE-2024-40824.json) (`2024-07-29T23:15:13.990`)
- [CVE-2024-40827](CVE-2024/CVE-2024-408xx/CVE-2024-40827.json) (`2024-07-29T23:15:14.067`)
- [CVE-2024-40828](CVE-2024/CVE-2024-408xx/CVE-2024-40828.json) (`2024-07-29T23:15:14.130`)
- [CVE-2024-40829](CVE-2024/CVE-2024-408xx/CVE-2024-40829.json) (`2024-07-29T23:15:14.193`)
- [CVE-2024-40832](CVE-2024/CVE-2024-408xx/CVE-2024-40832.json) (`2024-07-29T23:15:14.257`)
- [CVE-2024-40833](CVE-2024/CVE-2024-408xx/CVE-2024-40833.json) (`2024-07-29T23:15:14.333`)
- [CVE-2024-40834](CVE-2024/CVE-2024-408xx/CVE-2024-40834.json) (`2024-07-29T23:15:14.413`)
- [CVE-2024-40835](CVE-2024/CVE-2024-408xx/CVE-2024-40835.json) (`2024-07-29T23:15:14.487`)
- [CVE-2024-40836](CVE-2024/CVE-2024-408xx/CVE-2024-40836.json) (`2024-07-29T23:15:14.570`)
- [CVE-2024-7248](CVE-2024/CVE-2024-72xx/CVE-2024-7248.json) (`2024-07-29T22:15:05.553`)
- [CVE-2024-7249](CVE-2024/CVE-2024-72xx/CVE-2024-7249.json) (`2024-07-29T22:15:05.817`)
- [CVE-2024-7250](CVE-2024/CVE-2024-72xx/CVE-2024-7250.json) (`2024-07-29T22:15:06.100`)
- [CVE-2024-7251](CVE-2024/CVE-2024-72xx/CVE-2024-7251.json) (`2024-07-29T22:15:06.283`)
- [CVE-2024-7252](CVE-2024/CVE-2024-72xx/CVE-2024-7252.json) (`2024-07-29T22:15:06.497`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `19`
- [CVE-2024-38773](CVE-2024/CVE-2024-387xx/CVE-2024-38773.json) (`2024-07-29T20:07:57.597`)
- [CVE-2024-38788](CVE-2024/CVE-2024-387xx/CVE-2024-38788.json) (`2024-07-29T20:19:47.727`)
- [CVE-2024-5861](CVE-2024/CVE-2024-58xx/CVE-2024-5861.json) (`2024-07-29T20:32:37.267`)
- [CVE-2024-6094](CVE-2024/CVE-2024-60xx/CVE-2024-6094.json) (`2024-07-29T20:20:51.257`)
- [CVE-2024-6836](CVE-2024/CVE-2024-68xx/CVE-2024-6836.json) (`2024-07-29T20:20:30.867`)
- [CVE-2023-27952](CVE-2023/CVE-2023-279xx/CVE-2023-27952.json) (`2024-07-29T22:15:02.630`)
- [CVE-2023-38709](CVE-2023/CVE-2023-387xx/CVE-2023-38709.json) (`2024-07-29T22:15:02.800`)
- [CVE-2023-38823](CVE-2023/CVE-2023-388xx/CVE-2023-38823.json) (`2024-07-29T22:15:03.200`)
- [CVE-2023-45249](CVE-2023/CVE-2023-452xx/CVE-2023-45249.json) (`2024-07-29T23:15:09.877`)
- [CVE-2023-52356](CVE-2023/CVE-2023-523xx/CVE-2023-52356.json) (`2024-07-29T22:15:03.340`)
- [CVE-2023-6277](CVE-2023/CVE-2023-62xx/CVE-2023-6277.json) (`2024-07-29T22:15:03.530`)
- [CVE-2024-2004](CVE-2024/CVE-2024-20xx/CVE-2024-2004.json) (`2024-07-29T22:15:04.373`)
- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-07-29T22:15:03.750`)
- [CVE-2024-2379](CVE-2024/CVE-2024-23xx/CVE-2024-2379.json) (`2024-07-29T22:15:04.493`)
- [CVE-2024-2398](CVE-2024/CVE-2024-23xx/CVE-2024-2398.json) (`2024-07-29T22:15:04.563`)
- [CVE-2024-2466](CVE-2024/CVE-2024-24xx/CVE-2024-2466.json) (`2024-07-29T22:15:04.697`)
- [CVE-2024-24795](CVE-2024/CVE-2024-247xx/CVE-2024-24795.json) (`2024-07-29T22:15:04.000`)
- [CVE-2024-27316](CVE-2024/CVE-2024-273xx/CVE-2024-27316.json) (`2024-07-29T22:15:04.113`)
- [CVE-2024-27804](CVE-2024/CVE-2024-278xx/CVE-2024-27804.json) (`2024-07-29T22:15:04.233`)
- [CVE-2024-38271](CVE-2024/CVE-2024-382xx/CVE-2024-38271.json) (`2024-07-29T22:15:04.757`)
- [CVE-2024-38272](CVE-2024/CVE-2024-382xx/CVE-2024-38272.json) (`2024-07-29T22:15:04.883`)
- [CVE-2024-4879](CVE-2024/CVE-2024-48xx/CVE-2024-4879.json) (`2024-07-29T23:15:14.650`)
- [CVE-2024-5217](CVE-2024/CVE-2024-52xx/CVE-2024-5217.json) (`2024-07-29T23:15:14.807`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-29T22:15:05.043`)
## Download and Usage

View File

@ -104111,7 +104111,7 @@ CVE-2017-3751,0,0,c41c9d0e86cb64e759d93cc477214289fe4f49aa1fb4d96d5b11e273a0d5a9
CVE-2017-3752,0,0,3f8236cbe38b0aa5ddeef3557b818069efd51cfec3aca7f0740129c9136463df,2017-08-30T17:50:54.717000
CVE-2017-3753,0,0,6885f1fb74ae8e4a5761a0d1dac9baf06044d26293188d3a7506faf2627bd3ac,2017-08-29T15:38:35.337000
CVE-2017-3754,0,0,96ae0f4004c362ccca5d02bf206696913af7be90df8bb274095b6a747517ebe2,2019-10-03T00:03:26.223000
CVE-2017-3755,1,1,e92739d2a7219c4732dba5514b0832bafea85263e5ec5c98f04ab62c7f2f6e8b,2024-07-29T21:15:10.993000
CVE-2017-3755,0,0,e92739d2a7219c4732dba5514b0832bafea85263e5ec5c98f04ab62c7f2f6e8b,2024-07-29T21:15:10.993000
CVE-2017-3756,0,0,260d30c8c73fd74ac6c7e878306c58ec6720fd1a02c0a3bb5ba4e21abe2b5fbd,2019-10-03T00:03:26.223000
CVE-2017-3757,0,0,b1839a940d6313d174f67a23644a4304ae3563ec749eb548651d4e4c81e64a19,2017-09-12T15:49:33.527000
CVE-2017-3758,0,0,1122b61558482a3cbb7dffcb3376a228b976a0e8f123dfbb03559b1ff35a6226,2019-10-03T00:03:26.223000
@ -104122,10 +104122,10 @@ CVE-2017-3762,0,0,9e624e8954d672f2c74c3a1e3cc86593e8c364116dbf2c699d6121b9ab5624
CVE-2017-3763,0,0,3299e98e83030c603b72768fa88233a271c613693111b81aa4394bf009196fad,2019-10-03T00:03:26.223000
CVE-2017-3764,0,0,b5fbb53cd08bdf79eef899db5db7f7a6fa5716c49e4a934cde05faa7e5baf089,2017-12-20T19:04:30.500000
CVE-2017-3765,0,0,45535ba4753e25ac3e37eb008b8251d1ae19b1cc923835055b3c96a33a9bcb6b,2018-02-06T14:12:49.383000
CVE-2017-3766,1,1,34268b66911223769008ab0475dc157a0bcbc37cd4878eb729c7230928f7b401,2024-07-29T21:15:11.060000
CVE-2017-3766,0,0,34268b66911223769008ab0475dc157a0bcbc37cd4878eb729c7230928f7b401,2024-07-29T21:15:11.060000
CVE-2017-3767,0,0,b5f484a650273b6f905d1434fd97edea273c36678fa198859a1da78cc31c4b2f,2019-10-03T00:03:26.223000
CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c22,2018-02-15T18:06:48.340000
CVE-2017-3769,1,1,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000
CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000
CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000
CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000
CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000
@ -136728,10 +136728,10 @@ CVE-2019-19755,0,0,576757e2e80399dccbdae0a683a118ad6db6a7bb95bf0a7d9944e6ac94367
CVE-2019-19756,0,0,1ac0bdab62e30eb5ab1a78699b860a548408938df444dc2031b32d44e57bf16c,2021-11-02T19:16:30.403000
CVE-2019-19757,0,0,6c08333c002f3e1b918b084afd5e3199189401eb1cffc5772a8ec918e1cd505b,2020-02-24T17:53:03.400000
CVE-2019-19758,0,0,f3cf0ee2a978417eaa68c2b04df4207f79bbea00f53f54a34da27466d93768b8,2020-02-27T14:16:50.720000
CVE-2019-19759,1,1,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000
