Auto-Update: 2024-08-28T20:00:17.696095+00:00

This commit is contained in:
cad-safe-bot 2024-08-28 20:03:15 +00:00
parent 632168d8cf
commit 4bbe8b0f33
65 changed files with 3382 additions and 390 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27312",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T06:15:07.350",
"lastModified": "2024-04-03T12:38:04.840",
"lastModified": "2024-08-28T19:35:00.870",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en Gleez Cms 1.2.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de module/gleez/classes/request.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/LioTree/8d10d123d31f50db05a25586e62a87ba",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.673",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-28T18:35:00.873",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de desbordamiento en la regi\u00f3n stack de la memoria en Tenda AC21 con la versi\u00f3n de firmware US_AC21V1.0re_V16.03.08.15_cn_TDC01 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de una solicitud POST manipulada para /goform/openSchedWifi."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33677",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-06T01:15:06.960",
"lastModified": "2024-03-06T15:18:08.093",
"lastModified": "2024-08-28T19:35:04.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Sourcecodester Lost and Found Information System's Version 1.0 es vulnerable a una inyecci\u00f3n SQL no autenticada en \"?page=items/view&id=*\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "http://wwwsourcecodestercom.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40100",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:07.743",
"lastModified": "2024-02-16T13:38:00.047",
"lastModified": "2024-08-28T19:35:06.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En Discovery_thread de Dns64Configuration.cpp, existe una posible corrupci\u00f3n de memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/DnsResolver/+/8e1561fb603fdaec15798372f865fb1750537f4f",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4024",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-17T08:15:05.300",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:32:02.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,22 +61,52 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
"source": "security@wordfence.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048105",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f408f1f-207e-427a-a5d0-d0fadf453d7e?source=cve",
"source": "security@wordfence.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.74",
"matchCriteriaId": "2F2023B8-C40D-4B40-BDE9-6EB71E09AABA"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048105",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f408f1f-207e-427a-a5d0-d0fadf453d7e?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4025",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-17T08:15:05.500",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:30:15.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,22 +81,52 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
"source": "security@wordfence.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048105",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77409977-6822-4d14-9842-cb6a5aff2162?source=cve",
"source": "security@wordfence.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.74",
"matchCriteriaId": "2F2023B8-C40D-4B40-BDE9-6EB71E09AABA"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048105",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77409977-6822-4d14-9842-cb6a5aff2162?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-41505",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:53.910",
"lastModified": "2024-03-14T12:52:21.763",
"lastModified": "2024-08-28T19:35:06.953",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar imagen de perfil del estudiante de Student Enrollment In PHP v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2023-41505/blob/main/CVE-24",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42581",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-12-05T03:15:19.293",
"lastModified": "2023-12-12T17:08:44.080",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T19:35:07.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43301",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T07:15:08.697",
"lastModified": "2023-12-13T21:24:23.100",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T18:35:04.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6143",
"sourceIdentifier": "arm-security@arm.com",
"published": "2024-03-04T10:15:08.807",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-08-28T19:35:07.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad Use After Free en Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite a un usuario local sin privilegios explotar una condici\u00f3n de ejecuci\u00f3n de software para realizar operaciones de procesamiento de memoria inadecuadas. Si el usuario prepara cuidadosamente la memoria del sistema y el sistema est\u00e1 bajo una carga pesada, esto a su vez provocar\u00e1 un Use After Free. Este problema afecta al controlador del kernel de GPU Midgard: de r13p0 a r32p0; Controlador del kernel de GPU Bifrost: desde r1p0 hasta r18p0; Controlador del kernel de GPU Valhall: desde r37p0 hasta r46p0; Controlador del kernel de arquitectura de GPU Arm de quinta generaci\u00f3n: desde r41p0 hasta r46p0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "arm-security@arm.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0048",
"sourceIdentifier": "security@android.com",
"published": "2024-03-11T17:15:45.673",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-08-28T19:35:07.667",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En la sesi\u00f3n de AccountManagerService.java, existe un m\u00e9todo posible para conservar los privilegios del servicio en primer plano debido al manejo incorrecto de respuestas nulas. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-230"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/2c236cde5505ee0e88cf1e3d073e2f1a53f0eede",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0051",
"sourceIdentifier": "security@android.com",
"published": "2024-03-11T17:15:45.840",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-08-28T19:35:08.443",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En onQueueFilled de SoftMPEG4.cpp, hay una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21501",
"sourceIdentifier": "report@snyk.io",
"published": "2024-02-24T05:15:44.310",
"lastModified": "2024-06-10T18:15:25.273",
"lastModified": "2024-08-28T18:35:07.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -49,6 +49,16 @@
"value": "CWE-200"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-538"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25746",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T22:15:47.253",
"lastModified": "2024-02-23T02:42:54.547",
"lastModified": "2024-08-28T18:35:09.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n add_white_node."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25748",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T23:15:07.640",
"lastModified": "2024-02-23T02:42:54.547",
"lastModified": "2024-08-28T18:35:10.337",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en tenda AC9 AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n fromSetIpMacBind."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25992",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:47.840",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-08-28T19:35:09.697",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En tmu_tz_control de tmu.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26529",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T08:15:43.410",
"lastModified": "2024-03-13T12:33:51.697",
"lastModified": "2024-08-28T19:35:10.463",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Un problema en mz-automation libiec61850 v.1.5.3 y anteriores permite que un atacante remoto provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n mmsServer_handleDeleteNamedVariableListRequest de src/mms/iso_mms/server/mms_named_variable_list_service.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://github.com/mz-automation/libiec61850/issues/492",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27212",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:48.290",
"lastModified": "2024-03-15T20:15:08.910",
"lastModified": "2024-08-28T19:35:10.640",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En init_data de TBD, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27228",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:48.827",
"lastModified": "2024-03-15T20:15:09.193",
"lastModified": "2024-08-28T19:35:11.443",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En TBD de TBD, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27568",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T14:15:54.180",
"lastModified": "2024-03-01T15:23:36.177",
"lastModified": "2024-08-28T19:35:12.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro apn_name_3g en la funci\u00f3n setupEC20Apn. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27631",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T21:15:10.067",
"lastModified": "2024-04-11T06:15:06.560",
"lastModified": "2024-08-28T19:35:13.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross Site Request Forgery en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de siteadmin/usergroup.php"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://git.savannah.nongnu.org/cgit/administration/savane.git/commit/?h=i18n&id=d3962d3feb75467489b869204db98e2dffaaaf09",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27705",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T22:15:06.987",
"lastModified": "2024-04-04T12:48:41.700",
"lastModified": "2024-08-28T19:35:13.840",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de Cross Site Scripting en Leantime v3.0.6 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo PDF manipulado en el endpoint de archivos/exploraci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28338",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T17:15:59.047",
"lastModified": "2024-03-12T17:46:17.273",
"lastModified": "2024-08-28T19:35:14.627",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una omisi\u00f3n de inicio de sesi\u00f3n en TOTOLINK A8000RU V7.1cu.643_B20200521 permite a los atacantes iniciar sesi\u00f3n en cuentas de administrador proporcionando una cookie de sesi\u00f3n manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28553",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T13:15:49.763",
"lastModified": "2024-03-21T20:58:52.357",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T18:35:12.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28677",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.390",
"lastModified": "2024-03-13T18:15:58.530",
"lastModified": "2024-08-28T19:35:15.447",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/article_keywords_main.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/14.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28681",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.570",
"lastModified": "2024-03-13T18:15:58.530",
