Auto-Update: 2024-09-09T20:00:18.574420+00:00

This commit is contained in:
cad-safe-bot 2024-09-09 20:03:17 +00:00
parent 5eb078aae5
commit 4a80d97b73
57 changed files with 2479 additions and 281 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48804",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-16T12:15:04.830",
"lastModified": "2024-07-16T13:43:58.773",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:19:25.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,173 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: vt_ioctl: corrige array_index_nospec en vt_setactivate array_index_nospec garantiza que un valor fuera de los l\u00edmites se establezca en cero en la ruta transitoria. Disminuir el valor en uno posteriormente provoca un desbordamiento de enteros transitorio. vsa.console debe reducirse primero y luego desinfectarse con array_index_nospec. Agradecimientos de Kasper: Jakob Koschel, Brian Johannesmeyer, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida del grupo VUSec en VU Amsterdam."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.302",
"matchCriteriaId": "EB8C5CE9-1D6E-4315-853C-949A5E076B69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.267",
"matchCriteriaId": "FD3CEBEB-60B8-4EA2-B346-6ADF49F754D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.320",
"matchCriteriaId": "3421D9CE-A117-4146-823F-2EC2FE3AD3E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.180",
"matchCriteriaId": "6808B38F-AD73-4D55-A158-6EF605E8EB66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.101",
"matchCriteriaId": "A154171E-A3B9-42BE-9E97-C9B0EA43FC54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.24",
"matchCriteriaId": "866451F0-299E-416C-B0B8-AE6B33E62CCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.10",
"matchCriteriaId": "679523BA-1392-404B-AB85-F5A5408B1ECC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/61cc70d9e8ef5b042d4ed87994d20100ec8896d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/778302ca09498b448620edd372dc908bebf80bdf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/830c5aa302ec16b4ee641aec769462c37f802c90",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ae3d57411562260ee3f4fd5e875f410002341104",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48820",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-16T12:15:05.943",
"lastModified": "2024-07-16T13:43:58.773",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:29:22.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,104 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: phy: stm32: corrige una fuga de recuento en stm32_usbphyc_pll_enable() Esta ruta de error debe disminuir \"usbphyc->n_pll_cons.counter\" antes de regresar."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.15.24",
"matchCriteriaId": "E4085917-8F39-402F-B183-8526BF102A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.10",
"matchCriteriaId": "679523BA-1392-404B-AB85-F5A5408B1ECC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0ad1a88fa3eb0ded7798f52b79bc33f75fc9a6d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/94b16ca86ab688ed6fad4548f70137f93cf1f0a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cfc826c88a79e22ba5d8001556eb2c7efd8a01b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30582",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.047",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T19:35:01.063",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se ha identificado una vulnerabilidad en la versi\u00f3n 20 de Node.js que afecta a los usuarios del modelo de permisos experimental cuando se utiliza el indicador --allow-fs-read con un argumento distinto de *. Esta falla surge de un modelo de permisos inadecuado que no restringe la supervisi\u00f3n de archivos a trav\u00e9s de la API fs.watchFile. Como resultado, los actores maliciosos pueden supervisar archivos a los que no tienen acceso de lectura expl\u00edcito. Tenga en cuenta que en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos es una caracter\u00edstica experimental de Node.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30583",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.117",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T19:35:01.927",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "fs.openAsBlob() puede eludir el modelo de permisos experimental al utilizar la restricci\u00f3n de lectura del sistema de archivos con el indicador `--allow-fs-read` en Node.js 20. Esta falla surge de una verificaci\u00f3n faltante en la API `fs.openAsBlob()`. Tenga en cuenta que en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos era una caracter\u00edstica experimental de Node.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30584",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.167",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T19:35:02.767",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 20 de Node.js, espec\u00edficamente en el modelo de permisos experimental. Esta falla est\u00e1 relacionada con el manejo inadecuado de la omisi\u00f3n de la ruta de acceso al verificar los permisos de los archivos. Tenga en cuenta que, en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos era una caracter\u00edstica experimental de Node.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30587",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.223",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T19:35:03.593",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad en la versi\u00f3n 20 de Node.js permite eludir las restricciones establecidas por el indicador --experimental-permission mediante el m\u00f3dulo inspector integrado (node:inspector). Al explotar la capacidad de la clase Worker de crear un \"trabajador interno\" con el s\u00edmbolo kIsInternal, los atacantes pueden modificar el valor isInternal cuando se adjunta un inspector dentro del constructor Worker antes de inicializar un nuevo WorkerImpl. Esta vulnerabilidad afecta exclusivamente a los usuarios de Node.js que emplean el mecanismo del modelo de permisos. Tenga en cuenta que en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos era una caracter\u00edstica experimental de Node.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-39333",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.287",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T18:35:00.937",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Los nombres de exportaci\u00f3n creados con fines malintencionados en un m\u00f3dulo WebAssembly importado pueden inyectar c\u00f3digo JavaScript. El c\u00f3digo inyectado puede tener acceso a datos y funciones a los que el m\u00f3dulo WebAssembly no tiene acceso, de forma similar a si el m\u00f3dulo WebAssembly fuera un m\u00f3dulo JavaScript. Esta vulnerabilidad afecta a los usuarios de cualquier l\u00ednea de versi\u00f3n activa de Node.js. La caracter\u00edstica vulnerable solo est\u00e1 disponible si Node.js se inicia con la opci\u00f3n de l\u00ednea de comandos `--experimental-wasm-modules`."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/october-2023-security-releases",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40548",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-29T15:15:08.893",
"lastModified": "2024-09-06T18:15:04.977",
"lastModified": "2024-09-09T18:15:02.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-190"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46809",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.343",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T18:35:01.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Las versiones de Node.js que incluyen una versi\u00f3n sin parches de OpenSSL o se ejecutan contra una versi\u00f3n vinculada din\u00e1micamente de OpenSSL que no tiene parches son vulnerables al ataque Marvin - https://people.redhat.com/~hkario/marvin/, si se permite el relleno PCKS #1 v1.5 al realizar el descifrado RSA usando una clave privada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-385"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50096",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-01T18:15:09.197",
"lastModified": "2024-01-09T18:29:41.817",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-09T18:35:04.350",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51092",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-26T18:15:08.173",
"lastModified": "2023-12-30T03:19:01.717",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-09T19:35:05.803",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51429",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2023-12-29T04:15:09.690",
"lastModified": "2024-01-04T23:36:16.723",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-09T18:35:06.063",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52286",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-31T07:15:07.580",
"lastModified": "2024-01-05T22:06:41.313",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-09T18:35:07.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7216",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-05T15:15:08.903",
"lastModified": "2024-06-12T13:15:49.690",
"lastModified": "2024-09-09T18:15:03.647",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-59"
"value": "CWE-22"
}
]
},

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-24510",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T19:15:13.197",
"lastModified": "2024-09-09T19:15:13.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Alinto SOGo before 5.10.0 allows a remote attacker to execute arbitrary code via the import function to the mail component."
}
],
"metrics": {},
"references": [
{
"url": "https://book.hacktricks.xyz/pentesting-web/xs-search/css-injection",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Alinto/sogo/commit/21468700718ed71774eaf2979ee59330fc569424",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2541",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-29T13:15:06.403",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:40:23.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.3.3",
"matchCriteriaId": "A7D6596C-29FE-4E4E-B064-E828B128E8BE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/popup-builder/trunk/com/libs/Importer.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/086cd6a0-adb6-4e12-b34c-630297f036f3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36138",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T16:15:02.620",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T18:35:09.367",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/july-2024-security-releases",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40643",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T15:15:11.597",
"lastModified": "2024-09-09T15:15:11.597",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40970",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.687",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:07:59.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,116 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Evitar la saturaci\u00f3n de la matriz hw_desc en dw-axi-dmac. Tengo un caso de uso donde nr_buffers = 3 y en el que cada descriptor est\u00e1 compuesto por 3 segmentos, lo que da como resultado que el canal DMA descs_allocated sea 9. Dado que axi_desc_put() maneja hw_desc considerando descs_allocated, este escenario provocar\u00eda un p\u00e1nico en el kernel (la matriz hw_desc se desbordar\u00e1). Para solucionar este problema, la propuesta es agregar un nuevo miembro a la estructura axi_dma_desc, donde mantenemos el n\u00famero de hw_descs asignados (axi_desc_alloc()) y lo usamos en axi_desc_put() para manejar la matriz hw_desc correctamente. Adem\u00e1s, propongo eliminar la llamada axi_chan_start_first_queued() despu\u00e9s de completar la transferencia, ya que se identific\u00f3 que puede ocurrir un desequilibrio (los descriptores iniciados pueden interrumpirse y la transferencia se ignora debido a que el canal DMA no est\u00e1 habilitado)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "DD1E49C8-DE20-4CCB-8715-3FB3FA95ABC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/333e11bf47fa8d477db90e2900b1ed3c9ae9b697",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c3bb96a20cd8db3b8824b2ff08b6cde4505c7e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9004784e8d68bcd1ac1376407ba296fa28f04dbe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dd42570018f5962c10f215ad9c21274ed5d3541e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e151ae1ee065cf4b8ce4394ddb9d9c8df6370c66",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40973",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.890",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:09:01.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medio: mtk-vcodec: posible deferencia de puntero nulo en SCP Es necesario verificar el valor de retorno de devm_kzalloc() para evitar la deferencia de puntero NULL. Esto es similar a CVE-2022-3113."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "97F8F699-7041-44A4-9087-0E1FFC0543C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3a693c7e243b932faee5c1fb728efa73f0abc39b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/53dbe08504442dc7ba4865c09b3bbf5fe849681b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f066882293b5ad359e44c4ed24ab1811ffb0b354",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40977",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:19.143",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:11:49.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7921s: soluciona posibles tareas bloqueadas durante la recuperaci\u00f3n del chip Durante la recuperaci\u00f3n del chip (por ejemplo, reinicio del chip), existe una posible situaci\u00f3n en la que el trabajador del kernel reset_work est\u00e9 manteniendo el bloqueo y esperando. El hilo del kernel stat_worker se estacionar\u00e1, mientras stat_worker est\u00e1 esperando la liberaci\u00f3n del mismo bloqueo. Provoca un punto muerto que resulta en el volcado de mensajes de tareas colgadas y un posible reinicio del dispositivo. Este parche evita la ejecuci\u00f3n de stat_worker durante la recuperaci\u00f3n del chip."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "35AF7215-0096-45EB-86C7-28C9322438E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/85edd783f4539a994d66c4c014d5858f490b7a02",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e974dd4c22a23ec3ce579fb6d31a674ac0435da9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ecf0b2b8a37c8464186620bef37812a117ff6366",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40980",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:19.550",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:15:41.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drop_monitor: reemplaza spin_lock por raw_spin_lock Se llama a trace_drop_common() con la preferencia deshabilitada y adquiere un spin_lock. Esto es problem\u00e1tico para los kernels RT porque los spin_locks son bloqueos inactivos en esta configuraci\u00f3n, lo que provoca el siguiente s\u00edmbolo: ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 1 , non_block: 0, pid: 449, nombre: rcuc/47 preempt_count: 1, esperado: 0 Profundidad del nido de RCU: 2, esperado: 2 5 bloqueos retenidos por rcuc/47/449: #0: ff1100086ec30a60 ((softirq_ctrl.lock) ){+.+.}-{2:2}, en: __local_bh_disable_ip+0x105/0x210 #1: fffffffffb394a280 (rcu_read_lock){....}-{1:2}, en: rt_spin_lock+0xbf/0x130 #2 : ffffffffb394a280 (rcu_read_lock){....}-{1:2}, en: __local_bh_disable_ip+0x11c/0x210 #3: ffffffffb394a160 (rcu_callback){....}-{0:0}, en: rcu_do_batch+0x360 /0xc70 #4: ff1100086ee07520 (&data->lock){+.+.}-{2:2}, en: trace_drop_common.constprop.0+0xb5/0x290 sello de evento irq: 139909 hardirqs habilitado por \u00faltima vez en (139908): [ ] _raw_spin_unlock_irqrestore+0x63/0x80 hardirqs deshabilitado por \u00faltima vez en (139909): [] trace_drop_common.constprop.0+0x26d/0x290 softirqs habilitado por \u00faltima vez en (139892): [ ] __local_bh_enable_ip+0x103/0x170 softirqs \u00faltimamente deshabilitado en (139898): [] rcu_cpu_kthread+0x93/0x1f0 Prelaci\u00f3n deshabilitada en: [] rt_mutex_slowunlock+0xab/0x2e0 CPU: 47 PID: 449 Comm: rcuc/47 No contaminado 6.9.0-rc2 - rt1+ #7 Nombre del hardware: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 15/04/2022 Seguimiento de llamadas: dump_stack_lvl+0x8c/0xd0 dump_stack+0x14/0x20 __might_resched+0x21e/0x2f0 rt_spin_lock+0x5e/0x130 ? trace_drop_common.constprop.0+0xb5/0x290? skb_queue_purge_reason.part.0+0x1bf/0x230 trace_drop_common.constprop.0+0xb5/0x290 ? preempt_count_sub+0x1c/0xd0? _raw_spin_unlock_irqrestore+0x4a/0x80? __pfx_trace_drop_common.constprop.0+0x10/0x10? rt_mutex_slowunlock+0x26a/0x2e0? skb_queue_purge_reason.part.0+0x1bf/0x230? __pfx_rt_mutex_slowunlock+0x10/0x10? skb_queue_purge_reason.part.0+0x1bf/0x230 trace_kfree_skb_hit+0x15/0x20 trace_kfree_skb+0xe9/0x150 kfree_skb_reason+0x7b/0x110 skb_queue_purge_reason.part.0+0x1bf/0x230 ? __pfx_skb_queue_purge_reason.part.0+0x10/0x10 ? mark_lock.part.0+0x8a/0x520 ... trace_drop_common() tambi\u00e9n desactiva las interrupciones, pero este es un problema menor porque podr\u00edamos reemplazarlo f\u00e1cilmente con local_lock. Reemplace spin_lock con raw_spin_lock para evitar dormir en un contexto at\u00f3mico."