CVE-2019-19759,0,0,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000
CVE-2019-1976,0,0,b8d808fbb262d28f23598cf45a4449f191ba6525e2a71abe6997a7ac93fe18a3,2020-10-16T14:12:47.730000
CVE-2019-19760,1,1,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000
CVE-2019-19761,1,1,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000
CVE-2019-19760,0,0,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000
CVE-2019-19761,0,0,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000
CVE-2019-19762,0,0,feb988600c3fc6ca7d1a933280b0be01b94e3ac7fbb425729dfcea7e6ffd9601,2023-11-07T03:07:46.650000
CVE-2019-19763,0,0,a0500b6440b16a5a1c2f0654d7e76553a99823fe0d847fa5827465e146d7f844,2023-11-07T03:07:46.963000
CVE-2019-19764,0,0,d1e9c742359c37d5db227c8fbac2d9d2e61d282573b32d622f1d5729fb94a9f7,2023-11-07T03:07:47.273000
@ -141045,9 +141045,9 @@ CVE-2019-6158,0,0,db2e2781e7ba231fa64c0d6f7f3025dc91189c92e16915bb1280bbb7743bf3
CVE-2019-6159,0,0,6716deec9a9a136fb16a0ffbe7846839072001c97cdee984781cc2f46d237ef6,2023-03-29T16:23:13.830000
CVE-2019-6160,0,0,b2d5dce84b00aaa04fc07f413ed16929038155671fb4f39c51535abe6481cb4e,2020-08-24T17:37:01.140000
CVE-2019-6161,0,0,99cd0266289724d21255d7e9cfa2cc87b5efa2a874b60905ffab2ffe6eaae87f,2019-10-01T13:38:44.840000
CVE-2019-6162,1,1,12368a95f492eb49b6d04a584fe5786db39a16d95f89a27258238e3d5dc131fb,2024-07-29T21:15:11.167000
CVE-2019-6162,0,0,12368a95f492eb49b6d04a584fe5786db39a16d95f89a27258238e3d5dc131fb,2024-07-29T21:15:11.167000
CVE-2019-6163,0,0,027c0edcbb45ae583db40ecd12ff52e73eba13c1a8256f46f27e2daedabee719,2019-09-13T19:15:10.510000
CVE-2019-6164,1,1,fb0be18f71c39ed585bba818da6aab0bba8f749f2c70054d5f51df9739125284,2024-07-29T21:15:11.227000
CVE-2019-6164,0,0,fb0be18f71c39ed585bba818da6aab0bba8f749f2c70054d5f51df9739125284,2024-07-29T21:15:11.227000
CVE-2019-6165,0,0,6d179b5ca377e0b83e665ebd6910f73c7607e8fea52be8824995fe22e6f9c9c6,2023-02-02T16:12:47.457000
CVE-2019-6166,0,0,ab677c9ea5d642a1e2b8423dd4fda786f41249e744894f3277ae11cc48081cac,2022-10-14T03:16:01.347000
CVE-2019-6167,0,0,4d4d8ba42a1778d05302e4fbddb18543a4d71facfdb5cb7f949562ec29734657,2022-10-14T03:17:14.353000
@ -141057,7 +141057,7 @@ CVE-2019-6170,0,0,f9abca4baf6d34b7b752a733554d53bd433ea5cab38f61027cee433cace7e3
CVE-2019-6171,0,0,1c0cedf99197e5615db52b5825e8bae7ceb0533aa9af9cbb22e375671bda923c,2022-10-19T13:31:18.703000
CVE-2019-6172,0,0,4dd7d7bc92cca79ec52e34a3a066f06d73f86817e25dd9c29869df14fc4876c1,2020-12-08T19:34:24.080000
CVE-2019-6173,0,0,c3a794edcfbfeae5a309816c65d1d4070e27e4fb48bf5b6f040044efbf93f698,2020-06-22T15:32:04.143000
CVE-2019-6174,1,1,c1026a4a4003c1810f92ae8bed6a48066f3801813c1d105df30c12b536451215,2024-07-29T21:15:11.280000
CVE-2019-6174,0,0,c1026a4a4003c1810f92ae8bed6a48066f3801813c1d105df30c12b536451215,2024-07-29T21:15:11.280000
CVE-2019-6175,0,0,b9ae54d8304dd7132011bb36f0cb0ec94cb982ffedbe169a883be8f42d1b032a,2020-08-24T17:37:01.140000
CVE-2019-6176,0,0,cd029beefa2dcb154fa2a100d442f4e79058bcc75fe1dda8d900168e016668e2,2019-11-21T20:46:23.820000
CVE-2019-6177,0,0,f883c040825cd6f9e94c9e8135bf040fd81c03540fd62110d930a256667693d6,2022-10-14T03:29:20.130000
@ -141068,7 +141068,7 @@ CVE-2019-6181,0,0,796ed2285282dcbef326f51c4b1c2159381b26f117857ec4ff64b9077806ac
CVE-2019-6182,0,0,54abd660fc93f3a87156acd4c96296d180651b62e80d1c7700a14f69f4fc44c8,2022-10-14T03:20:44.237000
CVE-2019-6183,0,0,471187a22fe315f5a24b60bcb7fbcfab43426e78197ac569598348df4396cdac,2020-08-24T17:37:01.140000
CVE-2019-6184,0,0,67da7c21e09f9811494a2f3e524833f2ee4f2aace057241287d38b3d40a16302,2020-08-24T17:37:01.140000
CVE-2019-6185,1,1,228dcda793b8f7680d98bbf05b5314c55adae6c96d48b324bdceeb0dd43677fb,2024-07-29T21:15:11.337000
CVE-2019-6185,0,0,228dcda793b8f7680d98bbf05b5314c55adae6c96d48b324bdceeb0dd43677fb,2024-07-29T21:15:11.337000
CVE-2019-6186,0,0,0c244d9d313587d3a55ff5ca86df7dbd7694be6aeaebb9499ed628aeba413ecc,2019-11-22T01:08:15.587000
CVE-2019-6187,0,0,9f3daa3a701d124fdb7e13a5de8263f3e10947d984243be3b09d688e97c1c371,2020-08-24T17:37:01.140000
CVE-2019-6188,0,0,8c194678f0f298b6aca4ed9e27b16d62a15a8bd2b4a937efd68fb69c71a5a8f7,2020-08-24T17:37:01.140000
@ -206130,7 +206130,7 @@ CVE-2022-40363,0,0,6423f008d6342ae2cc78b421a216227fd5616496935395403c04363593fde
CVE-2022-40365,0,0,cccb355bc930a63d76ccf4edda04284e6432e8bb2daddd5b67c972ab54a0dc37,2022-09-16T19:27:25.667000
CVE-2022-4037,0,0,f9bfdcdd7a52fa2ba84a650512e429bbca1eb66830ef1e3d5ef723ccfa5f4768,2023-01-20T15:34:23.423000
CVE-2022-40373,0,0,b40950a62f31c60645353599eed93c867e8b30ad31aeed9332d5b03847c87a1e,2022-12-19T16:24:55.247000
CVE-2022-4038,1,1,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000
CVE-2022-4038,0,0,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000
CVE-2022-4039,0,0,06b2484bc7b98d5624dca70127d033f0293995e2c6bd62ddc46e10485416b22b,2023-11-07T03:56:46.790000
CVE-2022-40402,0,0,07221e21cc3b86eaea1c2aa42f779291ec2c4027c37a9d13f512ed9b452e0cf5,2022-09-27T04:55:48.947000
CVE-2022-40403,0,0,2e90a1a52eb04792ffb948ebc6c233ad8804fe02fb818b40ffe367c3c2b856d5,2022-09-27T04:48:12.660000
@ -211718,7 +211718,7 @@ CVE-2022-4818,0,0,efda42f09829854104f88653d6fb0c138476703b4f95d3761b4e08c8297d3f
CVE-2022-48181,0,0,8474c885691c667425c24561d8f78dae5439ab49cb7f311d56f40947c953be1e,2023-06-13T19:34:14.697000
CVE-2022-48182,0,0,d6534c9d85a0a5705048242e38159eac056a9605d6b5d2af1acd18f1a63ce69a,2023-10-12T18:37:01.287000
CVE-2022-48183,0,0,94faee17e8c16e496e7c5e93f974ef6ee83c64e3e512d3af5b7ecf56ec8ec9ec,2023-10-12T18:36:54.013000
CVE-2022-48185,1,1,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000
CVE-2022-48185,0,0,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000
CVE-2022-48186,0,0,45597050fd15461922f8e20a35c354618461ad4684fd2b360fd9ec3fd80dbd81,2023-05-09T20:16:38.417000
CVE-2022-48187,0,0,ff1590e9a690fb0ae260adde2c69973167f534b3795163c9e5f0527961fbe91f,2023-11-07T03:56:29.847000
CVE-2022-48188,0,0,1e9d177db03926434670d4fa3d381984ab7fc2522bdcb986b41da06206088453,2023-06-13T21:19:19.467000
@ -220766,7 +220766,7 @@ CVE-2023-27949,0,0,944faf80b76c50b74dc9f86e54418c3639db6dde85f7c8b3b133bec768bc1
CVE-2023-2795,0,0,9ad05231de618cab902152898f9f0ae4ae98137a6dc5971cb73675b90e785ded,2023-11-07T04:13:20.667000