"lastModified": "2024-08-28T19:35:16.270",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/plus_edit.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/17.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29399",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T06:15:06.903",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-08-28T18:35:13.337",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en GNU Savane v.3.13 y anteriores que permite a un atacante remoto ejecutar c\u00f3digo arbitrario y escalar privilegios a trav\u00e9s de un archivo manipulado al componente upload.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/ally-petitt/CVE-2024-29399",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29514",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-02T13:15:51.620",
"lastModified": "2024-04-02T18:12:16.283",
"lastModified": "2024-08-28T19:35:17.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de carga de archivos en lepton v.7.1.0 permite a atacantes remotos autenticados ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/zzq66/cve6/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29757",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.867",
"lastModified": "2024-04-08T18:49:25.863",
"lastModified": "2024-08-28T19:35:17.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Existe una posible omisi\u00f3n de permisos debido a que los certificados de depuraci\u00f3n est\u00e1n incluidos en la lista de permitidos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30565",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-04T08:15:07.153",
"lastModified": "2024-04-04T12:48:41.700",
"lastModified": "2024-08-28T19:35:18.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en SeaCMS versi\u00f3n 12.9, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de admin notify.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/SeaCMS_v.12.9.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30591",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T14:15:15.390",
"lastModified": "2024-03-28T16:07:30.893",
"lastModified": "2024-08-28T18:35:14.280",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de tiempo de la funci\u00f3n saveParentControlInfo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30598",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T15:15:46.467",
"lastModified": "2024-03-28T16:07:30.893",
"lastModified": "2024-08-28T18:35:15.197",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El firmware Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro security_5g de la funci\u00f3n formWifiBasicSet."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30624",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-29T13:15:15.953",
"lastModified": "2024-03-29T13:28:22.880",
"lastModified": "2024-08-28T18:35:15.953",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro URL de la funci\u00f3n saveParentControlInfo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31819",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T20:15:08.027",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-08-28T19:35:18.897",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en WWBN AVideo v.12.4 a v.14.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro systemRootPath del componente submitIndex.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://chocapikk.com/posts/2024/cve-2024-31819/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39504",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:12.830",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:58:45.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,104 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_inner: valida meta y payload obligatorias. Comprueba los atributos de enlace de red obligatorios en el payload y la metaexpresi\u00f3n cuando se utilizan incrustados desde la expresi\u00f3n interna; de lo contrario, es posible desreferenciar el puntero NULL desde el espacio de usuario."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/39323f54cad29602917848346c71b087da92a19d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/b30669fdea0ca03aa22995e6c99f7e7d9dee89ff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c4ab9da85b9df3692f861512fe6c9812f38b7471",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.35",
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/39323f54cad29602917848346c71b087da92a19d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b30669fdea0ca03aa22995e6c99f7e7d9dee89ff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c4ab9da85b9df3692f861512fe6c9812f38b7471",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39506",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:12.957",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:58:56.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,174 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: liquidio: ajusta una ruta de manejo de puntero NULL en lio_vf_rep_copy_packet En lio_vf_rep_copy_packet() pg_info->page se compara con un valor NULL, pero luego se pasa incondicionalmente a skb_add_rx_frag() lo cual parece extra\u00f1o y podr\u00eda provocar una desreferencia del puntero nulo. El seguimiento de llamadas de lio_vf_rep_copy_packet() se ve as\u00ed: octeon_droq_process_packets octeon_droq_fast_process_packets octeon_droq_dispatch_pkt octeon_create_recv_info ...buscar en la lista de despacho... ->disp_fn(rdisp->rinfo, ...) lio_vf_rep_pkt_recv(struct octeon_recv_info *rec v_info, ...) En este camino hay No hay ning\u00fan c\u00f3digo que establezca pg_info->page en NULL. Por lo tanto, esta verificaci\u00f3n parece innecesaria y no resuelve el problema potencial. Pero supongo que el autor ten\u00eda motivos para agregar un cheque y yo no tengo esa tarjeta y no puedo hacer una prueba real. Adem\u00e1s, el c\u00f3digo de la funci\u00f3n liquidio_push_packet() en liquidio/lio_core.c hace exactamente lo mismo. En base a esto, considero la soluci\u00f3n de compromiso m\u00e1s aceptable para ajustar este problema moviendo skb_add_rx_frag() al alcance condicional. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a86490a3712cc513113440a606a0e77130abd47c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/c44711b78608c98a3e6b49ce91678cd0917d5349",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cbf18d8128a753cb632bef39470d19befd9c7347",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dcc7440f32c7a26b067aff6e7d931ec593024a79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fd2b613bc4c508e55c1221c6595bb889812a4fea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "CA0C2003-8954-406C-83EB-454FDEC08184"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.95",
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.35",
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a86490a3712cc513113440a606a0e77130abd47c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c44711b78608c98a3e6b49ce91678cd0917d5349",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cbf18d8128a753cb632bef39470d19befd9c7347",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dcc7440f32c7a26b067aff6e7d931ec593024a79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd2b613bc4c508e55c1221c6595bb889812a4fea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39510",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:13.283",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:59:12.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,104 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() Obtuvimos el siguiente problema en una prueba de ejecuci\u00f3n aleatoria del comando de restauraci\u00f3n: ======== ==================================================== ======== ERROR: KASAN: slab-use-after-free en cachefiles_ondemand_daemon_read+0xb41/0xb60 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888122e84088 por tarea ondemand-04-dae/963 CPU: 13 PID: 963 Comm: ondemand -04-dae Not tainted 6.8.0-dirty #564 Seguimiento de llamadas: kasan_report+0x93/0xc0 cachefiles_ondemand_daemon_read+0xb41/0xb60 vfs_read+0x169/0xb50 ksys_read+0xf5/0x1e0 Asignado por tarea 116: kmem_cache_alloc+0x14 0/0x3a0 cachefiles_lookup_cookie+0x140/ 0xcd0 fscache_cookie_state_machine+0x43c/0x1230 [...] Liberado por la tarea 792: kmem_cache_free+0xfe/0x390 cachefiles_put_object+0x241/0x480 fscache_cookie_state_machine+0x5c8/0x1230 [...] =============== ==================================================== == El siguiente es el proceso que desencadena el problema: montar | daemon_thread1 | daemon_thread2 ------------------------------------------------- ----------- cachefiles_withdraw_cookie cachefiles_ondemand_clean_object(object) cachefiles_ondemand_send_req REQ_A = kzalloc(sizeof(*req) + data_len) wait_for_completion(&REQ_A->done) cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req- >object_id = solicitud->objeto ->ondemand->ondemand_id ------ restaurar ------ cachefiles_ondemand_restore xas_for_each(&xas, req, ULONG_MAX) xas_set_mark(&xas, CACHEFILES_REQ_NEW) cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req er, mensaje, n) xa_erase(&cache ->reqs, id) complete(&REQ_A->done) ------ close(fd) ------ cachefiles_ondemand_fd_release cachefiles_put_object cachefiles_put_object kmem_cache_free(cachefiles_object_jar, object) REQ_A->object->ondemand->ondemand_id // objeto UAF !!! Cuando vemos la solicitud dentro de xa_lock, req->object no debe haberse liberado a\u00fan, as\u00ed que tome el recuento de referencia del objeto antes de xa_unlock para evitar el problema anterior."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/3958679c49152391209b32be3357193300a51abd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/93064676a2820420a2d37d7c8289f277fe20793d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/cb55625f8eb9d2de8be4da0c4580d48cbb32058e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/da4a827416066191aafeeccee50a8836a826ba10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "5A16B675-D12F-49F9-AB96-23E6074FF336"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3958679c49152391209b32be3357193300a51abd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/93064676a2820420a2d37d7c8289f277fe20793d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb55625f8eb9d2de8be4da0c4580d48cbb32058e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/da4a827416066191aafeeccee50a8836a826ba10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39717",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-08-22T19:15:09.173",
"lastModified": "2024-08-27T16:15:07.400",
"vulnStatus": "Modified",
"lastModified": "2024-08-28T19:47:25.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-23",
"cisaActionDue": "2024-09-13",
@ -127,7 +127,10 @@
"references": [
{
"url": "https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-40530",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T16:15:36.750",
"lastModified": "2024-08-06T16:30:24.547",
"lastModified": "2024-08-28T19:15:08.717",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to execute arbitrary code via modification of the X-Forwarded-For header component."
"value": "A vulnerability in Pantera CRM versions 401.152 and 402.072 allows unauthorized attackers to bypass IP-based access controls by manipulating the X-Forwarded-For header."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-40531",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T16:15:36.800",
"lastModified": "2024-08-07T19:35:06.233",
"lastModified": "2024-08-28T19:15:08.797",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to escalate privileges via the user profile management function."