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "5EBA530D-458E-447C-8744-13D4429CCC4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/07ea878684dfb78a9d4f564c39d07e855a9e242e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/594e47957f3fe034645e6885393ce96c12286334",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76ce2f9125244e1708d29c1d3f9d1d50b347bda0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96941f29ebcc1e9cbf570dc903f30374909562f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b3722fb69468693555f531cddda5c30444726dac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f1e197a665c2148ebc25fe09c53689e60afea195",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f251ccef1d864790e5253386e95544420b7cd8f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40981",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:19.627",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:16:52.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,158 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: batman-adv: evita dep\u00f3sitos vac\u00edos en batadv_purge_orig_ref() Muchos informes de syzbot apuntan a bloqueos suaves en batadv_purge_orig_ref() [1] Se desconoce la causa ra\u00edz, pero podemos evitar gastar demasiado pasar tiempo all\u00ed y tal vez obtener informes m\u00e1s interesantes. [1] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#0 bloqueada durante 27 segundos! [kworker/u4:6:621] M\u00f3dulos vinculados en: sello de evento irq: 6182794 hardirqs habilitados por \u00faltima vez en (6182793): [] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386 hardirqs deshabilitados por \u00faltima vez en (6182794) : [] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs deshabilitado por \u00faltima vez en (6182794): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common .c:551 softirqs habilitado por \u00faltima vez en (6182792): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs habilitado por \u00faltima vez en (6182792): [] batadv_purge_orig_ref+0x114c/0x122 8 netos/ batman-adv/originator.c:1287 softirqs deshabilitados por \u00faltima vez en (6182790): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs deshabilitados por \u00faltima vez en (6182790): [] batadv_purge_orig_ref+ 0x164/0x1228 net/batman-adv/originator.c:1271 CPU: 0 PID: 621 Comm: kworker/u4:6 No contaminado 6.8.0-rc7-syzkaller-g707081b61156 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Motor, BIOS Google 29/02/2024 Cola de trabajo: bat_events batadv_purge_orig pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: deber\u00eda_resched arch/arm64/include/asm/preempt.h:79 [en l\u00ednea] pc: __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388 lr: __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386 sp: ffff800099007970 x29: ffff800099007980 x28: 018fce1bd x27: dfff800000000000 x26: ffff0000d2620008 x25: ffff0000c7e70de8 x24 : 0000000000000001 x23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4 x20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: a817bb0 x17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001 x14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000000 3 x11: 0000000000000000 x10: 0000000000ff0100 x9: 0000000000000000 x8: 00000000005e5789 x7: ffff80008aab61dc x6: 0000000000000000 x5: 0000000000000000 x4: 0000000000000001 x3: 00000000000000000 x2: 0000000000000006 x1: 00000000000080 x0: ffff800125414000 Rastreo de llamadas: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [en l\u00ednea] arch_local_irq_enable arch/arm64/include /asm/irqflags.h:49 [en l\u00ednea] __local_bh_enable_ip+0x228/0x44c kernel/softirq.c: 386 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h: 167 [en l\u00ednea] 210 spin_unlock_bh include/linux/spinlock.h:396 [en l\u00ednea] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287 batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300 Process_one_work+0x694/0x120 4 kernel/workqueue.c:2633 Process_scheduled_works kernel/workqueue.c:2706 [en l\u00ednea] trabajador_thread+0x938/0xef4 kernel/workqueue.c:2787 kthread+0x288/0x310 kernel/kthread.c:388 ret_from_fork+0x10/0x20 arch/arm64 /kernel/entry.S:860 Env\u00edo de NMI desde la CPU 0 a las CPU 1: rastreo de NMI para la CPU 1 CPU: 1 PID: 0 Comm: swapper/1 No contaminado 6.8.0-rc7-syzkaller-g707081b61156 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 29/02/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: arch_local_irq_enable+0x8/0xc arch/arm64/include/asm /irqflags.h:51 lr: default_idle_call+0xf8/0x128 kernel/sched/idle.c:103 sp: ffff800093a17d30 x29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4 x26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002 x23: 1ffff00011d93a74 x22:---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/154e3f862ba33675cf3f4abf0a0a309a89df87d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2685008a5f9a636434a8508419cee8158a2f52c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/40dc8ab605894acae1473e434944924a22cfaaa0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/79636f636126775436a11ee9cf00a9253a33ac11",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/82cdea8f3af1e36543c937df963d108c60bea030",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/92176caf9896572f00e741a93cecc0ef1172da07",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ae7f3cffe86aea3da0e8e079525a1ae619b8862a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fed7914858a1f1f3e6350bb0f620d6ef15107d16",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40982",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:19.800",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T18:13:13.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ssb: corrige la posible desreferencia del puntero NULL en ssb_device_uevent() La funci\u00f3n ssb_device_uevent() primero intenta convertir el puntero 'dev' en 'struct ssb_device *'. Sin embargo, por error elimina la referencia a 'dev' antes de realizar la comprobaci\u00f3n NULL, lo que podr\u00eda provocar una desreferencia del puntero NULL si 'dev' es NULL. Para solucionar este problema, mueva la marca NULL antes de eliminar la referencia al puntero 'dev', asegur\u00e1ndose de que el puntero sea v\u00e1lido antes de intentar usarlo. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "97F8F699-7041-44A4-9087-0E1FFC0543C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/789c17185fb0f39560496c2beab9b57ce1d0cbe7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7d43c8377c6fc846b1812f8df360425c9323dc56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c5dc2d8eb3981bae261ea7d1060a80868e886813",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-42759",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T19:15:13.270",
"lastModified": "2024-09-09T19:15:13.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Ellevo v.6.2.0.38160 allows a remote attacker to escalate privileges via the /api/usuario/cadastrodesuplente endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://csflabs.github.io/cve/2024/09/06/cve-2024-42759-approval-of-your-own-ticket-with-BFLA.html",
"source": "cve@mitre.org"
},
{
"url": "https://ellevo.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T17:15:13.120",
"lastModified": "2024-09-09T17:15:13.120",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44334",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T18:15:03.837",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution due to insufficient parameter filtering in the CGI handling function of upgrade_filter.asp."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Swind1er/563789899a7a4b9c261045a15efea952",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44335",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T18:15:03.893",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DI-7003G v19.12.24A1, DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution (RCE) via version_upgrade.asp."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Swind1er/029fb2a9dab916f926fab40cc059223f",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44375",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T14:15:14.290",
"lastModified": "2024-09-09T14:15:14.290",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44720",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T16:15:02.780",
"lastModified": "2024-09-09T17:35:06.057",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44721",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T16:15:02.853",
"lastModified": "2024-09-09T16:15:02.853",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:35:10.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "SeaCMS v13.1 was discovered to a Server-Side Request Forgery (SSRF) via the url parameter at /admin_reslib.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/seacms-net/CMS/issues/23",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44849",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T18:15:03.957",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php."
}
],
"metrics": {},
"references": [
{
"url": "https://blog.extencil.me/information-security/cves/cve-2024-44849",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/extencil/CVE-2024-44849?tab=readme-ov-file",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45041",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T15:15:11.940",
"lastModified": "2024-09-09T15:15:11.940",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45296",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T19:15:13.330",
"lastModified": "2024-09-09T19:15:13.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/pillarjs/path-to-regexp/commit/29b96b4a1de52824e1ca0f49a701183cc4ed476f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pillarjs/path-to-regexp/commit/60f2121e9b66b7b622cc01080df0aabda9eedee6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45406",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T17:15:13.180",
"lastModified": "2024-09-09T17:15:13.180",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-45411",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T19:15:13.543",
"lastModified": "2024-09-09T19:15:13.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Twig is a template language for PHP. Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. This vulnerability is fixed in 1.44.8, 2.16.1, and 3.14.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4629",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-03T20:15:09.003",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-09T19:15:13.760",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,34 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6493",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6494",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6495",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6497",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6499",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6500",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6501",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-4629",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5967",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-18T12:15:12.707",
"lastModified": "2024-06-20T12:44:01.637",
"lastModified": "2024-09-09T19:15:13.920",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,34 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6493",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6494",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6495",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6497",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6499",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6500",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6501",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-5967",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6162",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-20T15:15:50.570",
"lastModified": "2024-08-05T15:15:54.090",
"lastModified": "2024-09-09T18:15:04.023",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,14 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:1194",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4386",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4884",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7015",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-09T14:15:14.430",
"lastModified": "2024-09-09T14:15:14.430",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-7260",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-09T19:15:14.033",
"lastModified": "2024-09-09T19:15:14.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it redirects to a malicious server. This issue can result in a victim inadvertently trusting the destination of the redirect, potentially leading to a successful phishing attack or other types of attacks.\r\n\r\nOnce a crafted URL is made, it can be sent to a Keycloak admin via email for example. This will trigger this vulnerability when the user visits the page and clicks the link. A malicious actor can use this to target users they know are Keycloak admins for further attacks. It may also be possible to bypass other domain-related security checks, such as supplying this as a OAuth redirect uri. The malicious actor can further obfuscate the redirect_uri using URL encoding, to hide the text of the actual malicious website domain."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6502",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6503",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7260",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301875",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-7318",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-09T19:15:14.237",
"lastModified": "2024-09-09T19:15:14.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute.\r\nA one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-324"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6502",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6503",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7318",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301876",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-7341",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-09T19:15:14.450",
"lastModified": "2024-09-09T19:15:14.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6493",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6494",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6495",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6497",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6499",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6500",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6501",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6502",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6503",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7341",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302064",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8042",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-09-09T15:15:12.340",
"lastModified": "2024-09-09T15:15:12.340",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8372",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2024-09-09T15:15:12.560",
"lastModified": "2024-09-09T15:15:12.560",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8373",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2024-09-09T15:15:12.887",
"lastModified": "2024-09-09T16:15:02.927",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8509",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-06T16:15:03.583",
"lastModified": "2024-09-06T16:46:26.830",
"lastModified": "2024-09-09T19:15:14.837",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Forklift Controller.\u00a0 There is no verification against the authorization header except to ensure it uses bearer authentication. Without an Authorization header and some form of a Bearer token, a 401 error occurs. The presence of a token value provides a 200 response with the requested information."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Forklift Controller. No hay verificaci\u00f3n con respecto al encabezado de autorizaci\u00f3n, excepto para garantizar que utilice autenticaci\u00f3n de portador. Sin un encabezado de autorizaci\u00f3n y alg\u00fan tipo de token de portador, se produce un error 401. La presencia de un valor de token proporciona una respuesta 200 con la informaci\u00f3n solicitada."