CVE-2023-27950,0,0,feb689a552dec920776bdc5fd711a87a696d8738fa7aecc419d3821172950278,2023-09-08T15:48:43.720000
CVE-2023-27951,0,0,07a8ad9c973513f5c325e744ef00500a0159b771326db5c192813f47eada229a,2023-07-27T04:15:19.403000
CVE-2023-27952,0,0,667b31af1f5284a8224d57dd8528db25020aa768603ab7b2b81266a9b33dfacb,2023-07-27T04:15:19.543000
CVE-2023-27952,0,1,c849c263ca6930acc9a6872a34912c54f9b71518a672fa0eaf54060adcd764fd,2024-07-29T22:15:02.630000
CVE-2023-27953,0,0,db7677358cfada1374a2084252ff651805fd9c27cc8716e644cdc58ca7909025,2023-07-27T04:15:19.687000
CVE-2023-27954,0,0,86ec702ff6bf2ca2eeaf185b6dc647ac5fa3bd57e022135f73fe1a29c5ca66a2,2023-07-27T04:15:19.933000
CVE-2023-27955,0,0,197d65afc1fcce777628be2cabccd5c3e41f2fff9260001ce4394d261ba19db5,2023-07-27T04:15:20.063000
@ -228997,7 +228997,7 @@ CVE-2023-38704,0,0,e8f61e669641b4541b9dead34f29bdaa6050ad5483b1650192a2a7fffecb7
CVE-2023-38706,0,0,f3b7a28d99df82bfb4b65abf6b7ea5765da2d19f9dab4e40045ea292dfc87d75,2023-09-20T19:59:40.533000
CVE-2023-38707,0,0,9347e60d24d7ba37513b78e42026dca258290cd85b3a3ac2815752767f123f99,2023-11-07T04:17:23.830000
CVE-2023-38708,0,0,34b544bf48e1f9934c27a77b390dffc52ab8cd8bf31c3289afb5eb9e239abd11,2023-08-09T16:15:56.907000
CVE-2023-38709,0,0,5fe10cdc0a92b04952b23a0dc4a6a25f0424e3048a272e021736b407505a8983,2024-06-10T17:16:12.647000
CVE-2023-38709,0,1,f340467c92c022f961e84b4f91cf5aa415ed1b501bd2bfa8ac670b7def6e1b99,2024-07-29T22:15:02.800000
CVE-2023-3871,0,0,b63a6f980224e42fe5cec7ad5cf482968e70b380f7a48c7c40b58a1e34ebf7b7,2024-05-17T02:27:54.960000
CVE-2023-38710,0,0,1a53a43418ab06aa38abdb8383b4db665cd5dd79b4ddecbb9e27a105cfd1fc62,2023-12-11T19:34:38.997000
CVE-2023-38711,0,0,d83687734955dc99b560e3e7b1db054c0db054a346c91e162d4f81a073993ace,2023-12-12T13:52:11.970000
@ -229062,7 +229062,7 @@ CVE-2023-38814,0,0,9aac3e73f3dea67ff499610adc8aebc4b1bdfe7348e3a0c13ce93d8235db4
CVE-2023-38815,0,0,64c2f1cafe170788d2dae17acd97f143483ea35d344d1c405785fd711091d743,2023-11-07T04:17:24.550000
CVE-2023-38817,0,0,02f08d8764e58ddff92f8e71f36696396282f0c973dbc17473db3d1e17ca402b,2024-07-09T18:15:08.577000
CVE-2023-3882,0,0,9718e1f58a19c190f2b6dde660ada479b6caee0f419bab2f92a01d8ef1d1c033,2024-05-17T02:27:56.237000
CVE-2023-38823,0,0,26d29675a5e84bfb0c856c8d7f7d027ef66693c5118506098df2f708c99ee394,2023-11-28T22:02:33.013000
CVE-2023-38823,0,1,12b5bce357005cd17e55ba4fde9aeb3463513dd0698d17dc4225732b578c45a9,2024-07-29T22:15:03.200000
CVE-2023-38825,0,0,ac97f5cf8dd7bce10fc69be98839c094a86ce9979a52853cf9d5c403f72cab08,2024-03-21T12:58:51.093000
CVE-2023-38826,0,0,8ff5f457fccec1f91d2c727b83fd1b215cb0cb1f56602e1deed062bd46c7f82e,2024-01-03T22:54:24.607000
CVE-2023-38827,0,0,f54704191f2a7b8aca2114c6e95cb655be16715db44f89dbfa31fbeb928e6e0a,2024-01-16T18:57:56.167000
@ -230273,9 +230273,9 @@ CVE-2023-40392,0,0,b54a0d5914b9186321a665f5b2009e1d4bda632c5b381d56f487e57d220d2
CVE-2023-40393,0,0,e0720121847159abda778d2f646c0c7e848f8bc72fbac40185b3c98f6a69162e,2024-01-17T18:30:39.897000
CVE-2023-40394,0,0,526da955586233b1a7b2dc9d999b1f0be86354cdad86453374676f9733b0041a,2024-01-18T14:31:24.653000
CVE-2023-40395,0,0,8951a0da5934955ebf0f075ae9e557422fd4c66d3267f9876fe4bc4a0543d4dc,2023-11-07T04:20:13.073000
CVE-2023-40396,1,1,d6752cd7a4f5887d72b9410a9baa5f59ca3a082ed6903a7d64ce47cde737412c,2024-07-29T21:15:11.453000
CVE-2023-40396,0,0,d6752cd7a4f5887d72b9410a9baa5f59ca3a082ed6903a7d64ce47cde737412c,2024-07-29T21:15:11.453000
CVE-2023-40397,0,0,48f5d35694eda11e063d524064bdc097e2aab2bd9e9d13544e89fbc0b53f0c7b,2024-01-05T14:15:47.920000
CVE-2023-40398,1,1,a8b3b99a6c0f2bf3869bd949fe9b38fccdedf4ff103dc8f1b205b13e8bd91b85,2024-07-29T21:15:11.537000
CVE-2023-40398,0,0,a8b3b99a6c0f2bf3869bd949fe9b38fccdedf4ff103dc8f1b205b13e8bd91b85,2024-07-29T21:15:11.537000
CVE-2023-40399,0,0,091e5a2db15fd5f665ca444b78b62be5004d4abcf322f2dee4eb3017386c844e,2023-11-07T04:20:13.200000
CVE-2023-4040,0,0,e11728f161945388107c8ae43690a4d8736e1afb7e958f898d615bcdea0c7a50,2023-11-07T04:22:04.223000
CVE-2023-40400,0,0,40794a10c4c9163312504f098de9ecd9780321feca619f02675db3767c324753,2023-12-22T16:10:51.593000
@ -232196,14 +232196,14 @@ CVE-2023-42914,0,0,f5f29cd9efb0b6e902e417bba37ba297b7c917356de5179adf80ab896d374
CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000
CVE-2023-42916,0,0,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000
CVE-2023-42917,0,0,15549d591e10c4a0f8e1ae1b9de5e6d4081ffb5c46b1b7c185d2789ea21a2acb,2024-06-26T20:01:23.280000
CVE-2023-42918,1,1,ac21c0fcce55bc3ae0926ccfbebdf5bf10c71e98b0550ecae108153c2300a377,2024-07-29T21:15:11.610000
CVE-2023-42918,0,0,ac21c0fcce55bc3ae0926ccfbebdf5bf10c71e98b0550ecae108153c2300a377,2024-07-29T21:15:11.610000
CVE-2023-42919,0,0,f9a3b1dae89bc9cf392d1cf8dea65cc44606d99a0ff0603d430f6ace7681b3a7,2023-12-14T14:08:16.317000
CVE-2023-4292,0,0,3ea59f0e5840e07b56bc2aae1b281e2ab80136b2b379398236c012d0899a4d88,2023-09-22T13:48:01.647000
CVE-2023-42920,0,0,967029ebc9d2fa13e49b3b2a7e43266d0af79ef15d4513e03a7c68b3187f308f,2024-03-20T13:00:16.367000
CVE-2023-42922,0,0,d462ec8a37d9ad76a8353a6b4d7d79094fede2b875e86ffc84e579e57a42a188,2023-12-14T14:05:30.140000
CVE-2023-42923,0,0,2718c43e187a8424615b9f8de717d1e9605fa64e6eb699c03e6b09fc5d5d64d5,2023-12-13T21:19:46.137000
CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa779,2023-12-13T21:17:10.803000
CVE-2023-42925,1,1,7f5756665c935d986aa32de37edc3c48523a8f96d6401bb1bca180e48e9013ff,2024-07-29T21:15:11.670000
CVE-2023-42925,0,0,7f5756665c935d986aa32de37edc3c48523a8f96d6401bb1bca180e48e9013ff,2024-07-29T21:15:11.670000
CVE-2023-42926,0,0,10536a0e5d0896ff760b50cd54c1cef47c09b911f9aeabee54318eada99b22f1,2024-02-02T03:11:34.350000
CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000
CVE-2023-42928,0,0,0f96803af50c6bf772f0d2998c444df6f973590aa281ef5d0e5f7a9046ef4c87,2024-02-22T19:07:27.197000
@ -232223,12 +232223,12 @@ CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f80
CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000
CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000
CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000
CVE-2023-42943,1,1,f6d5d7e883a22d5910d1e1d3956b5aff761b61d6b9d83a08708a57e110d1b88b,2024-07-29T21:15:11.740000