"value": "A mass assignment vulnerability exists in Pantera CRM versions 401.152 and 402.072. This flaw allows authenticated users to modify any user attribute, including roles, by injecting additional parameters via profile management functions."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40899",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:13.357",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:59:22.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,104 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() Obtuvimos el siguiente problema en una prueba de ejecuci\u00f3n aleatoria del comando de restauraci\u00f3n: ======== ==================================================== ======== ERROR: KASAN: slab-use-after-free en cachefiles_ondemand_daemon_read+0x609/0xab0 Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff888109164a80 por tarea ondemand-04-dae/4962 CPU: 11 PID: 4962 Comm: ondemand -04-dae No contaminado 6.8.0-rc7-dirty #542 Seguimiento de llamadas: kasan_report+0x94/0xc0 cachefiles_ondemand_daemon_read+0x609/0xab0 vfs_read+0x169/0xb50 ksys_read+0xf5/0x1e0 Asignado por tarea 626: /0x4b0 archivos de cach\u00e9_ondemand_send_req+ 0x24d/0x690 cachefiles_create_tmpfile+0x249/0xb30 cachefiles_create_file+0x6f/0x140 cachefiles_look_up_object+0x29c/0xa60 cachefiles_lookup_cookie+0x37d/0xca0 fscache_cookie_state_machine+0x43c/0x1230 [...] Liberado por tarea 626: kfree+0xf1/0x2c0 cachefiles_ondemand_send_req+0x568/0x690 cachefiles_create_tmpfile+ 0x249/0xb30 cachefiles_create_file+0x6f/0x140 cachefiles_look_up_object+0x29c/0xa60 cachefiles_lookup_cookie+0x37d/0xca0 fscache_cookie_state_machine+0x43c/0x1230 [...] ======================= ============================================= El siguiente es el proceso que desencadena el problema: montar | daemon_thread1 | daemon_thread2 ------------------------------------------------- ----------- cachefiles_ondemand_init_object cachefiles_ondemand_send_req REQ_A = kzalloc(sizeof(*req) + data_len) wait_for_completion(&REQ_A->done) cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req cachefiles_ondemand_get_fd usuario(_buffer, msg, n) proceso_open_req(REQ_A) ------ restaurar ------ cachefiles_ondemand_restore xas_for_each(&xas, req, ULONG_MAX) xas_set_mark(&xas, CACHEFILES_REQ_NEW); cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req write(devfd, (\"copen %u,%llu\", msg->msg_id, tama\u00f1o)); cachefiles_ondemand_copen xa_erase(&cache->reqs, id) complete(&REQ_A->done) kfree(REQ_A) cachefiles_ondemand_get_fd(REQ_A) fd = get_unused_fd_flags file = anon_inode_getfile fd_install(fd, file) load = (void *)REQ_A->msg.data; cargar->fd = fd; // carga UAF !!! Este problema se debe a la emisi\u00f3n de un comando de restauraci\u00f3n cuando el daemon todav\u00eda est\u00e1 activo, lo que da como resultado que una solicitud se procese varias veces y, por lo tanto, se active una UAF. Entonces, para evitar este problema, agregue un recuento de referencia adicional a cachefiles_req, que se mantiene mientras se espera y se lee, y luego se libera cuando finaliza la espera y la lectura. Tenga en cuenta que, dado que solo hay un recuento de referencias para esperar, debemos evitar que la misma solicitud se complete varias veces, por lo que solo podemos completar la solicitud si se elimina con \u00e9xito del xarray."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1d902d9a3aa4f2a8bda698294e34be788be012fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/99e9c5bd27ddefa0f9db88625bf5e31c1e833d62",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a6de82765e12fb1201ab607f0d3ffe3309b30fc0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/de3e26f9e5b76fc628077578c001c4a51bf54d06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "5A16B675-D12F-49F9-AB96-23E6074FF336"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1d902d9a3aa4f2a8bda698294e34be788be012fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/99e9c5bd27ddefa0f9db88625bf5e31c1e833d62",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a6de82765e12fb1201ab607f0d3ffe3309b30fc0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/de3e26f9e5b76fc628077578c001c4a51bf54d06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40932",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:15.820",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:48:53.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,173 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/exynos/vidi: corrige la p\u00e9rdida de memoria en .get_modes() El EDID duplicado nunca se libera. Arreglalo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/0acc356da8546b5c55aabfc2e2c5caa0ac9b0003",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/38e3825631b1f314b21e3ade00b5a4d737eb054e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/540ca99729e28dbe902b01039a3b4bd74520a819",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/777838c9b571674ef14dbddf671f372265879226",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a269c5701244db2722ae0fce5d1854f5d8f31224",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cb3ac233434dba130281db330c4b15665b2d2c4d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dcba6bedb439581145d8aa6b0925209f23184ae1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ebcf81504fef03f701b9711e43fea4fe2d82ebc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.95",
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.35",
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0acc356da8546b5c55aabfc2e2c5caa0ac9b0003",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/38e3825631b1f314b21e3ade00b5a4d737eb054e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/540ca99729e28dbe902b01039a3b4bd74520a819",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/777838c9b571674ef14dbddf671f372265879226",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a269c5701244db2722ae0fce5d1854f5d8f31224",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb3ac233434dba130281db330c4b15665b2d2c4d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dcba6bedb439581145d8aa6b0925209f23184ae1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ebcf81504fef03f701b9711e43fea4fe2d82ebc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40934",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:15.977",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:49:04.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,155 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: logitech-dj: Reparar p\u00e9rdida de memoria en logi_dj_recv_switch_to_dj_mode() Reparar una p\u00e9rdida de memoria en la ruta de error logi_dj_recv_send_report()."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/15122dc140d82c51c216535c57b044c4587aae45",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/1df2ead5dfad5f8f92467bd94889392d53100b98",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/789c99a1d7d2c8f6096d75fc2930505840ec9ea0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/a0503757947f2e46e59c1962326b53b3208c8213",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/caa9c9acb93db7ad7b74b157cf101579bac9596d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ce3af2ee95170b7d9e15fff6e500d67deab1e7b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f677ca8cfefee2a729ca315f660cd4868abdf8de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.257",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "71299EE2-D1AB-440D-95DA-50AE3BFDDD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.195",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "2A4A44D4-1B57-4B2B-A1E2-9C68B4DC2A62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.132",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "739A47EB-82B2-406D-8A5D-5566B8046481"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.53",
"versionEndExcluding": "6.1.95",
"matchCriteriaId": "3BCDA0CD-C88C-4D23-80C9-97DC92D6F775"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.35",