}
],
"metrics": {
@ -48,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6487",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-8509",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8573",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T10:15:01.907",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-09T18:45:08.053",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,76 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.8cu.5207:*:*:*:*:*:*:*",
"matchCriteriaId": "8D79150A-A520-4A64-BBB5-BAD9DA00DF42"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setParentalRules.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.276807",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276807",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401262",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8574",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T11:15:10.430",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-09T18:47:10.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setUpgradeFW.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.276808",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276808",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401289",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8575",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T17:15:11.390",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-09T18:47:45.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setWiFiScheduleCfg.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.276809",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276809",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401263",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8576",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T18:15:02.313",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-09T18:59:57.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +150,98 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*",
"matchCriteriaId": "256F9D43-3753-4557-92C0-744E09076B4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C410805-E3D4-4F8C-8DF4-013ACE3937FA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.276810",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276810",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401264",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8577",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T19:15:10.203",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-09T18:51:32.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,98 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*",
"matchCriteriaId": "256F9D43-3753-4557-92C0-744E09076B4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C410805-E3D4-4F8C-8DF4-013ACE3937FA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setStaticDhcpRules.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.276811",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276811",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401265",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8578",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T19:15:10.453",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-09T18:46:00.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setWiFiMeshName.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.276812",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276812",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401290",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8604",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-09T16:15:03.203",
"lastModified": "2024-09-09T16:15:03.203",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8605",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-09T16:15:03.570",
"lastModified": "2024-09-09T16:15:03.570",
"vulnStatus": "Received",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-09T18:00:19.755140+00:00
2024-09-09T20:00:18.574420+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-09T17:59:29.787000+00:00
2024-09-09T19:35:05.803000+00:00
```
### Last Data Feed Release
@ -33,50 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262217
262227
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `10`
- [CVE-2024-44333](CVE-2024/CVE-2024-443xx/CVE-2024-44333.json) (`2024-09-09T17:15:13.120`)
- [CVE-2024-44720](CVE-2024/CVE-2024-447xx/CVE-2024-44720.json) (`2024-09-09T16:15:02.780`)
- [CVE-2024-44721](CVE-2024/CVE-2024-447xx/CVE-2024-44721.json) (`2024-09-09T16:15:02.853`)
- [CVE-2024-45406](CVE-2024/CVE-2024-454xx/CVE-2024-45406.json) (`2024-09-09T17:15:13.180`)
- [CVE-2024-8604](CVE-2024/CVE-2024-86xx/CVE-2024-8604.json) (`2024-09-09T16:15:03.203`)
- [CVE-2024-8605](CVE-2024/CVE-2024-86xx/CVE-2024-8605.json) (`2024-09-09T16:15:03.570`)
- [CVE-2024-24510](CVE-2024/CVE-2024-245xx/CVE-2024-24510.json) (`2024-09-09T19:15:13.197`)
- [CVE-2024-42759](CVE-2024/CVE-2024-427xx/CVE-2024-42759.json) (`2024-09-09T19:15:13.270`)
- [CVE-2024-44334](CVE-2024/CVE-2024-443xx/CVE-2024-44334.json) (`2024-09-09T18:15:03.837`)
- [CVE-2024-44335](CVE-2024/CVE-2024-443xx/CVE-2024-44335.json) (`2024-09-09T18:15:03.893`)
- [CVE-2024-44849](CVE-2024/CVE-2024-448xx/CVE-2024-44849.json) (`2024-09-09T18:15:03.957`)
- [CVE-2024-45296](CVE-2024/CVE-2024-452xx/CVE-2024-45296.json) (`2024-09-09T19:15:13.330`)
- [CVE-2024-45411](CVE-2024/CVE-2024-454xx/CVE-2024-45411.json) (`2024-09-09T19:15:13.543`)
- [CVE-2024-7260](CVE-2024/CVE-2024-72xx/CVE-2024-7260.json) (`2024-09-09T19:15:14.033`)
- [CVE-2024-7318](CVE-2024/CVE-2024-73xx/CVE-2024-7318.json) (`2024-09-09T19:15:14.237`)
- [CVE-2024-7341](CVE-2024/CVE-2024-73xx/CVE-2024-7341.json) (`2024-09-09T19:15:14.450`)
### CVEs modified in the last Commit
Recently modified CVEs: `32`
Recently modified CVEs: `45`
- [CVE-2024-27784](CVE-2024/CVE-2024-277xx/CVE-2024-27784.json) (`2024-09-09T16:16:47.253`)
- [CVE-2024-27785](CVE-2024/CVE-2024-277xx/CVE-2024-27785.json) (`2024-09-09T16:18:45.420`)
- [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-09-09T16:15:02.413`)
- [CVE-2024-2935](CVE-2024/CVE-2024-29xx/CVE-2024-2935.json) (`2024-09-09T16:15:02.587`)
- [CVE-2024-33509](CVE-2024/CVE-2024-335xx/CVE-2024-33509.json) (`2024-09-09T17:06:37.737`)
- [CVE-2024-38651](CVE-2024/CVE-2024-386xx/CVE-2024-38651.json) (`2024-09-09T17:35:02.663`)
- [CVE-2024-39498](CVE-2024/CVE-2024-394xx/CVE-2024-39498.json) (`2024-09-09T17:47:58.640`)
- [CVE-2024-39714](CVE-2024/CVE-2024-397xx/CVE-2024-39714.json) (`2024-09-09T17:35:03.387`)
- [CVE-2024-39715](CVE-2024/CVE-2024-397xx/CVE-2024-39715.json) (`2024-09-09T16:35:04.780`)
- [CVE-2024-40710](CVE-2024/CVE-2024-407xx/CVE-2024-40710.json) (`2024-09-09T17:35:04.207`)
- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-09-09T16:35:05.923`)
- [CVE-2024-40712](CVE-2024/CVE-2024-407xx/CVE-2024-40712.json) (`2024-09-09T16:35:06.673`)
- [CVE-2024-40964](CVE-2024/CVE-2024-409xx/CVE-2024-40964.json) (`2024-09-09T17:48:55.847`)
- [CVE-2024-40965](CVE-2024/CVE-2024-409xx/CVE-2024-40965.json) (`2024-09-09T17:57:18.697`)
- [CVE-2024-40967](CVE-2024/CVE-2024-409xx/CVE-2024-40967.json) (`2024-09-09T17:58:49.700`)
- [CVE-2024-40969](CVE-2024/CVE-2024-409xx/CVE-2024-40969.json) (`2024-09-09T17:59:29.787`)
- [CVE-2024-42019](CVE-2024/CVE-2024-420xx/CVE-2024-42019.json) (`2024-09-09T17:35:05.247`)
- [CVE-2024-6274](CVE-2024/CVE-2024-62xx/CVE-2024-6274.json) (`2024-09-09T16:15:27.780`)
- [CVE-2024-6275](CVE-2024/CVE-2024-62xx/CVE-2024-6275.json) (`2024-09-09T17:20:46.777`)
- [CVE-2024-6276](CVE-2024/CVE-2024-62xx/CVE-2024-6276.json) (`2024-09-09T17:20:48.280`)
- [CVE-2024-6277](CVE-2024/CVE-2024-62xx/CVE-2024-6277.json) (`2024-09-09T17:20:50.147`)
- [CVE-2024-6278](CVE-2024/CVE-2024-62xx/CVE-2024-6278.json) (`2024-09-09T17:20:52.050`)
- [CVE-2024-6279](CVE-2024/CVE-2024-62xx/CVE-2024-6279.json) (`2024-09-09T17:20:45.137`)
- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T16:15:02.927`)
- [CVE-2024-8517](CVE-2024/CVE-2024-85xx/CVE-2024-8517.json) (`2024-09-09T16:15:03.053`)
- [CVE-2024-40980](CVE-2024/CVE-2024-409xx/CVE-2024-40980.json) (`2024-09-09T18:15:41.347`)
- [CVE-2024-40981](CVE-2024/CVE-2024-409xx/CVE-2024-40981.json) (`2024-09-09T18:16:52.780`)
- [CVE-2024-40982](CVE-2024/CVE-2024-409xx/CVE-2024-40982.json) (`2024-09-09T18:13:13.997`)
- [CVE-2024-44333](CVE-2024/CVE-2024-443xx/CVE-2024-44333.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-44375](CVE-2024/CVE-2024-443xx/CVE-2024-44375.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-44720](CVE-2024/CVE-2024-447xx/CVE-2024-44720.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-44721](CVE-2024/CVE-2024-447xx/CVE-2024-44721.json) (`2024-09-09T18:35:10.070`)
- [CVE-2024-45041](CVE-2024/CVE-2024-450xx/CVE-2024-45041.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-45406](CVE-2024/CVE-2024-454xx/CVE-2024-45406.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-4629](CVE-2024/CVE-2024-46xx/CVE-2024-4629.json) (`2024-09-09T19:15:13.760`)
- [CVE-2024-5967](CVE-2024/CVE-2024-59xx/CVE-2024-5967.json) (`2024-09-09T19:15:13.920`)
- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-09-09T18:15:04.023`)
- [CVE-2024-7015](CVE-2024/CVE-2024-70xx/CVE-2024-7015.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-8042](CVE-2024/CVE-2024-80xx/CVE-2024-8042.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-8509](CVE-2024/CVE-2024-85xx/CVE-2024-8509.json) (`2024-09-09T19:15:14.837`)