CVE-2023-42943,0,0,f6d5d7e883a22d5910d1e1d3956b5aff761b61d6b9d83a08708a57e110d1b88b,2024-07-29T21:15:11.740000
CVE-2023-42945,0,0,a06b1aec09c4d06c83c2ecc43e93c97ac1de84ec55101d5962c5f9ba2c7586a9,2024-02-22T19:07:27.197000
CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000
CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000
CVE-2023-42948,1,1,096cc4f0f8df892a53138a76d1c11c3301eb9cb58b0b6660631b21d836e00f0f,2024-07-29T21:15:11.803000
CVE-2023-42949,1,1,474e9d0b9f738b6e5107bf957a3b7c8719ccc30684a627c9c05cb8b4eb2a2179,2024-07-29T21:15:11.867000
CVE-2023-42948,0,0,096cc4f0f8df892a53138a76d1c11c3301eb9cb58b0b6660631b21d836e00f0f,2024-07-29T21:15:11.803000
CVE-2023-42949,0,0,474e9d0b9f738b6e5107bf957a3b7c8719ccc30684a627c9c05cb8b4eb2a2179,2024-07-29T21:15:11.867000
CVE-2023-4295,0,0,ec334b74dcc01539baa3eed8300f24e0d43c22b250be6de255e7d71ca4f97cb4,2023-12-28T17:14:36.030000
CVE-2023-42950,0,0,7d5905ff324fe033699a11a15d8566fd52354d2018009bfba134ef93fd3c72e7,2024-06-12T10:15:27.083000
CVE-2023-42951,0,0,5599d72d1055314191c8db46df9d7c3c52edb7a93dbd3fb4d584b453f42b45e7,2024-02-22T19:07:27.197000
@ -232237,9 +232237,9 @@ CVE-2023-42953,0,0,10e4b94939ee0a7c816d850e4e7befeb67bf5108acf30f852eb067399e688
CVE-2023-42954,0,0,065c350829c9b241771d1bca2f08dbf3f9951aa86fb8dbf545b8b0f102b1a850,2024-03-22T12:45:36.130000
CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000
CVE-2023-42956,0,0,66b0dda941d2a4925cbdb9e601d4277739f51c5e0165d598d707e4a6d9b3fb9b,2024-06-12T10:15:27.210000
CVE-2023-42957,1,1,d24fbe1f9b92907f4a10436deb8f6c75bdc1c1ea674bb2720e77764ea20251b5,2024-07-29T21:15:11.930000
CVE-2023-42958,1,1,4fc62e668da46c99991dded531c220534c006dab4b194ea4cf8d5e395788b722,2024-07-29T21:15:11.983000
CVE-2023-42959,1,1,0f86f809cdd468ac9c734cb41f847ae78a24bbc25a6806b2d0e30fb9854064a3,2024-07-29T21:15:12.047000
CVE-2023-42957,0,0,d24fbe1f9b92907f4a10436deb8f6c75bdc1c1ea674bb2720e77764ea20251b5,2024-07-29T21:15:11.930000
CVE-2023-42958,0,0,4fc62e668da46c99991dded531c220534c006dab4b194ea4cf8d5e395788b722,2024-07-29T21:15:11.983000
CVE-2023-42959,0,0,0f86f809cdd468ac9c734cb41f847ae78a24bbc25a6806b2d0e30fb9854064a3,2024-07-29T21:15:12.047000
CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000
CVE-2023-42962,0,0,35794e89578ee19a4b7d15e17dbc849654eef14cc3d488dadb444cc2c1961a1a,2024-04-08T22:47:42.510000
CVE-2023-4297,0,0,047ed4f9023e2ddaed83a6b2684e12e7cb9df8581e91d1a9b5f1e7175f976ace,2024-07-12T16:11:19.193000
@ -233642,7 +233642,7 @@ CVE-2023-45245,0,0,f71f5550bce318c5896855b0720ef3b014b7edad826762736cbbe2c3e48a3
CVE-2023-45246,0,0,6799976449efb5e7dfbd39ca49c91e79edc135b105c217fc842128d098ea333b,2023-10-11T17:20:21.937000
CVE-2023-45247,0,0,cf730bce8af4196d54c7fa8e0341f517de223cc02208e0ec0dd8e04054077116,2023-10-11T19:06:49.937000
CVE-2023-45248,0,0,cde75e840aad96dac96b2f35c9e6f15ef3cf04deb0931c7f7ba39cfb3ca21688,2024-02-27T17:15:10.327000
CVE-2023-45249,0,0,3cf14811a2b45b8e31cbb5e7cfa40d83d5d729bf0b0c56d3f2d80dc651a38108,2024-07-26T12:48:15.370000
CVE-2023-45249,0,1,1bc9ce809ecf314861ecbfa8f85f135583f2993914971c1bf11334a02b51e3f3,2024-07-29T23:15:09.877000
CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9ba6,2023-11-07T04:22:41.327000
CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000
CVE-2023-45252,0,0,307228454f587d0983793c9bfdd500c095874fad12af348d470cff72f1f8a6d2,2023-12-08T18:45:28.017000
@ -238544,7 +238544,7 @@ CVE-2023-52352,0,0,5e107ecf2b7a6400f671cc5a9a0f89213e61b31027cc0ebaefad36aa04e25
CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f859777c0,2024-01-29T15:53:20.917000
CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000
CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000
CVE-2023-52356,0,0,c1a260f7f038d28c1e0dd6374157023869a940cc7b6d8bf5c486caa60203e908,2024-03-11T13:15:52.753000
CVE-2023-52356,0,1,45849d7a53226b08b6d7c576627d21243ff7e01dedeeea45ce339b329398ce52,2024-07-29T22:15:03.340000
CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000
CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000
CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000
@ -240006,7 +240006,7 @@ CVE-2023-6273,0,0,bfe15761d0e2bb921ed3c0d0c2c36c03a1656966fe638d3401638d2cebdb26
CVE-2023-6274,0,0,4f530dd28ac44051dca761bb89d18362b76653c5f1bd1f7f9a0b0b7fc6974e6b,2024-05-17T02:33:36.680000
CVE-2023-6275,0,0,1df4a2d506677de951981566edaf40c947c0fb87ae017e4f3b204b0bc3f9bb45,2024-05-17T02:33:36.787000
CVE-2023-6276,0,0,24c3dc4dd47e004cfc2d394ab4aa6804146bc09890750cb25a878e0ee9940b41,2024-05-17T02:33:36.890000
CVE-2023-6277,0,0,e64598bc4845ef933a63cfce11b44a1186885c79098ccf9efb29eb3604a2126f,2024-01-19T16:15:11.057000
CVE-2023-6277,0,1,33cbd357819d72228e36155bc3bfe5ff1303c021d43ad9d4ccf58c3dc2c4d083,2024-07-29T22:15:03.530000
CVE-2023-6278,0,0,c78b8d879da1ce114b8d36c4602cd8be742dae98eec5ce3b7337c3170b6a2e43,2024-02-03T01:23:05.233000
CVE-2023-6279,0,0,058b7b47599ec599cdb9a002a2c8fd40321be5fd43b36531af9da360a427c486,2024-02-03T01:22:07.893000
CVE-2023-6280,0,0,87ee32c86b2c6404c104c84ee2fafd835c9be3dfccae6ec09e648330480cc30f,2024-05-17T02:33:37.093000
@ -242694,7 +242694,7 @@ CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a
CVE-2024-20037,0,0,9c45a018c7c075a8a97c9a68674f13d53eed1650b73e588cabb51078922b13c9,2024-03-04T13:58:23.447000
CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000
CVE-2024-20039,0,0,68d71d9533ee3a71787cbfe2ab34478818f0903af4255681b79317a3506c2dcd,2024-04-01T12:49:09.583000
CVE-2024-2004,0,0,986b9069f0e16c9cad75d0af17c842c0acbddb79c7dfed57e096aa6b1b17c80f,2024-07-03T01:52:57.560000
CVE-2024-2004,0,1,ed66cd00a62a4714c38518303868d9d029bdeae31c990354a09ca3981351c2e6,2024-07-29T22:15:04.373000
CVE-2024-20040,0,0,7794263a0ff9ef7a9a293c11fabe2693e4a31f8e28a938c194a6c9b335ae777e,2024-04-01T12:49:09.583000
CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000
CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000
@ -244760,6 +244760,7 @@ CVE-2024-23258,0,0,52aef1e9d6cc8d17d23b996b2711a0df58dc5d1ea500a1b8fa34d0615dc37
CVE-2024-23259,0,0,32180f50b016e600303bef490f7c44972cd0819551854177dd2a129ee13314e5,2024-03-13T21:15:57.180000
CVE-2024-2326,0,0,3c8b37146da325cce38aec51267ca4284760cd42c72a832b281add7789332b70,2024-03-25T01:51:01.223000