"matchCriteriaId": "F4403344-197F-4A92-9E46-627CE50A9B83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/15122dc140d82c51c216535c57b044c4587aae45",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1df2ead5dfad5f8f92467bd94889392d53100b98",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/789c99a1d7d2c8f6096d75fc2930505840ec9ea0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a0503757947f2e46e59c1962326b53b3208c8213",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/caa9c9acb93db7ad7b74b157cf101579bac9596d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce3af2ee95170b7d9e15fff6e500d67deab1e7b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f677ca8cfefee2a729ca315f660cd4868abdf8de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40954",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.627",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:43:58.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,137 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: no deja un puntero sk colgando cuando falla la creaci\u00f3n del socket. Es posible activar un use-after-free: * adjuntando una sonda fentry a __sock_release() y el sonda que llama al asistente bpf_get_socket_cookie() * ejecuta traceroute -I 1.1.1.1 en una m\u00e1quina virtual reci\u00e9n iniciada. Un kernel habilitado para KASAN registrar\u00e1 algo como lo siguiente (decodificado y eliminado): =============== ==================================================== = ERROR: KASAN: slab-use-after-free en __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include /linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888007110dd8 mediante tarea traceroute/299 CPU: 2 PID: 299 Comm: traceroute Contaminado: GE 6.10.0- rc2+ #2 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 01/04/2014 Seguimiento de llamadas: dump_stack_lvl (lib/dump_stack.c:117 ( discriminador 1)) print_report (mm/kasan/report.c:378 mm/kasan/report.c:488)? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 neto /core/sock_diag.c:29) kasan_report (mm/kasan/report.c:603)? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 neto /core/sock_diag.c:29) kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189) __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include /linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) bpf_get_socket_ptr_cookie (./arch/x86/include/asm /preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092) bpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e bpf_trampoline_6442506592+0x47/0xaf __ calcet\u00edn_release (net/ socket.c:652) __sock_create (net/socket.c:1601) ... Asignado por la tarea 299 en la CPU 2 en 78.328492s: kasan_save_stack (mm/kasan/common.c:48) kasan_save_track (mm/kasan/common. c:68) __kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338) kmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007) sk_prot_alloc (net/core/sock.c:2075) sk_alloc (net/core/sock.c:2134) inet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252) __sock_create (net/socket. c:1572) __sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706) __x64_sys_socket (net/socket.c:1718) do_syscall_64 (arch/x86/entry/common.c: 52 arch/x86/entry/common.c:83) Entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Liberado por la tarea 299 en la CPU 2 a las 78.328502s: kasan_save_stack (mm/kasan/common.c:48) kasan_save_track (mm/kasan/common.c:68) kasan_save_free_info (mm/kasan/generic.c:582) veneno_slab_object (mm/kasan/common.c:242) __kasan_slab_free (mm/kasan/common.c:256) kmem_cache_free ( mm/slub.c:4437 mm/slub.c:4511) __sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208) inet_create (net/ipv4/af_inet.c:397 net/ipv4 /af_inet.c:252) __sock_create (net/socket.c:1572) __sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706) __x64_sys_socket (net/socket.c:1718 ) do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) Entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Solucione este problema borrando la referencia del socket de estructura en sk_common_release () para cubrir todas las familias de protocolos, cree funciones, que pueden ya adjuntar la referencia al objeto sk con sock_init_data()."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/454c454ed645fed051216b79622f7cb69c1638f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/78e4aa528a7b1204219d808310524344f627d069",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/893eeba94c40d513cd0fe6539330ebdaea208c0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "BD852924-11EF-4EBB-B88D-50A6300754D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/454c454ed645fed051216b79622f7cb69c1638f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/78e4aa528a7b1204219d808310524344f627d069",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/893eeba94c40d513cd0fe6539330ebdaea208c0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40955",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.697",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T19:45:37.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: arreglar slab-out-of-bounds en ext4_mb_find_good_group_avg_frag_lists() Podemos activar un slab-out-of-bounds con los siguientes comandos: mkfs.ext4 -F /dev/ $disk 10G montaje /dev/$disk /tmp/test echo 2147483647 > /sys/fs/ext4/$disk/mb_group_prealloc echo test > /tmp/test/file && sync ============ ==================================================== ==== ERROR: KASAN: losa fuera de los l\u00edmites en ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888121b9d0f0 por tarea kworker/u2:0/11 CPU: 0 PID: 11 Comm: kworker/ u2:0 Tainted: GL 6.7.0-next-20240118 #521 Seguimiento de llamadas: dump_stack_lvl+0x2c/0x50 kasan_report+0xb6/0xf0 ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4_mb_regular_allocator+0x19e9 /0x2370 [ext4] text4_mb_new_blocks+0x88a/0x1370 [ text4] text4_ext_map_blocks+0x14f7/0x2390 [ext4] text4_map_blocks+0x569/0xea0 [ext4] text4_do_writepages+0x10f6/0x1bc0 [ext4] [...] ==================== ================================================ El flujo de La activaci\u00f3n del problema es la siguiente: // Establezca s_mb_group_prealloc en 2147483647 a trav\u00e9s de sysfs ext4_mb_new_blocks ext4_mb_normalize_request ext4_mb_normalize_group_request ac->ac_g_ex.fe_len = EXT4_SB(sb)->s_mb_group_prealloc ext4_mb_regular_allocator ext4_mb_choose _next_group ext4_mb_choose_next_group_best_avail mb_avg_fragment_size_order orden = fls(len) - 2 = 29 ext4_mb_find_good_group_avg_frag_lists frag_list = &sbi- >s_mb_avg_fragment_size[order] if (list_empty(frag_list)) // \u00a1Activa SOOB! En un tama\u00f1o de bloque de 4k, la longitud de la lista s_mb_avg_fragment_size es 14, pero se establece un s_mb_group_prealloc de gran tama\u00f1o, lo que provoca que los l\u00edmites de losa se activen al intentar acceder a un elemento en el \u00edndice 29. Agregue un nuevo attr_id attr_clusters_in_group con valores en el rango [0, sbi->s_clusters_per_group] y declare mb_group_prealloc como ese tipo para solucionar el problema. Adem\u00e1s, evite devolver un pedido de mb_avg_fragment_size_order() mayor que MB_NUM_ORDERS(sb) y reduzca algunos bucles in\u00fatiles."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/13df4d44a3aaabe61cd01d277b6ee23ead2a5206",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/677ff4589f1501578fa903a25bb14831d0607992",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/b829687ae1229224262bcabf49accfa2dbf8db06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "A9A441DF-0244-4D7F-B25A-F692568FFC15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/13df4d44a3aaabe61cd01d277b6ee23ead2a5206",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/677ff4589f1501578fa903a25bb14831d0607992",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b829687ae1229224262bcabf49accfa2dbf8db06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40956",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.760",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:58:48.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,137 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: corrija posible Use-After-Free en irq_process_work_list Use list_for_each_entry_safe() para permitir iterar a trav\u00e9s de la lista y eliminar la entrada en el proceso de iteraci\u00f3n. El descriptor se libera a trav\u00e9s de idxd_desc_complete() y existe una peque\u00f1a posibilidad de que cause problemas para el iterador de la lista cuando otro subproceso reutiliza el descriptor sin que se elimine de la lista."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40957",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.823",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:58:59.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,137 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: seg6: corrige el paso de par\u00e1metros al llamar a NF_HOOK() en los comportamientos End.DX4 y End.DX6 input_action_end_dx4() y input_action_end_dx6() se llaman NF_HOOK() para el gancho PREROUTING, en el gancho PREROUTING , debemos pasar un indev v\u00e1lido y un outdev NULL a NF_HOOK(); de lo contrario, podemos desencadenar una desreferencia del puntero NULL, como se muestra a continuaci\u00f3n: [74830.647293] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000090 [74830.655633] #PF: acceso de lectura del supervisor en modo kernel [74830.657888] #PF: error_code(0x0000) - p\u00e1gina no presente [74830.659500] PGD 0 P4D 0 [74830.660450] Ups: 0000 [#1] PREEMPT SMP PTI... [74830.664953] Nombre de hardware: Red Hat KVM , BIOS 0.5.1 01/01/2011 [74830.666569] RIP: 0010:rpfilter_mt+0x44/0x15e [ipt_rpfilter] ... [74830.689725] Seguimiento de llamadas: [74830.690402] [74830.690953] ? show_trace_log_lvl+0x1c4/0x2df [74830.692020] ? show_trace_log_lvl+0x1c4/0x2df [74830.693095] ? ipt_do_table+0x286/0x710 [ip_tables] [74830.694275] ? __die_body.cold+0x8/0xd [74830.695205] ? page_fault_oops+0xac/0x140 [74830.696244] ? exc_page_fault+0x62/0x150 [74830.697225] ? asm_exc_page_fault+0x22/0x30 [74830.698344] ? rpfilter_mt+0x44/0x15e [ipt_rpfilter] [74830.699540] ipt_do_table+0x286/0x710 [ip_tables] [74830.700758] ? ip6_route_input+0x19d/0x240 [74830.701752] nf_hook_slow+0x3f/0xb0 [74830.702678] input_action_end_dx4+0x19b/0x1e0 [74830.703735] ? input_action_end_t+0xe0/0xe0 [74830.704734] seg6_local_input_core+0x2d/0x60 [74830.705782] lwtunnel_input+0x5b/0xb0 [74830.706690] __netif_receive_skb_one_core+0x63/0xa0 830.707825] proceso_atrasado+0x99/0x140 [74830.709538] __napi_poll+0x2c/0x160 [74830.710673] net_rx_action+ 0x296/0x350 [74830.711860] __do_softirq+0xcb/0x2ac [74830.713049] do_softirq+0x63/0x90 input_action_end_dx4() pasando un indev NULL a