- [CVE-2024-8573](CVE-2024/CVE-2024-85xx/CVE-2024-8573.json) (`2024-09-09T18:45:08.053`)
- [CVE-2024-8574](CVE-2024/CVE-2024-85xx/CVE-2024-8574.json) (`2024-09-09T18:47:10.577`)
- [CVE-2024-8575](CVE-2024/CVE-2024-85xx/CVE-2024-8575.json) (`2024-09-09T18:47:45.917`)
- [CVE-2024-8576](CVE-2024/CVE-2024-85xx/CVE-2024-8576.json) (`2024-09-09T18:59:57.423`)
- [CVE-2024-8577](CVE-2024/CVE-2024-85xx/CVE-2024-8577.json) (`2024-09-09T18:51:32.377`)
- [CVE-2024-8578](CVE-2024/CVE-2024-85xx/CVE-2024-8578.json) (`2024-09-09T18:46:00.300`)
- [CVE-2024-8604](CVE-2024/CVE-2024-86xx/CVE-2024-8604.json) (`2024-09-09T18:30:12.050`)
- [CVE-2024-8605](CVE-2024/CVE-2024-86xx/CVE-2024-8605.json) (`2024-09-09T18:30:12.050`)
## Download and Usage

View File

@ -115876,7 +115876,7 @@ CVE-2018-15456,0,0,2f5375f8b0f509603fd54b269e38b48a0e84eb432e0fcde4bdc157b3e7a84
CVE-2018-15457,0,0,cdfe8cdb910400a06d0e86e52da3f71533948b4b17b6875b4bad1a18bc50537e,2019-10-09T23:35:40.640000
CVE-2018-15458,0,0,4eb5b07daaa1a3f80fe57f2e45110d3b67ae8f6a4650f78feb2a0f6ffefe59ab,2019-10-09T23:35:40.797000
CVE-2018-15459,0,0,dae7ef94e050cebb33367e92f31c861188eddb57780a1409c0e04bdc73180bad,2019-10-09T23:35:40.953000
CVE-2018-1546,0,1,3445ce9333d207bad13225edf4b9047dfb47f100802c6b2ac38b0a302e5dca2d,2024-09-09T17:15:12.590000
CVE-2018-1546,0,0,3445ce9333d207bad13225edf4b9047dfb47f100802c6b2ac38b0a302e5dca2d,2024-09-09T17:15:12.590000
CVE-2018-15460,0,0,042368f743de9f2440d9b065fb6145817fac73be370a0d72fa5ee01a063e76b6,2020-09-16T14:14:08.843000
CVE-2018-15461,0,0,ae67f638beec243dec718374a8e6b1c09ecf1f3102af33850b52c3310bf7421b,2019-10-09T23:35:41.280000
CVE-2018-15462,0,0,bc1e46ac08a8d665be64afdd3c2427983783a6b60ca748eaa2e219b2bc09cf74,2019-10-03T00:03:26.223000
@ -212328,7 +212328,7 @@ CVE-2022-48800,0,0,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764
CVE-2022-48801,0,0,6653f1f5cf0e260b8c6a7c11277b02305adc16a1936040a89c4ab1b97527a852,2024-07-16T13:43:58.773000
CVE-2022-48802,0,0,9a5cfaff9acf94bf883296dd5ba65bc3c4b5cb5bacd82a666569b25935f67533,2024-07-16T13:43:58.773000
CVE-2022-48803,0,0,b4abff8be2e0f42801670ccff819cb36f420c74818031cf95a4f7137a7cf8225,2024-07-16T13:43:58.773000
CVE-2022-48804,0,0,7b262e00543ee3abd61edfedc09999a236ba244c1b97838dcc5b87faeba44fcc,2024-07-16T13:43:58.773000
CVE-2022-48804,0,1,1b544566e59d6cffc6a436e6a1e0e0355c4ed4d6d21e76bf59dd431d7c793a87,2024-09-09T18:19:25.403000
CVE-2022-48805,0,0,1a85ecd026455dac598947ecf46991ebc6a297c8cfda5f81b2eb41ab166a105a,2024-07-16T13:43:58.773000
CVE-2022-48806,0,0,aab5dfcaa90219a156231aad53f6d381bb84936e0bc5d4e4673459ac613f9b8c,2024-07-16T13:43:58.773000
CVE-2022-48807,0,0,de4929b5d1af2a8b0746e646b92b98ec03a88450fa058b3f8f0950077f98e404,2024-07-16T13:43:58.773000
@ -212346,7 +212346,7 @@ CVE-2022-48817,0,0,b46f580097fc3446dd0a4e8effd9ba59641fc06b8157edecf15fc766f2b5c
CVE-2022-48818,0,0,490ab441382474b175b901a53e5b7997385eb34ded426f7732ed36b0ed6a91f0,2024-07-16T13:43:58.773000
CVE-2022-48819,0,0,3b59299a47183c811c678e9c959fa3b53a49e93a33e7c29b6f620af028b259f9,2024-07-16T13:43:58.773000
CVE-2022-4882,0,0,6431d8699c3a0e0de78e9a56f61f6085416d72ba627cb8ae8a8a7725b50d9e3d,2024-05-17T02:17:01.177000
CVE-2022-48820,0,0,eab5df0989f0bec25fac3e29c61610f1e6f346ee5a9ec3fdda7834c7f896ed90,2024-07-16T13:43:58.773000
CVE-2022-48820,0,1,4dc5234f8e0022a650ebe0992dbe952a33672a36621be06d7a3d7c00e6a2a0bb,2024-09-09T18:29:22.697000
CVE-2022-48821,0,0,b2b9beaf3eef7e0d58b6f3d5cef3aed812b905a0edd4edce8e22c30bf1fa6614,2024-07-16T13:43:58.773000
CVE-2022-48822,0,0,504fa85be5a0659b456edd37017742da59d88f0b837d311430c41c5108ef4e6f,2024-08-07T19:14:37.987000
CVE-2022-48823,0,0,2038485fb972a6fe90032e25ff6c2381b5cc1bc3476a14d2e6b20c51a52fde80,2024-07-16T13:43:58.773000
@ -222985,12 +222985,12 @@ CVE-2023-30576,0,0,a7beef98c4aaaa905d0d5c6034ba03cdb4e7ff8c323a7c6da61dd78d972b1
CVE-2023-30577,0,0,545749b2d6af0de8487bf303128bd274f5cfec0c086fb3a542d149f7fd574f53,2023-12-03T11:15:09.093000
CVE-2023-3058,0,0,9f7c305f8337fa20576361292d1d535cd2135f70c208fde6ed8bf974c1470dc5,2024-05-17T02:27:14.193000
CVE-2023-30581,0,0,b156a6b818374eedaecff7e6959cc25150181fbf1ed9a43d050cab8b1b8a4335,2023-12-11T20:49:02.543000
CVE-2023-30582,0,0,c932b44938f4079ec044b351ea1af1f2511c47afcc538c7b314f7b09e2104f4e,2024-09-09T13:03:38.303000
CVE-2023-30583,0,0,30e6b0c75b4d0ef681e2804c9d2b2cecc17b1b5270b1712bb4062e6b5b9d417b,2024-09-09T13:03:38.303000
CVE-2023-30584,0,0,348b4881472be729071ac91cf7b17a24ca439e07b9527a2b967780a5179fd001,2024-09-09T13:03:38.303000
CVE-2023-30582,0,1,7764763ecd07c5fb15156b35aae4db9eecddd9d0dcb2778caae4e418824f86ee,2024-09-09T19:35:01.063000
CVE-2023-30583,0,1,180a89bfcb231691acf34b76fe1c45200ec66be43d4bfb42227e0f060994b9d7,2024-09-09T19:35:01.927000
CVE-2023-30584,0,1,4ca7fe4ac6e95803188870af7f0323774db0a16049fa3b512008d8655e4394c6,2024-09-09T19:35:02.767000
CVE-2023-30585,0,0,4c270ea88734f0edd78509d8eca027a2098d9c89d2347788290267fbf36f49ab,2023-12-02T04:39:59.250000
CVE-2023-30586,0,0,bf20da47c5f055ad21020c7e67c7d525452f8799511bd277d6297dbafc9d6310,2023-11-17T18:10:10.547000
CVE-2023-30587,0,0,5e2e622965334b0973f9b502df5a1b7ed8fd2562fd2ef6820267bcfbe1cfb5de,2024-09-09T13:03:38.303000
CVE-2023-30587,0,1,319d358c976ae59a060c690eb562a6d72294381e651bff2a1e2bd9226722e98e,2024-09-09T19:35:03.593000
CVE-2023-30588,0,0,a1703c01c91f7ec3f12518570aa157bec106a6e47a4b5c830fd25b2f5d06d7b9,2024-06-21T19:15:26.490000
CVE-2023-30589,0,0,2e59889aea8b4d185427929d8248c7db826a772bdb815f4373802aa8827ce2c4,2024-06-21T19:15:26.617000
CVE-2023-3059,0,0,413b081f7eb8c91071124c10af4f4a512e1fa5ceafbd6298e1af000983a7d7cf,2024-05-17T02:27:14.300000
@ -229652,7 +229652,7 @@ CVE-2023-39329,0,0,2e6ec28c106c0d41632f963bffc8abc1a0bced3a1e5cb0370e851b21b591d
CVE-2023-3933,0,0,fd05fb2b687b880ce3ff695aa73fe42db295a332bee8b3e8fcbec1c8e7b0fcf3,2023-11-07T04:20:00.337000
CVE-2023-39331,0,0,02e0e1777d37caa02d2e32057898fb63511ee952aee19eced37ec4fc0e898e8a,2024-06-18T15:09:45.857000
CVE-2023-39332,0,0,76475ddfcfc452a138e1e0d4562b5d86f4dae11801e2d070da4b6af1f66855fd,2023-11-17T19:08:58.170000
CVE-2023-39333,0,0,eb25d9f188bd48e6291dc8ea415b438dd96f96d3473e5bdea87cf2ba4139bd0f,2024-09-09T13:03:38.303000
CVE-2023-39333,0,1,f1c336b23631d038a7cfd086c12484d19bf24b54ff2885775efdf7ce31ca445c,2024-09-09T18:35:00.937000
CVE-2023-39335,0,0,391f1786a78e0058a74e18dc26ba57212893360fd836a250684e772b3c475f4c,2024-08-29T20:35:15.520000
CVE-2023-39336,0,0,7f65c1025b8952cb21ab7102eb78f50a55e120d2ebcfb5ff658c9fa94cb22ef1,2024-01-12T18:56:43.137000
CVE-2023-39337,0,0,8c951edb0fb6f01ae36b21083287fddd571172317d01af32e379473e8e700145,2024-08-29T20:35:16.230000
@ -230632,7 +230632,7 @@ CVE-2023-40544,0,0,0fc1193e5ecc7ee9670646c9d9c81e4c5888861b329951f2d39dd20b0e6ed
CVE-2023-40545,0,0,4532249010b6a6004e21372516818bfffe3ad51f3d0730df682026d0392eb917,2024-02-13T21:08:23.400000
CVE-2023-40546,0,0,840c430022137117c69e42a7f85a3f99312bf3dfec8a88942e88061a03dc1303,2024-06-10T18:15:21.780000
CVE-2023-40547,0,0,9b90cf122878fddc15a84f80df6440afc6de66065e1022a164147da635a691b2,2024-06-10T18:15:22.260000
CVE-2023-40548,0,0,13c275dcecd2c5f26e2e13665bb54b31eb9a834291d8cf0e3c84f67d413bed2c,2024-09-06T18:15:04.977000
CVE-2023-40548,0,1,db0077eb81f27fc48574fa5abb038d4eeced71eb61d1e7cafee666a84f87d3ee,2024-09-09T18:15:02.980000
CVE-2023-40549,0,0,17a610c3a9d3095b0cee8a99f3d7863e83f494a96b51878da371261149b72c32,2024-06-10T18:15:22.643000
CVE-2023-4055,0,0,c84104f0c8ec282dfd40a04ff729cf2844caf560f3c96dbbf5c3172d6bb6b24f,2023-08-09T21:15:11.820000
CVE-2023-40550,0,0,a235f3871948c55fedc627d33971852268ff5ba363a67d042b3fb445b9b832f0,2024-06-10T18:15:22.887000
@ -235007,7 +235007,7 @@ CVE-2023-46805,0,0,7a9f1e3efe4219f546adedaa2f65c4351ffba57ecf76ecbea9c0806444d5c
CVE-2023-46806,0,0,49a0b042d8e030d1507dfed8a0c175f6283ca7615330bcadaded676c9bd069b4,2024-07-03T01:42:07.793000
CVE-2023-46807,0,0,c28cf6fba75d9bfea83f438d6bca59021e282ddfe25b1a9c7a037441645e037f,2024-07-03T01:42:08.520000
CVE-2023-46808,0,0,cdef8400d49144d76cd14db640e72e6ddc3bbdae9c9f71cbce92c9ab43c7187b,2024-08-01T13:45:01.253000
CVE-2023-46809,0,0,454828ff6bd6236115c4e85d8034f2d5ec56ba8d62d8982af07114c85e2e1ec6,2024-09-09T13:03:38.303000
CVE-2023-46809,0,1,62dde18d01e4774f90d6d2682a77703db225c6bafadad984aa4774ed53e18822,2024-09-09T18:35:01.803000
CVE-2023-4681,0,0,6a7d42fff12f87aaaa676e4a97a7c2caef6ee302b35c3ac3cee7aec36c668259,2023-09-05T16:22:15.077000
CVE-2023-46810,0,0,69baafce6135d40a26721e62348bd610599075db40480cebd36847b59a0b98f6,2024-05-31T19:14:47.793000
CVE-2023-46813,0,0,54a5b81ea9d5fb0a268b9293a603071610c41491ab8bbea7095535d094697af9,2024-01-11T21:15:10.350000
@ -237318,7 +237318,7 @@ CVE-2023-50090,0,0,c476d0fb0c72dbc426157be8704beeba97f6843ec0df2b7eb876f585bb888
CVE-2023-50092,0,0,9b5eb870c1af9df920495397b818b722f645aaddadf668a1cade852a54a92fc3,2024-01-09T19:39:59.947000
CVE-2023-50093,0,0,3da104dc37e2a018e58d93121ace050880b700d676b2d7db473966f620978bf8,2024-01-09T19:50:01.367000
CVE-2023-50094,0,0,43bbd3c4b3f369f9ac77b378fcc986f7239703c6b3052be3a7feca9bf9aaf24a,2024-08-14T17:15:14.267000
CVE-2023-50096,0,0,f8e77a782262f83cae33c8ff8d8d3c2adf457f6708523fce4c17c692603d44dc,2024-01-09T18:29:41.817000
CVE-2023-50096,0,1,9c848991d41e7bf6153eada9652df75b791b91c8dae7041fa96431554cd62b91,2024-09-09T18:35:04.350000