CVE-2024-23260,0,0,cfbcfeb19854283a9e5066e6e8e5e90d2605569101e96973822703b992d8a487,2024-03-13T21:15:57.227000
CVE-2024-23261,1,1,fbd4fb6f0575c693de6014b4bec875b5d16de5ef425017e845bbb2dbae55281e,2024-07-29T23:15:10.037000
CVE-2024-23262,0,0,62d9ca66899810aa5c6562616e9cb31025a85566f240255b691a56f330edff70,2024-03-13T23:15:46.790000
CVE-2024-23263,0,0,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000
CVE-2024-23264,0,0,e8679cdfb620ed4032710b82b0ab29602601551c60ac1c22de87e1638374eb53,2024-03-13T23:15:46.883000
@ -244797,7 +244798,7 @@ CVE-2024-23292,0,0,f5276fc6b99c3fe604590c2b2122f4a436bc2bab6e0ae212225461a31d58c
CVE-2024-23293,0,0,985096bd22ec764c85e903a49a99ed4147dd2d751c79968ad916db545194c1db,2024-03-13T22:15:11.390000
CVE-2024-23294,0,0,100c10a3131c32be888e04553bed37c2d7a75d8b5d5a64c5c5fd47cdad6c9eab,2024-03-13T21:15:58.733000
CVE-2024-23295,0,0,f60b5b481bcc709a0e07818ec60448a8b8255b454dac1f32e5ff0b3a390550bb,2024-03-13T23:15:47.630000
CVE-2024-23296,0,0,12a1de3d62ca79ef989249cb1e691420221912e9533cad73e61bbc1dd756eb30,2024-07-03T01:47:43.840000
CVE-2024-23296,0,1,98ad16ed19ceb98a774f2fcc724aad9a1d938302930707577ef753cfcbd775c5,2024-07-29T22:15:03.750000
CVE-2024-23297,0,0,dfd56967bab57b4e450ebc4d5ffd5b8e085c43f2dc7ce30d6472eb920ff02a80,2024-03-13T22:15:11.520000
CVE-2024-23298,0,0,a565b18965c275606ac8348acd9993cb8bd15ff52c9c70b79da019a948d277e6,2024-03-17T22:38:29.433000
CVE-2024-23299,0,0,c511e81be43ab0bab76e86bc6db7a8fc5840f12996fc93f1ff034882f594ee51,2024-06-12T18:03:36.960000
@ -245155,7 +245156,7 @@ CVE-2024-23786,0,0,a4843821edc7301dc3896b1dc41942f9a7cad1c9811616d65b63499b1903e
CVE-2024-23787,0,0,1cebbe4231b42e35699eed5d7dba409232d884bafafb6cdea00ae172adf3e7de,2024-02-14T13:59:35.580000
CVE-2024-23788,0,0,6c6993e63ac258c815c0d6f15d7560f4b8732b4638909b422908e0ecb34bd923,2024-02-14T13:59:35.580000
CVE-2024-23789,0,0,eb24c8fd06c4dc0c79533f62c1520b9bd32813c0e2c7e43d74bbd067c1f01e08,2024-02-14T13:59:35.580000
CVE-2024-2379,0,0,12e7ac3667f07b307742fd31fb389abc47f3b2c366b2df97007dd8bb9fef8142,2024-06-10T16:15:13.173000
CVE-2024-2379,0,1,4ca7e42dfc5c22096910545f76bab2426f3be8f64dd8d351f8e628dcaa942948,2024-07-29T22:15:04.493000
CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755ae0,2024-02-02T02:07:58.653000
CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000
CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000
@ -245300,7 +245301,7 @@ CVE-2024-23975,0,0,8574349dfa5f2a0fe4ae15f83d2f9c7c0823899e45c716a2ca2f4f60ae30f
CVE-2024-23976,0,0,16acbea1fb543126c77bcb211c592f37e28d378e3cd2df50f24701a7caca7cb3,2024-02-14T18:04:45.380000
CVE-2024-23978,0,0,5bee98426b560d02600c1690e08516003e9bd0e42643648505946247e075278a,2024-05-17T02:36:41.847000
CVE-2024-23979,0,0,6fdd5509f38519be7582661a9525c018d02e080bbc0d3ec491dc3a617317722d,2024-02-14T18:04:45.380000
CVE-2024-2398,0,0,0f4a48da0ead4f20c3af2704d87468d8abca50984f056bab845a2786b3e742c6,2024-07-03T01:53:12.523000
CVE-2024-2398,0,1,2df48c721cfb060432be4d236c44ca083dd8ee77c5818324eaea9a325822973e,2024-07-29T22:15:04.563000
CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000
CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000
CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000
@ -245588,7 +245589,7 @@ CVE-2024-24623,0,0,1416328fef44b3dca34f3b6ab49045c4173158618d91fb7f567b860695bb9
CVE-2024-2463,0,0,24deeeee766ad4a5a7424dba127cb4cbbe9e946086a31f7db9b5902aa6111178,2024-03-21T15:24:35.093000
CVE-2024-2464,0,0,5ff7c9aac18d394d4849e149117cdc80dedc6fee12e8baf9893132cc38ce131f,2024-03-21T15:24:35.093000
CVE-2024-2465,0,0,6230da2d3a7d355f9109bcbe86ce790145cd318aa89b33fca16121fe02380d5a,2024-03-21T15:24:35.093000
CVE-2024-2466,0,0,d02d057413d73b505fec664a2e7d80aa1c2fd4efc63e92bd5dbe2492eb6a6db9,2024-05-03T13:15:21.893000
CVE-2024-2466,0,1,6b3dd9237aa20b4b2f20cb9811624ae879351b8bde3e76e921ba5d522e67c2d6,2024-07-29T22:15:04.697000
CVE-2024-2467,0,0,9bcf217419e076743a229c7d9329553030b624f85cef7b05ba0694abd37301e6,2024-04-25T17:24:59.967000
CVE-2024-2468,0,0,f5fa0f4e21305851a5ed43e2730a4e0c2e70e0ee8b201aed06c129c3eb28843c,2024-03-25T01:51:01.223000
CVE-2024-24680,0,0,5e88d8a3de6deb02cd3bb72094ef29806d18a6b5b891345f7494f12256a199a7,2024-04-20T03:15:06.820000
@ -245692,7 +245693,7 @@ CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73
CVE-2024-24792,0,0,f69bae6aeabc0bd1864687cbecc00a414d65f449f6042a0a0606e99652942d2a,2024-06-27T19:25:12.067000
CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000
CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000
CVE-2024-24795,0,0,df5b2f0124975b34046fdd165c37965a95f26001139b404a1152bec012a6fee9,2024-06-10T18:15:27.003000
CVE-2024-24795,0,1,8b96800f98f97e666dc2b89bddc7d365031a992307d47d2b82e462dc83917a6b,2024-07-29T22:15:04
CVE-2024-24796,0,0,292fd4a31399bba86c5730ef4bd877b625e772494a5146bfd46b725d130f455b,2024-02-12T14:19:54.330000
CVE-2024-24797,0,0,40724d1d3e1a03ea7253bf27a8e4cea3180b132258b4b1bc361005ab1c0591b9,2024-02-12T14:19:54.330000
CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000
@ -247656,7 +247657,7 @@ CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771
CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000
CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000
CVE-2024-27315,0,0,e2c8341ce82caf348d52a9896be5ac15e43c9c9ebf18a27eb01146f06cf9a599,2024-02-28T15:15:09.670000
CVE-2024-27316,0,0,47557bba568976b709ce61c7b3f2b56ae39595698680263b8f0bb7449bb3941e,2024-07-22T09:15:04.603000
CVE-2024-27316,0,1,3bf6f13ee9dbcc947168c29dac2b12e27972894e222efd3444dea533d66430b8,2024-07-29T22:15:04.113000
CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d45e1,2024-05-01T18:15:16.097000
CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000
CVE-2024-27319,0,0,198bfb473ae5c4a00a4bf458aba8771a9487b41224f35d4388056e6f7ba27f15,2024-03-30T02:15:08.090000
@ -247948,11 +247949,12 @@ CVE-2024-27800,0,0,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d
CVE-2024-27801,0,0,4f37242e62570444393eedc0e6b0ad8e8ff66a897bd149ce4d1292d83e4fe3ae,2024-07-02T13:36:50.500000
CVE-2024-27802,0,0,5fa4df8e0fa4e055c45d206bab7fd01f5c4103a30fc3e7d9373406c7aa7c6468,2024-07-02T13:37:19.690000