NF_HOOK(), y finalmente activa una desreferencia NULL en rpfilter_mt()->rpfilter_is_lo opback(): bool est\u00e1tico rpfilter_is_loopback (const struct sk_buff *skb, const struct net_device *in) { // in es NULL return skb->pkt_type == PACKET_LOOPBACK || en->flags & IFF_LOOPBACK; }"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/561475d53aa7e4511ee7cdba8728ded81cf1db1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/9a3bc8d16e0aacd65c31aaf23a2bced3288a7779",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/af90e3d73dc45778767b2fb6e7edd57ebe34380d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/d62df86c172033679d744f07d89e93e367dd11f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ec4d970b597ee5e17b0d8d73b7875197ce9a04d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "4626E4B7-D5F4-42CC-93A8-B73E6384273F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/561475d53aa7e4511ee7cdba8728ded81cf1db1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a3bc8d16e0aacd65c31aaf23a2bced3288a7779",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af90e3d73dc45778767b2fb6e7edd57ebe34380d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d62df86c172033679d744f07d89e93e367dd11f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ec4d970b597ee5e17b0d8d73b7875197ce9a04d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40958",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.883",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:46:29.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,165 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netns: haga que get_net_ns() maneje cero refcount net. Syzkaller recibi\u00f3 una advertencia: refcount_t: adici\u00f3n en 0; use-after-free. ADVERTENCIA: CPU: 3 PID: 7890 en lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0 M\u00f3dulos vinculados en: CPU: 3 PID: 7890 Comm: tun No contaminado 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310 Hardware nombre: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 01/04/2014 RIP: 0010:refcount_warn_saturate+0xdf/0x1d0 C\u00f3digo: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1 RSP: 0018: ffff8881067b7da0 EFLAGS: 00010286 RAX: 00000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001 RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139 R10: 00000000000000000 R11: 205d303938375420 R12: 8881086500c4 R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040 FS : 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fd18 CR3: 00000001482f6000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ? show_regs+0xa3/0xc0? __advertir+0xa5/0x1c0 ? refcount_warn_saturate+0xdf/0x1d0? report_bug+0x1fc/0x2d0? refcount_warn_saturate+0xdf/0x1d0? handle_bug+0xa1/0x110? exc_invalid_op+0x3c/0xb0? asm_exc_invalid_op+0x1f/0x30? __warn_printk+0xcc/0x140 ? __warn_printk+0xd5/0x140 ? refcount_warn_saturate+0xdf/0x1d0 get_net_ns+0xa4/0xc0 ? __pfx_get_net_ns+0x10/0x10 open_ related_ns+0x5a/0x130 __tun_chr_ioctl+0x1616/0x2370 ? __sanitizer_cov_trace_switch+0x58/0xa0? __sanitizer_cov_trace_const_cmp2+0x1c/0x30 ? __pfx_tun_chr_ioctl+0x10/0x10 tun_chr_ioctl+0x2f/0x40 __x64_sys_ioctl+0x11b/0x160 x64_sys_call+0x1211/0x20d0 do_syscall_64+0x9e/0x1d0 Entry_SYSCALL_64_after_h wframe+0x77/0x7f RIP: 0033:0x7f5b28f165d7 C\u00f3digo: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff 73 01 c3 48 8b 0d 81 48 2d 0 8 RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7 RDX: 000000000 RSI: 00000000000054e3 RDI: 0000000000000003 RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0 R10: 690010 R11: 0000000000000246 R12: 0000000000400730 R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 00000000000000000 P\u00e1nico del kernel - no sincronizado: kernel: p\u00e1nico_on_warn set ... Esto se activa como se muestra a continuaci\u00f3n: ns0 ns1 tun_set_iff() //dev is tun0 tun->dev = dev //ip link set tun0 netns ns1 put_net() //ref es 0 __tun_chr_ioctl() //TUNGETDEVNETNS net = dev_net(tun->dev); open_ related_ns(&net->ns, get_net_ns); //ns1 get_net_ns() get_net() //adici\u00f3n en 0 Use may_get_net() en get_net_ns en caso de que la referencia de red sea cero para solucionar este problema"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1b631bffcb2c09551888f3c723f4365c91fe05ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/2b82028a1f5ee3a8e04090776b10c534144ae77b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/3af28df0d883e8c89a29ac31bc65f9023485743b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cb7f811f638a14590ff98f53c6dd1fb54627d940",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ef0394ca25953ea0eddcc82feae1f750451f1876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ff960f9d3edbe08a736b5a224d91a305ccc946b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "5A16AF13-82B4-4031-88E2-F3A1AE0863D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1b631bffcb2c09551888f3c723f4365c91fe05ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2b82028a1f5ee3a8e04090776b10c534144ae77b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3af28df0d883e8c89a29ac31bc65f9023485743b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb7f811f638a14590ff98f53c6dd1fb54627d940",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ef0394ca25953ea0eddcc82feae1f750451f1876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff960f9d3edbe08a736b5a224d91a305ccc946b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40959",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:17.947",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:46:52.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,179 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm6: verifique el valor de retorno de ip6_dst_idev() en xfrm6_get_saddr() ip6_dst_idev() puede devolver NULL, xfrm6_get_saddr() debe actuar en consecuencia. syzbot inform\u00f3: Ups: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 12 Comm: trabajador/ u8:1 No contaminado 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/04/2024 Cola de trabajo: wg-kex-wg1 wg_packet_handshake_send_worker RIP: 0010:xfrm6_get_saddr +0x93/0x130 net/ipv6/xfrm6_policy.c:64 C\u00f3digo: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff f 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00 RSP: 0018:ffffc90000117378 EFLAGS: 00010246 RAX dff ffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7 RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98 RBP: ffff88807ad73248 R08: 0000000000000007 R09: ffffffffffff000 R10: ffff88807b079dc0 11: 0000000000000007 R12: ffffc90000117480 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0 000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS : 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: xfrm_get_saddr net/xfrm/xfrm_policy .c:2452 [en l\u00ednea] xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [en l\u00ednea] xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541 xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_ pol\u00edtica.c:2835 xfrm_bundle_lookup net /xfrm/xfrm_policy.c:3070 [en l\u00ednea] xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201 xfrm_lookup net/xfrm/xfrm_policy.c:3298 [en l\u00ednea] xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm _pol\u00edtica.c :3309 ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256 send6+0x611/0xd20 controladores/net/wireguard/socket.c:139 wg_socket_send_skb_to_peer+0xf9/0x220 controladores/net/wireguard/socket.c:178 enviar_buffer_to_peer+ 0x12b/0x190 controladores/net/wireguard/socket.c:200 wg_packet_send_handshake_initiation+0x227/0x360 controladores/net/wireguard/send.c:40 wg_packet_handshake_send_worker+0x1c/0x30 controladores/net/wireguard/send.c:51 Process_one_work+0x9fb/ 0x1b60 kernel/workqueue.c:3231 Process_scheduled_works kernel/workqueue.c:3312 [en l\u00ednea] trabajador_thread+0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/ x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/20427b85781aca0ad072851f6907a3d4b2fed8d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/600a62b4232ac027f788c3ca395bc2333adeaacf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/83c02fb2cc0afee5bb53cddf3f34f045f654ad6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d46401052c2d5614da8efea5788532f0401cb164",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f897d7171652fcfc76d042bfec798b010ee89e41",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.12",
"versionEndExcluding": "4.19.317",
"matchCriteriaId": "4E229973-CC2A-4919-9D45-96986F94BAB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.279",
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/20427b85781aca0ad072851f6907a3d4b2fed8d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/600a62b4232ac027f788c3ca395bc2333adeaacf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83c02fb2cc0afee5bb53cddf3f34f045f654ad6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d46401052c2d5614da8efea5788532f0401cb164",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f897d7171652fcfc76d042bfec798b010ee89e41",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-41236",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.497",