CVE-2023-5010,0,0,8d38283ab93a029b68cbc433c8961ef4a27d2a19531fef9c755ab346438d57c3,2023-12-26T21:32:44.960000
CVE-2023-50100,0,0,540e014c2a7bd6691cec68187a1f5e75325873f2b5dc36b700971e833119f876,2023-12-16T01:10:05.103000
CVE-2023-50101,0,0,82b8fd4ddf38bc06206832806c323d02e049401e0b3df47b6272a763467b06d8,2023-12-16T01:41:17.923000
@ -237923,7 +237923,7 @@ CVE-2023-51084,0,0,310a54590399af6643eb3f2a4d534733b8ed1310e66c361e30ecd1c61c0aa
CVE-2023-5109,0,0,b1680c33c28b14a73fc98da5a977c404ccdfed113d43fc7fd4273d648ec1169d,2023-11-07T04:23:27.700000
CVE-2023-51090,0,0,4d3f4f533c86af2ccf4958139d82f895410ea9776f7dc2f32f15ef7f778707be,2023-12-30T03:18:55.947000
CVE-2023-51091,0,0,4862f60c5196b686b7961ea2e69e95065afd3665910d647a779ddcd3efdb57e0,2023-12-30T03:18:57.887000
CVE-2023-51092,0,0,5eee074195a0df6f47d532a0f04803752f37a16dc2e1486b46f68a3474aaef45,2023-12-30T03:19:01.717000
CVE-2023-51092,0,1,f606ca6d1ba674ad50e8b0b19c6d9a426892876570e0377f0664932373ff0219,2024-09-09T19:35:05.803000
CVE-2023-51093,0,0,3d6b67adebe749bd817206bcd0e02b5d1bc52ecda0910c401c410327704e77f0,2023-12-30T03:19:03.393000
CVE-2023-51094,0,0,5f1f0ac9e1a5648e082b1ef4418467407a6110708c72b13d7737d27424ea2556,2023-12-30T03:19:05.307000
CVE-2023-51095,0,0,4b3d23f32f8ed6ac30a7e319e3905419feda24e9cfd08750a7214a46a3d17220,2023-12-30T03:18:50.037000
@ -238070,7 +238070,7 @@ CVE-2023-51425,0,0,f9e39da94c78596d7ea2c15c28c1c8a7a9fc609253cde02e6af946119dd74
CVE-2023-51426,0,0,d6e6b59005e83d3458df950140725ea70c726a3116055547e75034340319929e,2024-01-04T23:42:36.860000
CVE-2023-51427,0,0,99eda931f939f5d4dfc01593dfb07b995888779bc0a0a883a0da80baf598bc39,2024-01-04T23:40:05.267000
CVE-2023-51428,0,0,72588880e5357f8bdf42b541d20081c9705efb78cda0fbc25ef28cc3cd632102,2024-01-04T23:38:22.723000
CVE-2023-51429,0,0,d3daedf43952cd9dc24a6822854b461bb8f86e4deeebb783a5312d1cc6af2862,2024-01-04T23:36:16.723000
CVE-2023-51429,0,1,3ee51c7de5889195ac779d8bc8b3f2aee980d3c32726cb35f98a4d7acaf268f8,2024-09-09T18:35:06.063000
CVE-2023-5143,0,0,100c5c46321e49c9af8866e3f3edeaa776c8758c14e956ed2fc8b66251f5d1dc,2024-08-02T08:15:31.657000
CVE-2023-51430,0,0,4654395858fd5e64655dbdbde13a274df29b2f151ce1d7417d53b545080428bc,2024-01-05T16:04:45.100000
CVE-2023-51431,0,0,752bf4db2cb38815f84d32a045191d31ca45607b2c5d471d5b312d276f9891a4,2024-01-05T16:04:24.063000
@ -238731,7 +238731,7 @@ CVE-2023-52277,0,0,f3f2651ddfdfb750c7d8253e4068534e7f0600d1f540c0067c4d9fa61e6cc
CVE-2023-5228,0,0,9be4dce05638a6c6e82e9cfd37b8dc48d36a8a5248170a49a672ea0f8cf33037,2023-11-14T15:32:54.717000
CVE-2023-52284,0,0,49f8cbf866a818cc3793bc4227656111c408464168b5e3b1c991f1146a62de70,2024-01-08T19:07:52.047000
CVE-2023-52285,0,0,956740d4d21b61506275866a495151801a254b9adcdbe7994edf5590fa5ec0b4,2024-01-24T17:16:50.880000
CVE-2023-52286,0,0,d57c75df7d4ddd4390fb4bc0cb787c8d5ccb33cbef5a941d5aa3217832550aca,2024-01-05T22:06:41.313000
CVE-2023-52286,0,1,e0d74766b045a04a60f59d22cbe9fe7492937af52380aaa69b0702b384b2d4f4,2024-09-09T18:35:07.720000
CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9cdc0,2024-01-24T18:40:15.637000
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
@ -239629,7 +239629,7 @@ CVE-2023-5565,0,0,9e7b8f54cd6b3190a6c2dac08622e882b08cbd368e6fd157742d6c77ea5aee
CVE-2023-5566,0,0,12be08118b98fee554154ac5f8793e6b5b39c31b38e93f8ea1a17cb1449cc8ad,2023-11-07T04:24:08.480000
CVE-2023-5567,0,0,4a809f39fc79aea2b56a0f9381e47c90d1b0a4c5eac453c3a06cd429eeaab3fa,2023-11-14T19:11:40.360000
CVE-2023-5568,0,0,38d553e6bd63422157002920ac635048886ff5ffd8fe73a158c842ea275b4377,2023-11-24T09:15:09.767000
CVE-2023-5570,0,1,87f206bc52392a520ad049babd3b47e2251ec78d9da7033b6ff5cee06408ea7f,2024-09-09T16:35:01.990000
CVE-2023-5570,0,0,87f206bc52392a520ad049babd3b47e2251ec78d9da7033b6ff5cee06408ea7f,2024-09-09T16:35:01.990000
CVE-2023-5571,0,0,517e76e2863d0b91d16cb5f62e8628dcdcd61d5f895ca680836613c4517f20b9,2023-10-17T16:04:47.640000
CVE-2023-5572,0,0,d3874e77765ea8dd8afcd46f43f04e8854b2bc29554e637a4973cc68fd58bd1c,2023-10-17T16:08:09.450000
CVE-2023-5573,0,0,4fe63b19ad0fa3138adc11217ff249aecc853df2598d2ca13577829e18cb73dd,2023-10-17T16:08:58.677000
@ -239677,7 +239677,7 @@ CVE-2023-5619,0,0,a19fb0d9c1ec2158ccf365d70c7c69e74f9a9e11e8a35b996d155c23740d5b
CVE-2023-5620,0,0,4199d350e2e4c731dd763714d3bb3dd23b36ac346f07188e030f30ff30c41160,2023-12-02T04:36:03.177000
CVE-2023-5621,0,0,c418664501b2f113540a10fbe54573420e49f52f46bc96886f617927fd44a4ff,2023-11-07T04:24:12.930000
CVE-2023-5622,0,0,f19fe82900e70a4450099d29884259279e7aeae442e6aa22b36ae355f702bc7b,2023-11-07T18:04:15.357000
CVE-2023-5623,0,1,2f3b29c1eef030c9ad5a4ede8de04f56f932e285b9b218b7356d7e60e1761594,2024-09-09T16:35:03.113000
CVE-2023-5623,0,0,2f3b29c1eef030c9ad5a4ede8de04f56f932e285b9b218b7356d7e60e1761594,2024-09-09T16:35:03.113000
CVE-2023-5624,0,0,ba5097aba2a2a247854c1d9b4796e1185da31c5dd8141edfd0344a8f714da575,2023-11-06T18:20:25.737000
CVE-2023-5625,0,0,ac0ecbb6ed7210743894554a366916e8815b219327e42d98b1f6277193a8851d,2024-08-01T13:45:44.543000
CVE-2023-5626,0,0,340b8c1c87a43fe8a63e58d41c520f026228ad8445e5d8be6ece89714d56eba5,2023-10-25T00:11:45.460000
@ -241094,7 +241094,7 @@ CVE-2023-7212,0,0,5fa6a38ddbce3d36f226f6907fc4ed570a38b483633cbb1115e731ad339adb
CVE-2023-7213,0,0,a50411970960872ae25a485d8e121a5625575da78ca78df31cf68722c0663205,2024-05-17T02:34:18.533000
CVE-2023-7214,0,0,f371a14a8f059e4dc5d49b5c8077d84797abec4a09ab4f6122d1b881600b5111,2024-05-17T02:34:18.647000
CVE-2023-7215,0,0,c7e3ecabb17784bfd2634b4389a54ea1b01c4fe89bd36ccee55582bf564d1453,2024-05-17T02:34:18.757000
CVE-2023-7216,0,0,f79e1ff9a76c1993dc181f9d1536936a51c1a23160d40e99519535bef37798df,2024-06-12T13:15:49.690000
CVE-2023-7216,0,1,9ccbd2550b6979eac0d57ebbd1d24ab6d6903fe577f0dcbe54f99b584e216a1d,2024-09-09T18:15:03.647000
CVE-2023-7218,0,0,2fc03ceb2252ddc98b01b57815492ee2c37b5d9b2628dadfb93720d7663d8424,2024-05-17T02:34:18.900000
CVE-2023-7219,0,0,e3ef4045efef342c965c955f27d000ee3f949cefceb6a1a00f27d2c0e58d2ef5,2024-05-17T02:34:19.013000
CVE-2023-7220,0,0,672dc3e9ec353f7bf1c8715ff2fd0cacb6e92f484a358e6c40582e59c5c8fe88,2024-05-17T02:34:19.143000
@ -244034,7 +244034,7 @@ CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de
CVE-2024-21521,0,0,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000
CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000
CVE-2024-21523,0,0,2330ac0e4e609e6cb7b2d157ba739c957bd5fcf4369b9f17b9fa0a4336dfb21a,2024-08-01T13:46:46.460000
CVE-2024-21524,0,1,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d2a8,2024-09-09T17:36:33.447000
CVE-2024-21524,0,0,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d2a8,2024-09-09T17:36:33.447000
CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000
CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000
CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
@ -244187,7 +244187,7 @@ CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fc
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
CVE-2024-21757,0,0,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000
CVE-2024-21759,0,1,d165ae3a9708367c28525bd41d7fe549357acc1e0023c89ebc6f25ff1ff9fe47,2024-09-09T16:02:11.507000
CVE-2024-21759,0,0,d165ae3a9708367c28525bd41d7fe549357acc1e0023c89ebc6f25ff1ff9fe47,2024-09-09T16:02:11.507000
CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000
CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000
CVE-2024-21762,0,0,84db6239690371b7c5c10ef720dbcf2d622d5440e87b70d1c21a79a857f8ea72,2024-02-13T18:21:14.607000
@ -245474,7 +245474,7 @@ CVE-2024-23659,0,0,00fc339e96cf90505d259821db8c42ecca98975cfcf7d7475d9e6c3b75152
CVE-2024-2366,0,0,490db5028d325a3e3270a4bc51ed933daf1eb90560331895c813986c8416aa30,2024-05-16T13:03:05.353000
CVE-2024-23660,0,0,f59390a3bdd92fda69048aa3822f1db7f5498b44103925e2d96259b145eb2ed1,2024-02-15T16:01:29.370000
CVE-2024-23662,0,0,0bd2fe423ff125cd6b426da805efebc9c554fb6e799e24e8d56e6d24f2b3b973,2024-04-10T13:24:22.187000
CVE-2024-23663,0,1,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000
CVE-2024-23663,0,0,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000
CVE-2024-23664,0,0,d011c75099554e936d176a3c9a5468d2477ab8b77d1d9dbc825df199147abb3b,2024-06-03T14:46:24.250000
CVE-2024-23665,0,0,ccfa4de2b1b28a8c2ff6771f6bb08ec6cd2560932d59d5a7f456cced5fbbb5ed,2024-06-03T14:46:24.250000
CVE-2024-23667,0,0,08d118467751e068d01ea69371b6be0268151b83859ef5f994ee6bdd4d8baae1,2024-06-03T14:46:24.250000
@ -245954,6 +245954,7 @@ CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46
CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
CVE-2024-24507,0,0,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000
CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000
CVE-2024-24510,1,1,26dc65fb8976d07cf17fd086eed2859fff4fc25bfde1d7095baae07f52c76c96,2024-09-09T19:15:13.197000
CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000
CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000
@ -246561,7 +246562,7 @@ CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c71
CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000
CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000
CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000
CVE-2024-2541,0,0,343df38640b102b13a02f51d7503baf71055e95ae1246f0a02a5a45701d9f50e,2024-08-29T13:25:27.537000