CVE-2024-27803,0,0,d8c6c7c35a66fefd164ec7252ba7f65231664b1bd53cefc22f8eab515bc840d4,2024-06-10T18:15:28.727000
CVE-2024-27804,0,0,cc0ff5a5b94c6780767cdc22ac5b7c683a356469ddaa3536697d5bd02fd071c5,2024-07-03T01:50:51.930000
CVE-2024-27804,0,1,5a3a9d1fd3691a1b54b24866e69cee2f5e3a65aabf978c5b6b5c4365c9f4b2f7,2024-07-29T22:15:04.233000
CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8980,2024-07-02T13:29:10.397000
CVE-2024-27806,0,0,28c67af34cc68b2a5a6c23ba0a23708c28b0ee7df3bcafd7c779ecd50c264c63,2024-07-02T13:29:21.613000
CVE-2024-27807,0,0,a7b781fd7f96d6bc57a085fc734d11b31dcdd4417a6ae278ff1c40e2b1bf7128,2024-07-02T13:33:44.157000
CVE-2024-27808,0,0,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000
CVE-2024-27809,1,1,04d69a9f15d9275ea5e9f599e7bb9d5b08dd452bedb4560400b8bfe95c8cebee,2024-07-29T23:15:10.110000
CVE-2024-2781,0,0,97e23bf2edd148fde295ed4a38d42212ed940660bc04c9822025b8526dedd073,2024-03-27T12:29:30.307000
CVE-2024-27810,0,0,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000
CVE-2024-27811,0,0,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000
@ -247968,8 +247970,10 @@ CVE-2024-2782,0,0,680a3c329ce925b550d110698489929aa37484a831dec13218a370944105b9
CVE-2024-27820,0,0,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000
CVE-2024-27821,0,0,997425452e8be4677f15c9b9aaa18f17147699f7e8dfe8b663210b670dcd8496,2024-06-10T18:15:29.097000
CVE-2024-27822,0,0,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000
CVE-2024-27823,1,1,e1da5fe73742b4c013df4afed2b9533d08c1bfa73db827d260617648cb2aeaee,2024-07-29T23:15:10.170000
CVE-2024-27824,0,0,79e08efd7f96e8899d7d8541d6c0e1e0a4f8d446eaa36c3c2ce9d69863460387,2024-06-11T08:15:49.830000
CVE-2024-27825,0,0,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000
CVE-2024-27826,1,1,048e46a2061e609bf38d953a60410e4e7eb20ff1f0495e29959b6f02580741b6,2024-07-29T23:15:10.240000
CVE-2024-27827,0,0,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000
CVE-2024-27828,0,0,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000
CVE-2024-27829,0,0,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000
@ -247997,13 +248001,28 @@ CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794
CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000
CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000
CVE-2024-27852,0,0,9c516bed02a09c2aff2aa4b9ea5d528517ae4b8f02f5b13e3e44ea400df8e7a3,2024-06-10T18:15:29.900000
CVE-2024-27853,1,1,58852b1c49daadf3eb721d9fec57a112a387a77f154df8d001dbb23df5fb1557,2024-07-29T23:15:10.297000
CVE-2024-27855,0,0,88e90c75a89e49c8f0ad6b77cda4945339f0165265fec6e1ae2d913c345f3617,2024-07-03T16:12:55.173000
CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000
CVE-2024-2786,0,0,8ed89c394db0a4298af6ad355228ba4ef878fdf7e45e835968fbe7eb06ba76d1,2024-04-10T13:23:38.787000
CVE-2024-27862,1,1,e1074f87e7442ac605245fa9d9c07b3a7668072e08ef1bd41f1661a683bca55a,2024-07-29T23:15:10.363000
CVE-2024-27863,1,1,1196f189ac028a8c13a2b2399a50df84a9882a1282df70d07ccd25da9799d4f8,2024-07-29T23:15:10.423000
CVE-2024-27867,0,0,c8c0bef10450917c014bb0f5b8c10be2f4bd90c5c93e6cf14274f5f577a33a76,2024-07-04T05:15:15.540000
CVE-2024-2787,0,0,2d4ec32358f3e4fff4e28d01c0d898cc511d2c65fccc3f39ec557fb8f116ac98,2024-04-10T13:23:38.787000
CVE-2024-27871,1,1,20c0ed501f922aade5238514c8fe0564a519e1368175f2c68cfd73b0aa73d960,2024-07-29T23:15:10.490000
CVE-2024-27872,1,1,5b11feb487c7ac167ff50ccad0b6e9fe79e595a4ae3327adf51cf603d0ae7f9b,2024-07-29T23:15:10.557000
CVE-2024-27873,1,1,6ac1b86ae3e000df5fa034f49e62d43ce367c98a14ef3892b9d586e4a5062a64,2024-07-29T23:15:10.620000
CVE-2024-27877,1,1,5319a3ef50433183786e283de8252b3e9a8130945e9948fcc308f584ff5c5c54,2024-07-29T23:15:10.690000
CVE-2024-27878,1,1,9a77834a5956c098be4d95f8c0f67872cb9a57fba088268573cb0735307ca1ae,2024-07-29T23:15:10.747000
CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000
CVE-2024-27881,1,1,7ad8e556325aa06778118ac11e882460462c1565acf06446bba0ddd884bd11e8,2024-07-29T23:15:10.807000
CVE-2024-27882,1,1,0ba7846f97ad521269a665cdf4a8ae2591286faeb255e2dad55a3b7319e0696b,2024-07-29T23:15:10.877000
CVE-2024-27883,1,1,1e383cd32db13b5129923e521bf8d1ae67e437433a5f67b5096885db85429aaa,2024-07-29T23:15:10.940000
CVE-2024-27884,1,1,58f140c86c751c1d006370d1b382cff8ce96aa13987c7a12cceefe129ef896fe,2024-07-29T23:15:11.010000
CVE-2024-27885,0,0,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000
CVE-2024-27886,1,1,b9c10b0713ecceb64f6d0ee0382d80b2e23963dfcf9884061b6819e73ec8038d,2024-07-29T23:15:11.067000
CVE-2024-27887,1,1,6f75ea8b69ff3ac4420432ff26b71b2c18ffe3d8188390513addf2d75be2cf58,2024-07-29T23:15:11.127000
CVE-2024-27888,1,1,be829e5e2f7a9a324e9f28c352e77afa2aa91e3ee0900845899f816120ee07af,2024-07-29T23:15:11.183000
CVE-2024-27889,0,0,7117aad45d32aeaef1ee1fabf03a8eb1a99ce1846aae926fc9cdd323c7a5b8ea,2024-03-05T13:41:01.900000
CVE-2024-2789,0,0,34742259502804c5b95d3d9e3233d720754fd74f45f9568c62dc8f4e6bc9ffb3,2024-04-10T13:23:38.787000
CVE-2024-27894,0,0,a037a624d2f95391d5ae19191b0926bbf6c393d1d253b2842dc172d91ee0ac42,2024-05-01T17:15:30.557000
@ -250892,6 +250911,7 @@ CVE-2024-32166,0,0,0d336fd2663f53ad5073af796b0f13018ac3836e84a93337db7f44ece472c
CVE-2024-32167,0,0,4748c69f7eec35b2beddc2dc94362f1e2e767018d85482f9559e46e4a468fd84,2024-06-12T18:00:30.120000
CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000
CVE-2024-3219,1,1,9249843b8f2b4d97479f83df5e1511c116eb732df4bef87e522d211cc11d7539,2024-07-29T22:15:04.970000
CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000
CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000
CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000
@ -254689,8 +254709,8 @@ CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000
CVE-2024-38271,0,0,38702e993143f28dff98f8a009090e500c461857dbbfb4642cc6600e0270049f,2024-06-27T12:47:19.847000
CVE-2024-38272,0,0,56b2095985e7f6c32ea69c0888f53e8cdc0431545419063cc54478b41f8371d3,2024-06-27T12:47:19.847000
CVE-2024-38271,0,1,a55d517f1e451a20db301f87d88d99f6d0173df1fa03dd913b12a59d024f897d,2024-07-29T22:15:04.757000
CVE-2024-38272,0,1,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1568,2024-07-29T22:15:04.883000
CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000