"lastModified": "2024-08-28T18:35:16.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in /smsa/admin_login.php in Kashipara Responsive School Management System v3.2.0 allows an attacker to execute arbitrary SQL commands via the \"username\" parameter of the Admin Login Page"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Admin.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-42905",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.630",
"lastModified": "2024-08-28T19:35:20.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Beijing Digital China Cloud Technology Co., Ltd. DCME-320 v.7.4.12.60 has a command execution vulnerability, which can be exploited to obtain device administrator privileges via the getVar function in the code/function/system/tool/ping.php file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/DCN/1.md",
"source": "cve@mitre.org"
},
{
"url": "https://immense-mirror-b42.notion.site/Beijing-Digital-China-Yunke-Information-Technology-Co-Ltd-DCN-firewall-has-a-command-execution-vuln-31bdd1228f6d47c09e854af5f0e7059f",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43472",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-16T20:15:13.673",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T19:13:21.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43472",
"source": "secure@microsoft.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "127.0.2651.105",
"matchCriteriaId": "FD5D1F37-DB27-4908-B519-EB29A99FE8AC"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43472",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44761",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T19:15:08.933",
"lastModified": "2024-08-28T19:15:08.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44913",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.707",
"lastModified": "2024-08-28T19:35:21.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the component EXR!ReadEXR+0x40ef1 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/yuhano/irfanview_Poc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44914",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.780",
"lastModified": "2024-08-28T19:35:22.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the component EXR!ReadEXR+0x3df50 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/yuhano/irfanview_Poc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44915",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T18:15:09.863",
"lastModified": "2024-08-28T19:35:22.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the component EXR!ReadEXR+0x4eef0 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/yuhano/irfanview_Poc",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45191",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T16:15:10.120",
"lastModified": "2024-08-23T16:18:28.547",
"lastModified": "2024-08-28T19:15:09.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
"value": "An issue was discovered in Matrix libolm through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45192",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T16:15:10.237",
"lastModified": "2024-08-23T16:18:28.547",
"lastModified": "2024-08-28T19:15:09.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
"value": "An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45193",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T16:15:10.300",
"lastModified": "2024-08-23T16:18:28.547",
"lastModified": "2024-08-28T19:15:09.297",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
"value": "An issue was discovered in Matrix libolm through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6361",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-05T19:15:38.333",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T18:17:35.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://portal.microfocus.com/s/article/KM000032605?language=en_US",
"source": "security@opentext.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:alm_octane:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.4",
"matchCriteriaId": "107C8D81-928E-491C-99E5-F52C2B43B332"
}
]
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000032605?language=en_US",
"source": "security@opentext.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7061",
"sourceIdentifier": "psirt@okta.com",
"published": "2024-08-07T17:15:52.113",
"lastModified": "2024-08-07T19:09:46.290",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T18:25:38.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@okta.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
},
{
"source": "psirt@okta.com",
"type": "Secondary",
@ -55,14 +85,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://help.okta.com/oie/en-us/content/topics/releasenotes/oie-ov-release-notes.htm#panel4",
"source": "psirt@okta.com"
},
"nodes": [
{
"url": "https://trust.okta.com/security-advisories/okta-verify-for-windows-privilege-escalation-cve-2024-7061/",
"source": "psirt@okta.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:okta:verify:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.0.2",
"matchCriteriaId": "951E2564-0B8A-49B9-A130-4647DF323B7E"
}
]
}
]
}
],
"references": [
{
"url": "https://help.okta.com/oie/en-us/content/topics/releasenotes/oie-ov-release-notes.htm#panel4",
"source": "psirt@okta.com",
"tags": [
"Not Applicable",
"Release Notes"
]
},
{
"url": "https://trust.okta.com/security-advisories/okta-verify-for-windows-privilege-escalation-cve-2024-7061/",
"source": "psirt@okta.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7578",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-07T13:16:00.527",
"lastModified": "2024-08-07T15:17:46.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T18:27:18.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,70 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md",
"source": "cna@vuldb.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:alientechnology:alr-f800_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19.10.24",
"matchCriteriaId": "5EC1F8CB-8783-4A48-AF4E-6336310410EC"
}
]
},
{
"url": "https://vuldb.com/?ctiid.273858",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.273858",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.382469",
"source": "cna@vuldb.com"
"vulnerable": false,
"criteria": "cpe:2.3:h:alientechnology:alr-f800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CE7137-0ED2-47C0-A374-D41869F80314"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273858",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273858",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.382469",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7579",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-07T14:15:33.380",
"lastModified": "2024-08-07T15:17:46.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T18:26:46.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,70 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md",
"source": "cna@vuldb.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:alientechnology:alr-f800_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19.10.24",
"matchCriteriaId": "5EC1F8CB-8783-4A48-AF4E-6336310410EC"
}
]
},
{
"url": "https://vuldb.com/?ctiid.273859",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.273859",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.382470",
"source": "cna@vuldb.com"
"vulnerable": false,
"criteria": "cpe:2.3:h:alientechnology:alr-f800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CE7137-0ED2-47C0-A374-D41869F80314"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.273859",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.273859",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.382470",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-28T18:00:18.030891+00:00
2024-08-28T20:00:17.696095+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-28T17:59:36.023000+00:00
2024-08-28T19:59:22.927000+00:00
```
### Last Data Feed Release
@ -33,60 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261387
261393
```
### CVEs added in the last Commit
Recently added CVEs: `16`
Recently added CVEs: `6`
- [CVE-2024-20279](CVE-2024/CVE-2024-202xx/CVE-2024-20279.json) (`2024-08-28T17:15:06.113`)
- [CVE-2024-20284](CVE-2024/CVE-2024-202xx/CVE-2024-20284.json) (`2024-08-28T17:15:06.893`)
- [CVE-2024-20285](CVE-2024/CVE-2024-202xx/CVE-2024-20285.json) (`2024-08-28T17:15:07.687`)
- [CVE-2024-20286](CVE-2024/CVE-2024-202xx/CVE-2024-20286.json) (`2024-08-28T17:15:08.400`)
- [CVE-2024-20289](CVE-2024/CVE-2024-202xx/CVE-2024-20289.json) (`2024-08-28T17:15:09.117`)
- [CVE-2024-20411](CVE-2024/CVE-2024-204xx/CVE-2024-20411.json) (`2024-08-28T17:15:09.500`)
- [CVE-2024-20413](CVE-2024/CVE-2024-204xx/CVE-2024-20413.json) (`2024-08-28T17:15:09.763`)
- [CVE-2024-20446](CVE-2024/CVE-2024-204xx/CVE-2024-20446.json) (`2024-08-28T17:15:09.997`)
- [CVE-2024-20478](CVE-2024/CVE-2024-204xx/CVE-2024-20478.json) (`2024-08-28T17:15:10.220`)
- [CVE-2024-41564](CVE-2024/CVE-2024-415xx/CVE-2024-41564.json) (`2024-08-28T17:15:10.693`)
- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-08-28T17:15:10.903`)
- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-08-28T16:15:09.210`)
- [CVE-2024-42900](CVE-2024/CVE-2024-429xx/CVE-2024-42900.json) (`2024-08-28T16:15:09.443`)
- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-08-28T17:15:11.163`)
- [CVE-2024-7744](CVE-2024/CVE-2024-77xx/CVE-2024-7744.json) (`2024-08-28T17:15:11.380`)
- [CVE-2024-7745](CVE-2024/CVE-2024-77xx/CVE-2024-7745.json) (`2024-08-28T17:15:11.593`)