CVE-2024-2541,0,1,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
CVE-2024-25414,0,0,adf1d11bdd5b149561578133c2144fc86b074e6ead373a55ead3bdaa0f1ac127,2024-08-29T20:36:20.677000
@ -246971,7 +246972,7 @@ CVE-2024-26004,0,0,339e2df0f2a66d2f51de2b2daab023ea4699cfa93f488c0f3f4f084b719f3
CVE-2024-26005,0,0,d7747b5e2f088b172b1a4b499ddd44f15dbf75c021bae634b0baaa69faaf4efd,2024-03-12T12:40:13.500000
CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503286,2024-05-14T19:17:55.627000
CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000
CVE-2024-26015,0,1,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000
CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000
CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000
CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
@ -248409,8 +248410,8 @@ CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1e
CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000
CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000
CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
CVE-2024-27784,0,1,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000
CVE-2024-27785,0,1,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000
CVE-2024-27784,0,0,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000
CVE-2024-27785,0,0,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000
CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000
CVE-2024-2779,0,0,2aa54c375187eea63fa6c956db70ce31dec68ec2b409a2e5d246e26b34790090,2024-05-17T02:38:30.057000
CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000
@ -249328,7 +249329,7 @@ CVE-2024-29106,0,0,38cde57fa08b3bfbd936ed7f30983e2c016824cae4d1dc840ddec9b4b278c
CVE-2024-29107,0,0,23005c58ce9ee2df1002def433e2cbd83b2e28f9c719a4edb30307d771834f1f,2024-03-19T16:33:58.680000
CVE-2024-29108,0,0,cdaabe4f2cb16eb242103f0f1468c544b782290af0779b39905eb340a946864b,2024-03-19T16:33:58.680000
CVE-2024-29109,0,0,3b2d209511aa0457f6921ee84bca59e5ee9cf59236c9fd65507b599ea52d49eb,2024-03-19T16:33:58.680000
CVE-2024-2911,0,1,69fb3f57d9488dce7efad5e476c0a9718f5c486cc1255f55d06df83b940f95be,2024-09-09T16:15:02.413000
CVE-2024-2911,0,0,69fb3f57d9488dce7efad5e476c0a9718f5c486cc1255f55d06df83b940f95be,2024-09-09T16:15:02.413000
CVE-2024-29110,0,0,fc265aa4deb4be9588bd77283ee4678d3bcd9ee2a8790d504bccff2ae254e584,2024-03-19T16:33:58.680000
CVE-2024-29111,0,0,01d648d6980d11229d1c2cd345c1d0fc4ef4bfb60c43f80653e2087ace4e5fef,2024-03-19T16:33:58.680000
CVE-2024-29112,0,0,0d0beca65e379f4bb6e4903985e3ae2f48dd68ffe582c66829971c90ab80ad5e,2024-03-19T16:33:58.680000
@ -249486,7 +249487,7 @@ CVE-2024-29320,0,0,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e
CVE-2024-2933,0,0,d37838d7f15a38d4ea11c8a25611399fe1881ebeb49155e9b10719125430e055,2024-06-03T14:46:24.250000
CVE-2024-29338,0,0,e217df75a675560f91a966c0f38d2dc94f5bdcd1b6f253203724d0904bfebb81,2024-08-26T14:35:04.427000
CVE-2024-2934,0,0,45a0042779c7d6f34e6fbc62fd386e8f0722656936a5982b81057995fcd91a4c,2024-05-17T02:38:37.907000
CVE-2024-2935,0,1,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa987310b,2024-09-09T16:15:02.587000
CVE-2024-2935,0,0,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa987310b,2024-09-09T16:15:02.587000
CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000
CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000
CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000
@ -252341,7 +252342,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f
CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000
CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000
CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000
CVE-2024-33509,0,1,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000
CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000
CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000
CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000
CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000
@ -254246,7 +254247,7 @@ CVE-2024-36131,0,0,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb
CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000
CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000
CVE-2024-36137,0,0,9438d2b71ef73887d75e6f454e33b7f397670092254d4a5da60582748cb22f74,2024-09-09T13:03:38.303000
CVE-2024-36138,0,0,7a552e38b90840b2af3193735f8d5f878ecbc9c5a35c26dc9b4dcafb0ca59f9c,2024-09-09T13:03:38.303000
CVE-2024-36138,0,1,e6354c672dea5a9efe6496da7c00037de66d6aa6e785f55fccdeccb25bc2c9b3,2024-09-09T18:35:09.367000
CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000
CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000
CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000
@ -255938,7 +255939,7 @@ CVE-2024-38641,0,0,df92dc238d16f057f03f190a2a0bd50146ddee0163d1cf466c523734cfde7
CVE-2024-38642,0,0,3d8e7fc3ed981740e72aa339618d54c8baab28ebc8e7f9af1bb8a029676a3e30,2024-09-09T13:03:38.303000
CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000
CVE-2024-38651,0,1,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000
CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
@ -256404,7 +256405,7 @@ CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210
CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000
CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000
CVE-2024-39497,0,0,2d6d1942d32951f62bed9c7f2b517cbb03d4fdefc867fdac7e0afd61c8c01f96,2024-07-12T16:34:58.687000
CVE-2024-39498,0,1,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000
CVE-2024-39498,0,0,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000
CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000
CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
@ -256584,8 +256585,8 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000
CVE-2024-39714,0,1,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000
CVE-2024-39715,0,1,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000
CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
@ -256927,7 +256928,7 @@ CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d31
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000
CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
CVE-2024-40643,0,0,a04c312db9b1f932101b834bf66d135196bcfee6846cd0548b3469f7ce4f4ae6,2024-09-09T15:15:11.597000
CVE-2024-40643,0,1,70d63ac3bf97bdf829f454273f2013c74a96b45a3177c5d57470b7fbfc94d47c,2024-09-09T18:30:12.050000
CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
@ -256947,9 +256948,9 @@ CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067b
CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000
CVE-2024-40709,0,0,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
CVE-2024-40710,0,1,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000
CVE-2024-40711,0,1,361f1b538b9f657bc9f073bf0b7ae2c8e87e59189fa7af212f088252efa9b3ee,2024-09-09T16:35:05.923000
CVE-2024-40712,0,1,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000
CVE-2024-40710,0,0,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000
CVE-2024-40711,0,0,361f1b538b9f657bc9f073bf0b7ae2c8e87e59189fa7af212f088252efa9b3ee,2024-09-09T16:35:05.923000
CVE-2024-40712,0,0,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000
CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000
CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000
CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000
@ -257131,27 +257132,27 @@ CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
CVE-2024-40962,0,0,3d1366142cae87f99bee1d01922e9c3346fad92689b81dead457f2b7f460d17c,2024-07-12T16:34:58.687000
CVE-2024-40963,0,0,2a96578cd7c6af1c34baa4ac9a95077df49820df6548101e36fdd738e266e9e1,2024-07-12T16:34:58.687000
CVE-2024-40964,0,1,bd4dac04992501f9fd0e201796f1ee0c4d72c42426ef223857d38e1de010ee1d,2024-09-09T17:48:55.847000
CVE-2024-40965,0,1,92f237bf538901b9ac55ac9b949dff9be047f3e7c43dbb137cb33205a52f1db1,2024-09-09T17:57:18.697000
CVE-2024-40964,0,0,bd4dac04992501f9fd0e201796f1ee0c4d72c42426ef223857d38e1de010ee1d,2024-09-09T17:48:55.847000
CVE-2024-40965,0,0,92f237bf538901b9ac55ac9b949dff9be047f3e7c43dbb137cb33205a52f1db1,2024-09-09T17:57:18.697000
CVE-2024-40966,0,0,4ce1565a3462904d8a95236c2afe6caa74a4190b9d43f1c02099c2813b4515f5,2024-07-12T16:34:58.687000
CVE-2024-40967,0,1,5718545438538db86b5a682b261aed717a2ae65dfaddd38bc85d5d6dfd9462f7,2024-09-09T17:58:49.700000
CVE-2024-40967,0,0,5718545438538db86b5a682b261aed717a2ae65dfaddd38bc85d5d6dfd9462f7,2024-09-09T17:58:49.700000
CVE-2024-40968,0,0,58b9d422fff97fcd02e7db46722391c97023d99d4c5142a1da4df7b00c917750,2024-07-12T16:34:58.687000
CVE-2024-40969,0,1,bd76f22baee998edd0eecd2dc4390c859ca101f12b7c1b85df829c6cdeb35103,2024-09-09T17:59:29.787000
CVE-2024-40969,0,0,bd76f22baee998edd0eecd2dc4390c859ca101f12b7c1b85df829c6cdeb35103,2024-09-09T17:59:29.787000
CVE-2024-4097,0,0,66ffa92526301cf6212a4835a680920c0ae3100deab31b53b6ec7270ebab3252,2024-05-02T18:00:37.360000
CVE-2024-40970,0,0,d88eb9e98b544c6dabc96abad6de0495364e0a940487d036ee8839c00f74ddcc,2024-07-12T16:34:58.687000
CVE-2024-40970,0,1,5beb80adf715c6c7b1dbf144897ade2b77d2d9bb20e6a7797b26e1adf6f8e58b,2024-09-09T18:07:59.283000
CVE-2024-40971,0,0,3a1ab5847a8c301b704d8bdd427dc329bf7ad68865a6fa0d6bfff5bf33c1b1e6,2024-07-12T16:34:58.687000
CVE-2024-40972,0,0,fa6af6e8974278ad24cb6ac5e07f413b788062237eafa75226e4473182991804,2024-08-29T17:15:07.830000