CVE-2024-38274,0,0,3f34dcdbcb04b3bd1c27e63f0c6c999c7639ff04bd1f29bc2ba555ae3687211a,2024-06-27T03:15:50.233000
CVE-2024-38275,0,0,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000
@ -255043,7 +255063,7 @@ CVE-2024-38759,0,0,b9fa7ce22eebb94e2617e669160f4e670eabfdcde229d0ec6de28ef0c8571
CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000
CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000
CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72aa,2024-06-04T19:20:25.903000
CVE-2024-38773,0,1,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000
CVE-2024-38773,0,0,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000
CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000
CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000
CVE-2024-38781,0,0,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000
@ -255051,7 +255071,7 @@ CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61
CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
CVE-2024-38788,0,1,b3310eca77eefd3eefd5fbc91ad027ce188932d22ffd466513f5156f93253a02,2024-07-29T20:19:47.727000
CVE-2024-38788,0,0,b3310eca77eefd3eefd5fbc91ad027ce188932d22ffd466513f5156f93253a02,2024-07-29T20:19:47.727000
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
@ -255747,12 +255767,62 @@ CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd47
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
CVE-2024-40767,0,0,01a151f22bd3f1cd8b44f314114a7bbe92f50d1e2d88d2bec8d0eaa4d4f7e2fb,2024-07-25T17:15:10.910000
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
CVE-2024-40774,1,1,038483d23bb2998316e588c9f4d57162f3e1389705e5d0280be486edb42825e7,2024-07-29T23:15:11.250000
CVE-2024-40775,1,1,178d1ae486637928ebc8a58e3fc99bfbf31fd4d917c655e124ad7b68ddad1dc9,2024-07-29T23:15:11.317000
CVE-2024-40776,1,1,be0866f437f31f9b403a9a240b02c79404035a8918a5cf44aa80d407abfc02a3,2024-07-29T23:15:11.387000
CVE-2024-40777,1,1,760bcf9b4899f086ab2da86ba07619aed6ebe1f0122e1da20103034d7a71b0ed,2024-07-29T23:15:11.457000
CVE-2024-40778,1,1,4131521b8a9786888d9b56825e090b708bbba950c7aeb4e940402d5f5a1f7d20,2024-07-29T23:15:11.527000
CVE-2024-40779,1,1,a7c06b8c08d8b945e6a44e3af8132e34cb9b7bcf62dd7e42ca680bba1108f610,2024-07-29T23:15:11.590000
CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000
CVE-2024-40780,1,1,951f08bd17fbe60aa6a9ce133aeaa5e9571e4dbfdf0101f4237092436fb279f9,2024-07-29T23:15:11.660000
CVE-2024-40781,1,1,82536600101ac07df8ec671c79667a7efa9870f8e78cbc4fe6f6494a06e8525d,2024-07-29T23:15:11.727000
CVE-2024-40782,1,1,a9dd57fa446bc079345a9584f2f47f2681679aadb6c513618fa540b51ae615ae,2024-07-29T23:15:11.790000
CVE-2024-40783,1,1,11a16592e1f8587f380151ea90155837d7009f81ae2924d20e5859554c9e16d8,2024-07-29T23:15:11.853000
CVE-2024-40784,1,1,ab7ab7768a72b0743ab1aa9a6c9363348a7346f946e97a5da7d8b5367fe5fb10,2024-07-29T23:15:11.923000
CVE-2024-40785,1,1,be1282fdb4ce9702d300622af20280919009f2f6899e88f628bd3b6802bad330,2024-07-29T23:15:11.997000
CVE-2024-40786,1,1,f1371cbf8f0fe2b670fb351bbca0e2a58919af3ab6d54bae4cde1d5c101fb006,2024-07-29T23:15:12.070000
CVE-2024-40787,1,1,7d9c4623a4076f11e6e6cd510d01e19681ec41fbe76f83f92721f3ad82ab37da,2024-07-29T23:15:12.133000
CVE-2024-40788,1,1,a01d9fec4cc0df6480f77d4a31626523be9d0926047632f470ff0add872263c1,2024-07-29T23:15:12.200000
CVE-2024-40789,1,1,e905e285d44ad8c924ee962a522b126f8e9208694c91437fd8b5368404a61b83,2024-07-29T23:15:12.270000
CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000
CVE-2024-40793,1,1,4b5566e87c1b49e9c6ae623f682ca7555e0faa9d214accfae047488698d0fe6b,2024-07-29T23:15:12.337000
CVE-2024-40794,1,1,b8687b6d468e0c0c2c47cef98e51720b72e3e20fc4c8aa0515d263e02c3cfa84,2024-07-29T23:15:12.410000
CVE-2024-40795,1,1,fcea860c2ec7812aafd69527d5e4075c40a2bc8d136ee197f3895523b83ed289,2024-07-29T23:15:12.477000
CVE-2024-40796,1,1,757a069e62a9d4de1b1c62d828a0aeebceee945359afd3f7eb87748564ecd608,2024-07-29T23:15:12.540000
CVE-2024-40798,1,1,77637969bf8fe3db0cd56c0fd204792490e998a905e24fed29360640d949c4d4,2024-07-29T23:15:12.600000
CVE-2024-40799,1,1,1c67cb9faf60b0740689e6893ed3840c5fd677a8077230f760f07d8e539e554a,2024-07-29T23:15:12.667000
CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000
CVE-2024-40800,1,1,1eb80ceeabb78ee7321a1f4910e11f186d854b3b77df7bb9e237e9f391b6bf18,2024-07-29T23:15:12.743000
CVE-2024-40802,1,1,2e12a235d0ebf2e9a38e7e8888e28b3610a6fac3117833d6d5951a47ec86e485,2024-07-29T23:15:12.810000
CVE-2024-40803,1,1,692628f0f346ba5085c1b09a72ee54b99e25bb960c6aef9b8d51f4bd6126f0e7,2024-07-29T23:15:12.873000
CVE-2024-40804,1,1,c83775a5d61705b6393865ebbd0a1ce576be35645b1800885a04ed797d8d0498,2024-07-29T23:15:12.947000
CVE-2024-40805,1,1,15fdd4d3a584843c6b1bf54e33b6e505db6d1c262311d7d909c79ca651979cb5,2024-07-29T23:15:13.017000
CVE-2024-40806,1,1,a23d90ace0f8c121ed72b0be655db6d0abe655b722e668c9deba85ae1d9f03ac,2024-07-29T23:15:13.083000
CVE-2024-40807,1,1,e3cc12f3129adf0c3c57559caafa91f71cd7cea1bcc8329daa2840611c173f83,2024-07-29T23:15:13.147000
CVE-2024-40809,1,1,ffd9b17b4a63c6fc23b2a7356ece7dc8905c6aee41961ae019ab270a5c382702,2024-07-29T23:15:13.207000
CVE-2024-4081,0,0,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000
CVE-2024-40811,1,1,8d5b59fe6e9fb977b45dce0eba4212514ec064f0a8c02ca927951a1feedaa595,2024-07-29T23:15:13.273000
CVE-2024-40812,1,1,72b5ea9f510350b495b2925da066424db0567fc311ad3f98843e0fdd25776f57,2024-07-29T23:15:13.330000
CVE-2024-40813,1,1,2ac94ce6190328a172c8b8f496815d90c7485fca1fad9afc67d8184d7d507e0e,2024-07-29T23:15:13.397000
CVE-2024-40814,1,1,cca56b21dddf051984a27101bebac088cdf7ec39621e20affb28a987cf4b5f22,2024-07-29T23:15:13.460000
CVE-2024-40815,1,1,c673267933af03c692cea061b0bf8b806aeb212718e78b2e53da36e448b2820e,2024-07-29T23:15:13.523000
CVE-2024-40816,1,1,68bd94f9456482cbd1c3f610a919a27cffab48785f807d5844c4c3fa2866dcc9,2024-07-29T23:15:13.583000
CVE-2024-40817,1,1,b647788caa33fdf5af7d7443d5a6af64c83680ae0a1e5f283cb135b3bcc2787f,2024-07-29T23:15:13.647000
CVE-2024-40818,1,1,eb3183d90e40772501eb43fa589ae5c7b2c820c288387d4aa4aa13ceba1fef8c,2024-07-29T23:15:13.703000
CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000
CVE-2024-40821,1,1,6e052d0aa504590857a329cf8fc449cb10ae9818bbe1f72232e212199dab6a18,2024-07-29T23:15:13.770000