- [CVE-2024-41236](CVE-2024/CVE-2024-412xx/CVE-2024-41236.json) (`2024-08-28T18:15:09.497`)
- [CVE-2024-42905](CVE-2024/CVE-2024-429xx/CVE-2024-42905.json) (`2024-08-28T18:15:09.630`)
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T19:15:08.933`)
- [CVE-2024-44913](CVE-2024/CVE-2024-449xx/CVE-2024-44913.json) (`2024-08-28T18:15:09.707`)
- [CVE-2024-44914](CVE-2024/CVE-2024-449xx/CVE-2024-44914.json) (`2024-08-28T18:15:09.780`)
- [CVE-2024-44915](CVE-2024/CVE-2024-449xx/CVE-2024-44915.json) (`2024-08-28T18:15:09.863`)
### CVEs modified in the last Commit
Recently modified CVEs: `57`
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-08-28T16:35:14.267`)
- [CVE-2024-25655](CVE-2024/CVE-2024-256xx/CVE-2024-25655.json) (`2024-08-28T16:35:15.510`)
- [CVE-2024-25859](CVE-2024/CVE-2024-258xx/CVE-2024-25859.json) (`2024-08-28T16:35:16.347`)
- [CVE-2024-25866](CVE-2024/CVE-2024-258xx/CVE-2024-25866.json) (`2024-08-28T16:35:17.133`)
- [CVE-2024-26470](CVE-2024/CVE-2024-264xx/CVE-2024-26470.json) (`2024-08-28T16:35:18.190`)
- [CVE-2024-28125](CVE-2024/CVE-2024-281xx/CVE-2024-28125.json) (`2024-08-28T16:35:19.333`)
- [CVE-2024-28537](CVE-2024/CVE-2024-285xx/CVE-2024-28537.json) (`2024-08-28T16:35:20.337`)
- [CVE-2024-28640](CVE-2024/CVE-2024-286xx/CVE-2024-28640.json) (`2024-08-28T16:35:21.193`)
- [CVE-2024-34087](CVE-2024/CVE-2024-340xx/CVE-2024-34087.json) (`2024-08-28T16:35:22.590`)
- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T16:15:08.417`)
- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T16:15:08.740`)
- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T16:15:08.863`)
- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-08-28T16:15:08.980`)
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-28T16:15:58.043`)
- [CVE-2024-3980](CVE-2024/CVE-2024-39xx/CVE-2024-3980.json) (`2024-08-28T16:32:20.957`)
- [CVE-2024-3982](CVE-2024/CVE-2024-39xx/CVE-2024-3982.json) (`2024-08-28T16:30:50.080`)
- [CVE-2024-39930](CVE-2024/CVE-2024-399xx/CVE-2024-39930.json) (`2024-08-28T16:15:09.077`)
- [CVE-2024-41310](CVE-2024/CVE-2024-413xx/CVE-2024-41310.json) (`2024-08-28T17:42:01.190`)
- [CVE-2024-41657](CVE-2024/CVE-2024-416xx/CVE-2024-41657.json) (`2024-08-28T16:13:35.140`)
- [CVE-2024-41658](CVE-2024/CVE-2024-416xx/CVE-2024-41658.json) (`2024-08-28T16:08:31.743`)
- [CVE-2024-42845](CVE-2024/CVE-2024-428xx/CVE-2024-42845.json) (`2024-08-28T16:35:23.650`)
- [CVE-2024-43915](CVE-2024/CVE-2024-439xx/CVE-2024-43915.json) (`2024-08-28T17:44:45.193`)
- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-08-28T16:25:02.097`)
- [CVE-2024-7940](CVE-2024/CVE-2024-79xx/CVE-2024-7940.json) (`2024-08-28T16:24:07.043`)
- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-08-28T16:09:03.693`)
- [CVE-2024-30624](CVE-2024/CVE-2024-306xx/CVE-2024-30624.json) (`2024-08-28T18:35:15.953`)
- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-08-28T19:35:18.897`)
- [CVE-2024-39504](CVE-2024/CVE-2024-395xx/CVE-2024-39504.json) (`2024-08-28T19:58:45.653`)
- [CVE-2024-39506](CVE-2024/CVE-2024-395xx/CVE-2024-39506.json) (`2024-08-28T19:58:56.013`)
- [CVE-2024-39510](CVE-2024/CVE-2024-395xx/CVE-2024-39510.json) (`2024-08-28T19:59:12.947`)
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-28T19:47:25.410`)
- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-28T19:15:08.717`)
- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-08-28T19:15:08.797`)
- [CVE-2024-40899](CVE-2024/CVE-2024-408xx/CVE-2024-40899.json) (`2024-08-28T19:59:22.927`)
- [CVE-2024-40932](CVE-2024/CVE-2024-409xx/CVE-2024-40932.json) (`2024-08-28T19:48:53.420`)
- [CVE-2024-40934](CVE-2024/CVE-2024-409xx/CVE-2024-40934.json) (`2024-08-28T19:49:04.307`)
- [CVE-2024-40954](CVE-2024/CVE-2024-409xx/CVE-2024-40954.json) (`2024-08-28T19:43:58.273`)
- [CVE-2024-40955](CVE-2024/CVE-2024-409xx/CVE-2024-40955.json) (`2024-08-28T19:45:37.080`)
- [CVE-2024-40956](CVE-2024/CVE-2024-409xx/CVE-2024-40956.json) (`2024-08-28T18:58:48.433`)
- [CVE-2024-40957](CVE-2024/CVE-2024-409xx/CVE-2024-40957.json) (`2024-08-28T18:58:59.793`)
- [CVE-2024-40958](CVE-2024/CVE-2024-409xx/CVE-2024-40958.json) (`2024-08-28T18:46:29.543`)
- [CVE-2024-40959](CVE-2024/CVE-2024-409xx/CVE-2024-40959.json) (`2024-08-28T18:46:52.453`)
- [CVE-2024-43472](CVE-2024/CVE-2024-434xx/CVE-2024-43472.json) (`2024-08-28T19:13:21.393`)
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-28T19:15:09.110`)
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-28T19:15:09.210`)
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-28T19:15:09.297`)
- [CVE-2024-6361](CVE-2024/CVE-2024-63xx/CVE-2024-6361.json) (`2024-08-28T18:17:35.497`)
- [CVE-2024-7061](CVE-2024/CVE-2024-70xx/CVE-2024-7061.json) (`2024-08-28T18:25:38.217`)
- [CVE-2024-7578](CVE-2024/CVE-2024-75xx/CVE-2024-7578.json) (`2024-08-28T18:27:18.510`)
- [CVE-2024-7579](CVE-2024/CVE-2024-75xx/CVE-2024-7579.json) (`2024-08-28T18:26:46.117`)
## Download and Usage

View File

@ -92623,7 +92623,7 @@ CVE-2016-9838,0,0,8915e7a7760dab1b83ccc9fcf5714761065d956e576593ed79dbce273e9baa
CVE-2016-9839,0,0,56dd29d3d2add257a8ccbd99c526531df97870ecd1b87178196e5e22a1a37a37,2023-01-31T19:58:56.190000
CVE-2016-9840,0,0,c8cdfedcf9ba9d30c2e11a30c9ee1027f9c4943670cac0713400edb96b12ecbf,2023-11-07T02:37:35.780000
CVE-2016-9841,0,0,8461023f0b6af372abbc700df4bf248326f3d17885a444f7d4bf87fb75831d87,2023-11-07T02:37:36.093000
CVE-2016-9842,0,1,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000
CVE-2016-9842,0,0,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000
CVE-2016-9843,0,0,03bba8f361b4f311c57e6be0a8dca8d549e9547ec0826de5125cdde6ebac4654,2023-11-07T02:37:36.807000
CVE-2016-9844,0,0,00ba3ac318d524a060543298e92f49ba342658607b49204e522db0201c5e4e2a,2019-12-16T20:24:14.587000
CVE-2016-9845,0,0,00bb0b1bdce117249db0d0b791e75c832a7a8fdd6ba23a94074ca0696959dbbe,2020-11-10T19:23:05.543000
@ -121384,7 +121384,7 @@ CVE-2018-25095,0,0,6f4ec7520fe1e8e1137939a36d89eebffe41414142eb46d5c5f36cf386b6b
CVE-2018-25096,0,0,0f1a9d2fe0943450f70fc2f111ebfdebd2f2c63d07ffdb5b75cb7af27e02a352,2024-05-17T01:27:30.770000
CVE-2018-25097,0,0,b132b2c05ec96134ee21d6c1f5f845fb6d9b53254de5311e7c1f18ebf1a12d65,2024-05-17T01:27:30.893000
CVE-2018-25098,0,0,afd500b111d854a57f928388ff40ee517eeef41a47b8f0c70385aae8f8a38f95,2024-08-05T13:15:46.743000
CVE-2018-25099,0,1,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000
CVE-2018-25099,0,0,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000
CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000
CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000
CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000
@ -136789,7 +136789,7 @@ CVE-2019-19820,0,0,d3200ebc5d581b4755916a609fe50979edea5a15e0fc3a04ffa5f71613f4e
CVE-2019-19821,0,0,5d4ec7e2bffa15750c2939c0e7d2adea2bc3396ead4c3fc172fe464bc3578a28,2020-08-24T17:37:01.140000
CVE-2019-19822,0,0,f372437f800ae6340a6e164d4e09649bd7569c516be8f3889c8ec515ac663de0,2020-08-24T17:37:01.140000
CVE-2019-19823,0,0,3f6ad46dcab8a2c03d46210de505a5e9a1aaa92fdf0608ae333a991ddf15937a,2020-02-06T16:04:39.370000
CVE-2019-19824,0,1,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000
CVE-2019-19824,0,0,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000
CVE-2019-19825,0,0,04de0123f214687b69fe0b70940205a91ae0ecd6ff99d9fd325f56ef736a2f2b,2020-02-05T14:35:31.347000
CVE-2019-19826,0,0,2689ee020ae9e5e4ebe835dbcc0a88d036a8c5de49eae99421281d65c6938d42,2019-12-27T16:49:24.693000
CVE-2019-19829,0,0,3f73ae381fa8469b280488161d5fec22d571a4f6250d30f76b53103ab377bf65,2019-12-23T12:27:16.840000
@ -147483,7 +147483,7 @@ CVE-2020-1261,0,0,facd24f80876f2ac6682cd4ffcda5908f697f57ca36f3a6dbb2ed3896e7945
CVE-2020-12612,0,0,27c013661b38b08d73a9ed802a24540f4841a815e7c5477dd782dabe8437df9c,2023-12-15T16:24:27.337000
CVE-2020-12613,0,0,c95356c17bc093130235aa64aae86584b7d9b965bf99a8b709408a2aaf3f050c,2023-12-14T16:37:11.820000
CVE-2020-12614,0,0,847dc8f32da2d3c78a4e8ef365590ce7648ef554d7da2f4e7aa6d04370642371,2024-08-01T13:42:02.280000
CVE-2020-12615,0,1,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000
CVE-2020-12615,0,0,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000
CVE-2020-12618,0,0,6597e2bb9a8de14b97fe7ce944c521c20b776df974886bc6ada82eff63e8acda,2021-07-21T11:39:23.747000
CVE-2020-12619,0,0,ee598b4bf1d4265af77d330472cf7b83e088560073a1c2a3d5a6cf8d6eb12600,2021-07-21T11:39:23.747000
CVE-2020-1262,0,0,21c4e042f0bae4f9c23017151de84d72ef7a045e9efdf2cc4d6cb16ca079a3e6,2021-07-21T11:39:23.747000
@ -172434,7 +172434,7 @@ CVE-2021-27306,0,0,6abb731f828d50dc31f5f8837f00ca666d352d589a763274228d94676f30c
CVE-2021-27308,0,0,e75f64a338a590d6b8449ea646ab6c14feb2426700cc002f9c97dbfbf9db1140,2022-05-23T22:32:02.527000
CVE-2021-27309,0,0,8f9d76be4305a6f70900f6114f260a4b3c8b50eb1326d17357d09b984d01979e,2021-03-24T18:49:25.550000
CVE-2021-27310,0,0,17a88a926ef1eb0c9fffe07d584ba0bf2cca7e1fb363224d505448be27be189d,2021-03-24T18:49:16.487000
CVE-2021-27312,0,0,50863b3469159a699f42002b846c223ed326fe3011cb56fbfc8510a3590b7b2a,2024-04-03T12:38:04.840000
CVE-2021-27312,0,1,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000
CVE-2021-27314,0,0,ef81da613fa1d85737a5304fe0630c44874df715bb96267109aa2ed2ca143cf7,2021-03-05T20:45:06.427000
CVE-2021-27315,0,0,3677cea89d40f4da4399e75a818af2539c61b38b6962a639337d49aae8920b57,2021-03-24T15:53:20.323000