CVE-2024-40973,0,0,6dfdebb89fb70fbd1dc579084a814033a1ee405421a3f1714de4350fb97fc05f,2024-07-12T16:34:58.687000
CVE-2024-40973,0,1,99479033e0c736fbadb52dea10d6c869ad95d89f1bd751bd9988f2262c05d93c,2024-09-09T18:09:01.393000
CVE-2024-40974,0,0,32ab56cad597bafba819a3c3479ca0af2d6eedd509368346fb5dad5768478c2b,2024-07-12T16:34:58.687000
CVE-2024-40975,0,0,58c77162922e7538a8367d777b273d725db339abb61e841dcb00423a0d11d35e,2024-07-12T16:34:58.687000
CVE-2024-40976,0,0,04402ac9053380912ee7e6c1d61016d6abda090be8cc57a3ad4cb5cf98f6452e,2024-07-12T16:34:58.687000
CVE-2024-40977,0,0,713d118c2989110406bd351ccd4a8ec5fa38da2f4ee4480c4fc17dc5e39b784c,2024-07-12T16:34:58.687000
CVE-2024-40977,0,1,09f9939c9953b8dd7875e3c5c82671a11532d0f8b8049a9eece763f6f07418b4,2024-09-09T18:11:49.467000
CVE-2024-40978,0,0,049db6cb445635349bc13e282d7b1ae71453dbfe8ee45da390adcc7979ae0673,2024-07-12T16:34:58.687000
CVE-2024-40979,0,0,02d50a64dba912abbd440777d71574d402e4971f7eb59be79713869d142b77ff,2024-07-12T16:34:58.687000
CVE-2024-4098,0,0,0f5c5826eed3e5bcc26efbc30e873c5343c85ccb38a52d0933f2a19af76c3335,2024-06-20T12:43:25.663000
CVE-2024-40980,0,0,7c8b617384c7ab821d9af539492e2145c828dacc0cb33c281c6b5d0cc9c18cc0,2024-07-12T16:34:58.687000
CVE-2024-40981,0,0,9553c7f4d39fdb6df73318618295233392a46f09b0a4cc6f7eb164a063b2bc95,2024-07-12T16:34:58.687000
CVE-2024-40982,0,0,697b1c4a0b072cf78a8717040e348060480ecef1718db2a6ab4408bb81735e06,2024-07-12T16:34:58.687000
CVE-2024-40980,0,1,576e1e9ee775f60db7b44afe01772d0646186a87cb5ab7a64f30143e2fccc274,2024-09-09T18:15:41.347000
CVE-2024-40981,0,1,8815556b38df0869d7e1f1e7fdbb64292425152399cf573795eefed2f74afe18,2024-09-09T18:16:52.780000
CVE-2024-40982,0,1,7692df19ea134975c8868654bdd84c259c925fdbf056e59385a1462c002a19a6,2024-09-09T18:13:13.997000
CVE-2024-40983,0,0,1a9c0b04e5bf0ebfd6886d0b469cece9e2d9e059b2e016c3554bfb8d97d2daed,2024-07-12T16:34:58.687000
CVE-2024-40984,0,0,2d75ffe3bddb25f556a6715b7ad56385d47eb1b20abc2765f78492a4395f3521,2024-07-12T16:34:58.687000
CVE-2024-40985,0,0,970a3454923383859b25fd8adc1df8bdea3aeb351d8540e9bf26847d9471f582,2024-07-12T16:34:58.687000
@ -257728,7 +257729,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e
CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
CVE-2024-42019,0,1,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000
CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000
@ -258237,6 +258238,7 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e
CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af301,2024-08-27T15:35:17.887000
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
CVE-2024-42759,1,1,ac5083d92193f368f1864650bc4b91635e61441c3b8c7903be95236a9a5ee6f2,2024-09-09T19:15:13.270000
CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000
CVE-2024-42762,0,0,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000
CVE-2024-42763,0,0,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000
@ -258859,7 +258861,9 @@ CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c7109
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000
CVE-2024-44333,1,1,a217e37b46b027f8dd7a13c3184f55fdcbee3b3214e03688ea541390163afd0a,2024-09-09T17:15:13.120000
CVE-2024-44333,0,1,b4b2ce8bbe2173a4a2ad27aef82c9d61baf91d96fabc5b2f8fe2c31d19e6a883,2024-09-09T18:30:12.050000
CVE-2024-44334,1,1,e2fc641be06c663c9c13f94d61505c6df855c5f221401faf9102910cd57803b0,2024-09-09T18:30:12.050000
CVE-2024-44335,1,1,5029919fcf1c0fffa79e596435b9a0d37cbd0637008bfe0fe65b5982627427cf,2024-09-09T18:30:12.050000
CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000
CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000
CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000
@ -258867,7 +258871,7 @@ CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb7
CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000
CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000
CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000
CVE-2024-44375,0,0,c2ae69cbc723aea7579455f6ebc15cdc81a4940d69f5da87c1c2bddc9c15de6e,2024-09-09T14:15:14.290000
CVE-2024-44375,0,1,5ccef9f247902f2583fb787042fb7baf80503f33032d96bab6dbab79a4c47cd0,2024-09-09T18:30:12.050000
CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000
CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000
CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000
@ -258926,8 +258930,8 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037
CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000
CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000
CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000
CVE-2024-44720,1,1,315d4d2a0bd3c25c50b9c634960d467a7635424632644997a922df1d0e7e35ef,2024-09-09T17:35:06.057000
CVE-2024-44721,1,1,b7a3f0061045e2f9816c8d1362a21479689750c2938d1c13b4ea274c91b49d8b,2024-09-09T16:15:02.853000
CVE-2024-44720,0,1,053a90257f8d5ecb229ff9b7c992f5d05fdabdf5c3f4e28e0c0e65b8ca217662,2024-09-09T18:30:12.050000
CVE-2024-44721,0,1,8cdb8797de36b06745d362c014a0e65a6e0bd3802d52013f788bbe7711e2d3cf,2024-09-09T18:35:10.070000
CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000
CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
@ -258965,6 +258969,7 @@ CVE-2024-44839,0,0,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b7
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
CVE-2024-44844,0,0,d7edb2946c54286eb06291f1bb0ae1e0cb5e3a83126388a72075b84fdd746e33,2024-09-09T13:03:38.303000
CVE-2024-44845,0,0,84e2ecc1fd17f5d60179e3847f33ab1653ec969cd3a24d664be1cdba966a3b62,2024-09-09T13:03:38.303000
CVE-2024-44849,1,1,1b81fe4e73a526b5e64f098efadee66982b41478061ab87b5298543a9fa228a9,2024-09-09T18:30:12.050000
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000
CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000
@ -259079,7 +259084,7 @@ CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1
CVE-2024-45039,0,0,73f90f9455839525425d48713bfe0ff12a525d69b4089ad55a03f7d130bbe254,2024-09-06T16:46:26.830000
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45040,0,0,66fa952a980adfe3c28c0b6707b447d68c76ae01c0168cd5a5130d4c4798d20c,2024-09-06T16:46:26.830000
CVE-2024-45041,0,0,76e90f035276fcf866db491ee4611b3feb28ed2e3671a49528af002652301a08,2024-09-09T15:15:11.940000
CVE-2024-45041,0,1,4b2522a1114d682e3b617a29f59e1ed0cf6b7c351080d3ffad0297be3ffda9a5,2024-09-09T18:30:12.050000
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000
@ -259177,6 +259182,7 @@ CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66d
CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000
CVE-2024-45294,0,0,aea60512b4d24376f133c23c43cdb7817f0d718abc51286f2a286f4cb6d84051,2024-09-06T17:15:16.977000
CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000
CVE-2024-45296,1,1,984878a106ba4ea85efc30862dc10400e329bd76ed0451957c95695776e1ce5d,2024-09-09T19:15:13.330000
CVE-2024-45299,0,0,954c7c10e3e27d01c74d7dbf2e119ecf2e67338229cd2f4df8e5453ce4a4b5ce,2024-09-06T16:46:26.830000
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
CVE-2024-45300,0,0,16b87f5c0983c10d96a860a768ea4f018c449876fdebfed42bf2eda57fdf4026,2024-09-06T16:46:26.830000
@ -259214,8 +259220,9 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91
CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000
CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000
CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000
CVE-2024-45406,1,1,bcbca4ccebf0fc90e19317fc2128c582fbe2f397d8d5fee9fa03c673c61e6676,2024-09-09T17:15:13.180000
CVE-2024-45406,0,1,1459ad14d7127012093360f5f159c85f3ceb60f90c63e19182240dfb68b6c8c4,2024-09-09T18:30:12.050000
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-45411,1,1,ff880483fecdf387b2bf943d1ef54064cc42a6b040409c512a838b57b9acc875,2024-09-09T19:15:13.543000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000
CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000
@ -259341,7 +259348,7 @@ CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc9
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
CVE-2024-4629,0,0,de70e58094ed9bde0a45edf5e050714f9463b77c9a32d7f0d22b81120f02c4a6,2024-09-04T13:05:36.067000
CVE-2024-4629,0,1,2b60dd01cb9808bc30568cc7bd7fed85c03b82d3742fd80a9e7b4546151ed50d,2024-09-09T19:15:13.760000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000
@ -260494,7 +260501,7 @@ CVE-2024-5963,0,0,a4cccf44b2eb0314cba658473713210aafeaf2066181b69f96f839930da4f3
CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000
CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb82736a,2024-06-24T20:00:37.057000
CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000
CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e27,2024-06-20T12:44:01.637000
CVE-2024-5967,0,1,2abd808298732cc4b1964c14eae7561fd71fe2ea4a15e03466adc54a1382b0dd,2024-09-09T19:15:13.920000
CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000
CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000
CVE-2024-5971,0,0,01d70de536a697a1c65e871f029e293b5051eed9b63fc3f224826d44a6d72378,2024-08-12T13:38:38.567000
@ -260652,7 +260659,7 @@ CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda2438413
CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
CVE-2024-6162,0,1,8b7ed74d124d4620011969b57cdb4de9675bbe6f80a77d5b12cad77131aa3550,2024-09-09T18:15:04.023000
CVE-2024-6163,0,0,38b12c0f7e168992652ab7a71785fb2aab63391cb3f79d2e2dd970485bc5678f,2024-08-20T17:44:11.677000