CVE-2024-40822,1,1,4495f5e697e3214503e6fccae0cc2b00f03d2e2b66c7fb9c6b1e7daf1a3b35d0,2024-07-29T23:15:13.840000
CVE-2024-40823,1,1,9dc5249a3184db2fe1f3e09cfb71482c85eb28533a5845b08ab000711fa5990d,2024-07-29T23:15:13.920000
CVE-2024-40824,1,1,c9c5611175e28c3d6c83706b6d62911fb5d46fa54b1763f08fb1089bb5b65eb8,2024-07-29T23:15:13.990000
CVE-2024-40827,1,1,eed76fb81c5d6d730c4dc6a5cf5685a607b34ebf60ab42324ae6de9c30623d70,2024-07-29T23:15:14.067000
CVE-2024-40828,1,1,3f70f0fa0be2593f0ee73515da54d4a0700be008ab4da51c082a90d1f23b7804,2024-07-29T23:15:14.130000
CVE-2024-40829,1,1,630f68721a8f60f069dcb66f55b03ff3124d1f2a3d9e6f2ab47d4b1e3944995a,2024-07-29T23:15:14.193000
CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000
CVE-2024-40832,1,1,61dde41120d247d3895c3b08dfed9ee6c04f15f3a0d664fcb3c8bb789da5265b,2024-07-29T23:15:14.257000
CVE-2024-40833,1,1,b66d9eca4ea48c6a7ddceb91e12109daecb518e5080a98290bc3b25e6e5970da,2024-07-29T23:15:14.333000
CVE-2024-40834,1,1,917f31cf67c8ca627e84cd5bd0ca9236d97a173c992cb480d28fd8b1c115a97a,2024-07-29T23:15:14.413000
CVE-2024-40835,1,1,2dcffeb7534755d3171743b1999186ef0b2e67ad4edc23df4503da4372e2959e,2024-07-29T23:15:14.487000
CVE-2024-40836,1,1,f8e29f638b0b6f8e26a3e2ab4cd1aafdd537a299a7ea18ea901de98586b0ea79,2024-07-29T23:15:14.570000
CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
@ -256811,7 +256881,7 @@ CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d8
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
CVE-2024-4879,0,0,56229bd7ffd4a409de97013360aaa6ca4ee318c9286f43f7eac51db8f9d45e53,2024-07-11T22:15:02.260000
CVE-2024-4879,0,1,aac607dfb1dd5f8e5400d9068a8a95b417c652d65a4ba884266aa1ba39b30390,2024-07-29T23:15:14.650000
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
CVE-2024-4883,0,0,2ff7450efd44772325cada3b845290dfe574175b9b5b8d8937e9a22721054fd1,2024-06-26T12:44:29.693000
@ -257096,7 +257166,7 @@ CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000
CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000
CVE-2024-5217,0,0,6832bb457ac7885c3d529aa58eea84d54813c374c2860ed54ebbfa064b5a7e35,2024-07-11T22:15:02.647000
CVE-2024-5217,0,1,d62fb791fdbb07b0b8870307225ce8097cab090bffae9c6698a1202201ccd2a3,2024-07-29T23:15:14.807000
CVE-2024-5218,0,0,3f0f08ad7c2d51d3a67b7d7a45835724ecc9f070958f49b8f27381122972dec7,2024-05-28T12:39:42.673000
CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000
CVE-2024-5220,0,0,c038ea6a169ab16726e3cd0d45ec2f73c131df5f0c00c638dfb0aa809792bfe5,2024-05-28T12:39:42.673000
@ -257607,7 +257677,7 @@ CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc
CVE-2024-5858,0,0,63cb7f6cd58686ca5ad3c57990888086a18b2814d4915e424991a00332eb64f9,2024-06-17T12:42:04.623000
CVE-2024-5859,0,0,72e4b113c686d9a3109f00890cd02d7c66daeaf956171b1cfade7c196becbe2c,2024-06-24T19:21:07.943000
CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000
CVE-2024-5861,0,1,0f6737e71badb31ad995141819e3de68ee07520527361b4ba51682844c68ec2b,2024-07-29T20:32:37.267000
CVE-2024-5861,0,0,0f6737e71badb31ad995141819e3de68ee07520527361b4ba51682844c68ec2b,2024-07-29T20:32:37.267000
CVE-2024-5862,0,0,441ab26bc80ed7c87de8e4be62f6bf1c86b995270dbb376cc8e089e80e683161,2024-06-24T19:26:47.037000
CVE-2024-5863,0,0,8eb388b46dfdca7ac79f7a3487053af7c103c168da16a20899b575731960eec2,2024-06-28T10:27:00.920000
CVE-2024-5864,0,0,539f12905317a790a13c7190e3394133674affd0cb1690d81cb0d56c8ad41bb1,2024-06-28T10:27:00.920000
@ -257759,7 +257829,7 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
CVE-2024-6094,0,1,21e31087817484583e2492fdd4981c05277a9dbc98ecae783fc36b2e123caf96,2024-07-29T20:20:51.257000
CVE-2024-6094,0,0,21e31087817484583e2492fdd4981c05277a9dbc98ecae783fc36b2e123caf96,2024-07-29T20:20:51.257000
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
@ -257958,7 +258028,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
CVE-2024-6387,0,0,18a0eee254c378cec8300ccfc21cb8052a8dc8829e64291b38d5c6284633aacb,2024-07-29T09:15:02.853000
CVE-2024-6387,0,1,584848f90a0e6d6513a757b32b891aa914d62444b8c645ccd87c69765fbbd0d2,2024-07-29T22:15:05.043000
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000
@ -258090,7 +258160,7 @@ CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520
CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000
CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000
CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000
CVE-2024-6620,1,1,93c6de4b06b208771165f294569491243a3290d2098714e195918c0b85e0bd6d,2024-07-29T20:15:03.910000
CVE-2024-6620,0,0,93c6de4b06b208771165f294569491243a3290d2098714e195918c0b85e0bd6d,2024-07-29T20:15:03.910000
CVE-2024-6621,0,0,75f7ea9becaa66b3030f6b54d6ea12535b72220300e49d7375089d25edbe8b2f,2024-07-16T13:43:58.773000
CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
@ -258189,7 +258259,7 @@ CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee6
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000
CVE-2024-6836,0,1,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
CVE-2024-6874,0,0,6fdb828244d0878bf4334f6c8b61a3ad657fa405006bc4b1bc91d03b240bfdb1,2024-07-24T12:55:13.223000
CVE-2024-6881,0,0,ae484b8b97ecbaca3d459a043a0b9e7c17dfa3db2ae41eab10b19174db4e67d5,2024-07-29T14:12:08.783000
@ -258334,3 +258404,8 @@ CVE-2024-7199,0,0,1c38ae71600e9c4c0d209d192fce66196ad6d1d1454dfe95d9b268bf29c6a5
CVE-2024-7200,0,0,d21a4dd541acbc0094d3b150aee5dc57732e3b43b8983d68802bfc40bea446f0,2024-07-29T14:12:08.783000
CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000
CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000
CVE-2024-7248,1,1,a2ddbed55de01980f63d0b9718ce842c14c9c1b9e6cdca518c180966561a19d1,2024-07-29T22:15:05.553000
CVE-2024-7249,1,1,c7fccf87c8ceb0c945e7a77936034d5c4e5006994b9df61388b67e431ddf2786,2024-07-29T22:15:05.817000
CVE-2024-7250,1,1,47214a6631c5e0c15e01a9d48696651797894eba964a53c781b9db24f665f066,2024-07-29T22:15:06.100000
CVE-2024-7251,1,1,2e9dec42abfd731f5e87da16a34d11bf2d0c37cf024df63f9ff50bc95cc7c004,2024-07-29T22:15:06.283000
CVE-2024-7252,1,1,aab68971ce2840239d9a3f49898d569965202598c905827f10884e2704b76876,2024-07-29T22:15:06.497000

Can't render this file because it is too large.