CVE-2024-6164,0,0,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000
CVE-2024-6165,0,0,6301727d4094498886864a9dae2aa85ba81a15451475733d92db12396ffe834c,2024-08-01T14:00:13.553000
@ -260745,12 +260752,12 @@ CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa6443
CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000
CVE-2024-6272,0,0,f7daf3f4a3aace9a87ac703b7515196ea33a67e89fc732d0dfedb60e5408f0c9,2024-08-01T15:35:19.753000
CVE-2024-6273,0,0,d046e8009aa5553aa5bf1fd3a64a9eb55ab80ff6184fba9c23626c1afd5e8440,2024-09-06T16:54:20.973000
CVE-2024-6274,0,1,db8bfacbab3e41e186c76ac517f910a1d0628ea50e93784530b08ac7956bf39d,2024-09-09T16:15:27.780000
CVE-2024-6275,0,1,7cbccc39bde4a795cde54afdb3fc1b8b532ed328b618c2b10a8f716c6775006e,2024-09-09T17:20:46.777000
CVE-2024-6276,0,1,a54e62a78dc8ca63b29b87fd05364fc7b8a2f230b48b77f2d716d5640107aff7,2024-09-09T17:20:48.280000
CVE-2024-6277,0,1,cdc407f78f971611f7a162adf54a64c93a9cb94e3239cd776401700e75ae18bc,2024-09-09T17:20:50.147000
CVE-2024-6278,0,1,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e36230,2024-09-09T17:20:52.050000
CVE-2024-6279,0,1,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000
CVE-2024-6274,0,0,db8bfacbab3e41e186c76ac517f910a1d0628ea50e93784530b08ac7956bf39d,2024-09-09T16:15:27.780000
CVE-2024-6275,0,0,7cbccc39bde4a795cde54afdb3fc1b8b532ed328b618c2b10a8f716c6775006e,2024-09-09T17:20:46.777000
CVE-2024-6276,0,0,a54e62a78dc8ca63b29b87fd05364fc7b8a2f230b48b77f2d716d5640107aff7,2024-09-09T17:20:48.280000
CVE-2024-6277,0,0,cdc407f78f971611f7a162adf54a64c93a9cb94e3239cd776401700e75ae18bc,2024-09-09T17:20:50.147000
CVE-2024-6278,0,0,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e36230,2024-09-09T17:20:52.050000
CVE-2024-6279,0,0,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000
CVE-2024-6280,0,0,53e9097fb099dd3ec6185a9b8b59575874e3b050c48e208cc0f20896ca10b944,2024-09-06T16:52:22.133000
CVE-2024-6281,0,0,709a859f49498e3e71bff09d88107556f15663d7c1ae6811fce3a162e288bb4f,2024-07-22T13:00:53.287000
CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000
@ -261297,7 +261304,7 @@ CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400
CVE-2024-7012,0,0,f0e0d2f8670ad7a792afb91a6b1a381690a310d17396ef501ada2605889c18fa,2024-09-05T21:39:20.950000
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
CVE-2024-7015,0,0,a37549cf37e709a8db2d5e78b8cfa589e277c584ce2636170c10712178ad247b,2024-09-09T14:15:14.430000
CVE-2024-7015,0,1,2dee0bb6add2610ee1b5dbb3ee1dba14ff9459a2d74dafeb83e9605451c4f04a,2024-09-09T18:30:12.050000
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
CVE-2024-7029,0,0,771467b06f5734847da574d5da21068e3e7ec9c8571a268614524f88178f1827,2024-08-30T21:15:14.420000
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
@ -261447,6 +261454,7 @@ CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
CVE-2024-7258,0,0,7daa83813c091cf4943890cfcc79fb77dbec053060dc3ee1861fb34d4faa0557,2024-08-23T16:18:28.547000
CVE-2024-7260,1,1,d78d51d77d4419a0ede07ad9147325d7986787c168417bfe566956cff424692d,2024-09-09T19:15:14.033000
CVE-2024-7261,0,0,88fefc15b9eab7b2e919bd0caea05a9adad8b1510053f0adb03b22cb218cc2eb,2024-09-03T12:59:02.453000
CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000
CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000
@ -261492,6 +261500,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda
CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000
CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
CVE-2024-7318,1,1,42a9d93989945edb660e3681fabad6a88844dcae357a34fdd4028441ff2278c5,2024-09-09T19:15:14.237000
CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000
CVE-2024-7320,0,0,a6345ced50bd1b25dc54bd951c2133e1d51c039a215f4119dbfe976f4ac4ed65,2024-08-12T16:47:36.887000
CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e4e,2024-08-12T16:49:01.887000
@ -261513,6 +261522,7 @@ CVE-2024-7337,0,0,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e30
CVE-2024-7338,0,0,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000
CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a941603,2024-08-23T16:53:31.643000
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
CVE-2024-7341,1,1,c51e86c4ae3d26929145dd2c08eb46f96e91de37872b177576283ccbb881225d,2024-09-09T19:15:14.450000
CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000
CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000
CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac1800,2024-09-05T14:11:00.493000
@ -261967,7 +261977,7 @@ CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fc
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
CVE-2024-8041,0,0,6cc075dd4dd503d7a64ec1eb36d717de84b169042dbabd262ae9b25dfe6faf7c,2024-08-23T16:18:28.547000
CVE-2024-8042,0,0,fff5d3a74bcd7a118083cddbd0cfac12e08a7843571e00308c3cc8aa8f2b757f,2024-09-09T15:15:12.340000
CVE-2024-8042,0,1,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000
CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000
CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000
CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000
@ -262129,8 +262139,8 @@ CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927b
CVE-2024-8368,0,0,e041f44a528823075791907fb829fe4e23ee08e4bad517d1712c799858033925,2024-09-03T12:59:02.453000
CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
CVE-2024-8372,0,0,2792f9d8fc26192f2671e203534099dfcbde4d0179752e976e32f88cec413d35,2024-09-09T15:15:12.560000
CVE-2024-8373,0,1,ca541a80f0aad718210fd95191cc74ae91005590cfc887f71e4ebdc821b651ae,2024-09-09T16:15:02.927000
CVE-2024-8372,0,1,824598be017ed03f49e00dc10d01119221625b308bd2ce07fc53c22aed41c811,2024-09-09T18:30:12.050000
CVE-2024-8373,0,1,2524f37ecee41fbdf36f86f2547ba392b5531495fcdadc7957495dc2dbc119db,2024-09-09T18:30:12.050000
CVE-2024-8374,0,0,9f8f53baf1bfbc489185aa032a32ccc1ef270e4caf925e0db81beb808ee10da0,2024-09-03T12:59:02.453000
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
@ -262177,8 +262187,8 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76
CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
CVE-2024-8509,0,0,607386a7561a0cf76a75ba79c4a5e02f31641d78da4de1b4e77855ea4dab4759,2024-09-06T16:46:26.830000
CVE-2024-8517,0,1,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000
CVE-2024-8509,0,1,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000
CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000
CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
@ -262200,12 +262210,12 @@ CVE-2024-8569,0,0,825765fab86e7246b7c8f1866c045e3d8eb383d3482602655f505175cad6da
CVE-2024-8570,0,0,a35ad2ed8f4e40daba99661193190c020bbec00950eacb9abfa9a2b177a3196f,2024-09-09T13:03:38.303000
CVE-2024-8571,0,0,bc72f3f150d06377644ebf4c0afa9d59046664e5cf502a539ace8bb639b609c4,2024-09-09T13:03:38.303000
CVE-2024-8572,0,0,65c0182e0b6b9126e2a9480fb9dc08e73b2cfe03993460c6fe0066e5e3a46c29,2024-09-09T13:03:38.303000
CVE-2024-8573,0,0,8d80a4ddbf879381b743e0f3d6805fd406bbf7dfdd1654c842160e60bb5f92ee,2024-09-09T13:03:38.303000
CVE-2024-8574,0,0,354d94bfac840411b02f888d4a9cb214f038255dc83a5eb8295e20dc318152f7,2024-09-09T13:03:38.303000
CVE-2024-8575,0,0,0a297d8c237ed61614b0d98fc90a7aa678cc0b27fbb45350bf2a076995dd7abc,2024-09-09T13:03:38.303000
CVE-2024-8576,0,0,3a40907cd5014ae5614c7c697d9a2280ad523049041057a6e5e931c5ce24b54e,2024-09-09T13:03:38.303000
CVE-2024-8577,0,0,630f9928a98961a656d952ca1642ac03977cbaf719ff11c0f8d8051c69f1ed42,2024-09-09T13:03:38.303000
CVE-2024-8578,0,0,34dd3cad1e12545afb70bdcc5de75711202ca2debd8f32663968fc2846620eb9,2024-09-09T13:03:38.303000
CVE-2024-8573,0,1,cb05d77c8c582afe17bd702ecaa70f87c8f55d0a642a886e3a581233ab307fe7,2024-09-09T18:45:08.053000
CVE-2024-8574,0,1,19894d99d3070776fb1a44f17a54df633ea25e6bfa91923d40be07d8e4a21b2e,2024-09-09T18:47:10.577000
CVE-2024-8575,0,1,1a894f380aae23a0c95d0f445bdf8ed48f5f6c32fa54c136a25ec7a57fd27b16,2024-09-09T18:47:45.917000
CVE-2024-8576,0,1,1783676f924976381fafc0f96422ed382f270401d25c92fb033e06383df4a7f7,2024-09-09T18:59:57.423000
CVE-2024-8577,0,1,96f1be189725676d2f3233dc01a21ddbf35a2a75bf7f74c80a804039b234d5e2,2024-09-09T18:51:32.377000
CVE-2024-8578,0,1,72b1c5b8b0cbaa0c9c8584a9a193238855c2f41d4aec8b5a15264448a8ca7c65,2024-09-09T18:46:00.300000
CVE-2024-8579,0,0,5e850f0b011b9943620ead0d3063b902196cd66b4d55fb09d083b2d2656f9dc7,2024-09-09T13:03:38.303000
CVE-2024-8580,0,0,71fb7b71ee4e11efeceacb1480052da188f0c5c4d3e8d999f7cbbc85ef79e3d2,2024-09-09T13:03:38.303000
CVE-2024-8582,0,0,bf290c531eb532cb798b8923302db1861844d084d859b0eda7658f732f801dd8,2024-09-09T13:03:38.303000
@ -262214,5 +262224,5 @@ CVE-2024-8584,0,0,7c7ad2063aa233a836e9a59682cb05dfcb95a707aa850cd9ec5b817e03f5e1
CVE-2024-8585,0,0,9988d1ca177f24ec925e5066ed58d9d8a162814f82b8247fbc323ff8f14711cf,2024-09-09T13:03:38.303000
CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000
CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000
CVE-2024-8604,1,1,f8b7b7c3ac8ec659db72b62715d729cc6c8fc244da32bec2a2343fe3141c4500,2024-09-09T16:15:03.203000
CVE-2024-8605,1,1,9804f309cecb16f6ee9b2ecaaae8931160ed1bde4e8a34dda2a863907695a175,2024-09-09T16:15:03.570000
CVE-2024-8604,0,1,03dd9ea4b720aacc0e1e1cce008473e1a786aeb7eaa9fc848b1a9d53cc790e1f,2024-09-09T18:30:12.050000
CVE-2024-8605,0,1,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a99575815,2024-09-09T18:30:12.050000

Can't render this file because it is too large.