CVE-2021-27316,0,0,337c98afb6705298ed6fdf81f64738cc12146f58af35bb909361215bab6049a6,2021-03-24T15:54:58.873000
@ -213969,7 +213969,7 @@ CVE-2023-1494,0,0,fabe57685f9f065291cb73b5da5d58e55c63347ea4b821215e6a77cd8e6703
CVE-2023-1495,0,0,52d3a63f7531a21742127196634a25b8aac0e9134944b225f239008a7eb20fba,2024-05-17T02:18:10.487000
CVE-2023-1496,0,0,3ad20729adb8da7a942dfca3bf38af88fc6858bc7a66965d5ec257bb936aaa30,2023-03-24T01:52:42.833000
CVE-2023-1497,0,0,43a07682b47772aadc64da8126950dfea0d545240de7c9596bc9fee6200700c4,2024-05-17T02:18:10.633000
CVE-2023-1498,0,1,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000
CVE-2023-1498,0,0,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000
CVE-2023-1499,0,0,8ff3854eaf9c82717c95e16a68fcb189e93074538f80edc381c1653810d6905e,2024-05-17T02:18:10.843000
CVE-2023-1500,0,0,3e6c08282f27193f563da01f48a334141476b60383b5180210ca9fe12b3b5de6,2024-05-17T02:18:10.947000
CVE-2023-1501,0,0,d6509f5f5f21ad6ed83987bcae6b52f819de1d497f3a8c7a59f97f9b53e05666,2024-05-17T02:18:11.043000
@ -218046,7 +218046,7 @@ CVE-2023-2433,0,0,fcefb1d744e2436ca34c1e96068dcbd24fc8579f4fa267fa852ea1937f688b
CVE-2023-24330,0,0,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000
CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000
CVE-2023-24332,0,0,1c7be458c561d88b0c65bf8a70fcb4598344686f5f419e9a0237e871f28b3aa5,2024-08-14T15:35:01.550000
CVE-2023-24333,0,0,3802b33c7cad8c386d2ca49a744a79027853ce07a3ef304671c801e3c9a7dcd0,2024-02-22T19:07:27.197000
CVE-2023-24333,0,1,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000
CVE-2023-24334,0,0,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000
CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000
CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000
@ -225418,7 +225418,7 @@ CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
CVE-2023-33676,0,0,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
CVE-2023-33677,0,0,fdaeb49d64bdf1efa8b5411d739207103f1736e1ceb5ef124ebf0bc2d9538056,2024-03-06T15:18:08.093000
CVE-2023-33677,0,1,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
CVE-2023-3369,0,0,29db5da69a767c35aea22ed723b1c6ee7c43f48ed1175441113bf5511d1f51e2,2023-11-07T04:18:36.577000
@ -230203,7 +230203,7 @@ CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23
CVE-2023-40097,0,0,fcc14a5c69e91f7c4d728f7cbe0f0a48c2badf3e8d8d2f00222df0c4c9ef7a84,2024-02-02T03:14:39.080000
CVE-2023-40098,0,0,69f1206eae11d461353fadcedd8eb7551d87c233816314ea6c393cc2539141ed,2024-02-02T03:14:34.950000
CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26dfd0,2023-11-07T04:22:02.797000
CVE-2023-40100,0,0,50885e1c8769688bc390208d2038bf237fc25b1a40529a82483ae99f45848f88,2024-02-16T13:38:00.047000
CVE-2023-40100,0,1,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
@ -230327,8 +230327,8 @@ CVE-2023-40235,0,0,72105b9c559b1ddc2ad9f13c18ab13a9fa55a22727500e92992c4e0f4ec55
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
CVE-2023-4024,0,0,8b527ef8d077fbb0e500e3ca07ee111bf71b07633714b2466fdffc55fe2754fb,2024-08-19T13:00:23.117000
CVE-2023-4025,0,0,b2b0365977676536606768ca44b0505351e1c2f076c8fcb1931f17fddb8a018e,2024-08-19T13:00:23.117000
CVE-2023-4024,0,1,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000
CVE-2023-4025,0,1,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
@ -231325,7 +231325,7 @@ CVE-2023-4149,0,0,5a341b7a68a99d862a2511fd7c4a78db3797c78d3afe50d681d537931f6fe4
CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285ddf,2023-11-07T04:22:11.360000
CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000
CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000
CVE-2023-41505,0,0,44cd3289634ca7cfd83a651030e9a773c9400d14c9f6e397b5380ee841c3c7ce,2024-03-14T12:52:21.763000
CVE-2023-41505,0,1,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000
CVE-2023-41506,0,0,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000
CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000
CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000
@ -232092,7 +232092,7 @@ CVE-2023-42578,0,0,23816d96a4e8f8e7a85e681befe6c1b4beef53cae2b13da25d8ba105d77fb
CVE-2023-42579,0,0,943fbf5d99df6edb832545cbbb389aa9f400ef688a2c81d3258a334debe4480e,2023-12-12T21:22:00.157000
CVE-2023-4258,0,0,70cc916926ada92ee8983ef15a32e9a54f92480bc5437f4dc1fabee6bc18e751,2023-09-26T17:19:08.510000
CVE-2023-42580,0,0,857d6b0c372e6663712d898c016feff0c3c218909136cd95337a864def798f99,2023-12-12T17:09:19.990000
CVE-2023-42581,0,0,46e168df1b395467e74592619a6bbab0800f78cf8d4fec626bf850c7508c4d4f,2023-12-12T17:08:44.080000
CVE-2023-42581,0,1,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000
CVE-2023-4259,0,0,66c07068928725737fca6c815c044a284bfe54d498bc2dc1dfdc90d5db05576a,2023-12-22T19:33:51.477000
CVE-2023-4260,0,0,825d2e262d09d358795c77a30ca8ce45e8b4eeaff5088b76af0e3b42b67d864b,2023-12-22T19:33:33.067000
CVE-2023-4262,0,0,96c5e685e0ea51dcabf79db9f0bdc769da7bbc4411b11be6252f295df8d63962,2024-08-01T00:15:02.090000
@ -232328,7 +232328,7 @@ CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458
CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000
CVE-2023-42858,0,0,3cde77cff878b7bb98d08b0160f9736789daeec37f86aa56fd544ce01873eae4,2024-02-22T19:07:27.197000
CVE-2023-42859,0,0,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000
CVE-2023-42860,0,1,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000
CVE-2023-42860,0,0,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000
CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000
CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000
CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000
@ -232582,7 +232582,7 @@ CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca3322473
CVE-2023-43299,0,0,d94c0bf3ab73b965669565a71d51568c9bc57077de1c801b8cedf6d024d95ce3,2023-12-11T17:49:28.370000
CVE-2023-4330,0,0,2fd86e9dd0e579883f8f7c0829ab8b7bda8ac701dd8a56f071347c2e4152f68e,2023-11-07T04:22:28.047000
CVE-2023-43300,0,0,f0be1d017072b0cff316436c66a7299c83b2fd4838fb89ce71859847a9053a33,2023-12-13T21:24:31.183000
CVE-2023-43301,0,0,2331dccdc45418895de12edbf9d93d91cc200595fd0694c5bf5a420828f85dcb,2023-12-13T21:24:23.100000
CVE-2023-43301,0,1,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000
CVE-2023-43302,0,0,edd1d8c368949a8601a81887ecd4be6df4ec6d90acda56627d9aeac98fd2253e,2023-12-13T21:24:15.203000
CVE-2023-43303,0,0,01a5e9c635cbf46583a40d8cd583b7ab7550198f2870556b254d79899012babb,2023-12-13T21:24:10.403000
CVE-2023-43304,0,0,5c0749626957cae1c690c285ce09a1c1b29fbb73d61b41212b63ce9ff0280580,2023-12-13T21:24:04.613000
@ -236037,7 +236037,7 @@ CVE-2023-48402,0,0,4c809f2dd5e8dcfff010aa543a6c6f045768b178ca00ba8754b6c8edf6ecc
CVE-2023-48403,0,0,4adc068ba69d93e217814aa03ab06c64d37d4e6f1f5b9e967d203dad5b01ccd6,2024-03-12T21:15:56.243000
CVE-2023-48404,0,0,678d899eed5c458b58da3464689532ca0142c650f2cd178cdc3f7827df0120ca,2024-03-12T21:15:56.300000
CVE-2023-48405,0,0,1184ca00738252a4a1fbfd7c535695d37028df78fe87d5aaaa04a1bc365c4159,2024-03-12T21:15:56.373000
CVE-2023-48406,0,1,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000
CVE-2023-48406,0,0,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000
CVE-2023-48407,0,0,878114c674344ec771789050e93c4a630dfc18deac136706916dedaddc59d9b4,2024-03-12T21:15:56.517000
CVE-2023-48408,0,0,685d630782a479a80a275f86cfe75523d6e24bb2a663d7b093992d79e473f5dd,2024-03-12T21:15:56.573000
CVE-2023-48409,0,0,34f77accc0b2ac79d7dec98b91bbcd5fa76dbfd08a55d334eff38c7b0b7cd036,2024-03-12T21:15:56.647000
@ -236888,7 +236888,7 @@ CVE-2023-49463,0,0,3997f0c76b75718e8d7fddf13118ae3adfe6e7b8a1e026bbdd8c02aa82ae2
CVE-2023-49464,0,0,6558ffdc5c503d25be5dd218daff18765b512708dd37d505c33fce4d88f34e1f,2023-12-11T17:31:56.900000
CVE-2023-49465,0,0,3295dd761e06a7bab659329b7dd55f865f3505849f65d110e023c01328124ac4,2023-12-30T21:15:43.877000
CVE-2023-49467,0,0,7f3716a39cf738913c36e4fa2859efa373c3aaf2bd666ae6754d1492097f8159,2023-12-30T21:15:43.957000
CVE-2023-49468,0,1,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000
CVE-2023-49468,0,0,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000
CVE-2023-49469,0,0,cbc193cf36e9355f9d67ec1bc5dc157b2a50fd7106252de12cbfb6ed4ef2ef76,2024-01-04T17:14:07.600000
CVE-2023-4947,0,0,8df0a8e59512a342c1480f6e8ba47140e8a497588a05b9e649ab29c7e1e4eb1b,2023-11-07T04:23:12.703000
CVE-2023-49471,0,0,0f7e53b0476caf611046a94136cc7f6de729f116f183f5bc0ae510c9611e40ac,2024-01-17T13:41:42.813000
@ -240125,7 +240125,7 @@ CVE-2023-6139,0,0,58b38774f648051a2e873a85ff7a37aee0cf4ea89e9a3a4e1cb9e586395309
CVE-2023-6140,0,0,d7aafe3b370ae93fdafc86b9788a271fc411e8123752fb92571bb74932be1e51,2024-01-11T19:50:08.143000
CVE-2023-6141,0,0,c8dcaa0f230bcf4bab61b5120b835e0002022e253aa8729320cdbf7d8b88a7c3,2024-01-11T19:48:22.663000
CVE-2023-6142,0,0,3fe59169d0ca291deeb17bb2da3d1e912e0369f1ef3de114449566381868dbc1,2023-11-29T17:21:22.010000
CVE-2023-6143,0,0,43a283efe676a5f5b46783e6438546b59ab926654fc906ed9efa73f89d292c53,2024-03-04T13:58:23.447000
CVE-2023-6143,0,1,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000
CVE-2023-6144,0,0,f1ada52cef47fbae7861cb468cbf9029aefa6079f9529a530cc69ebc44690282,2023-11-29T17:21:04.480000
CVE-2023-6145,0,0,b6eb696be83bb3d8e6f03bcc3cffbbf6ce301a3b5d147393bbef0fd0f87c4ee0,2024-02-29T01:42:33.440000
CVE-2023-6146,0,0,0a628bb48560248a46754aa0cc3ac6ec47651dc2ffdb0446c47e5313a06edf08,2023-12-12T17:20:59.940000
@ -240877,7 +240877,7 @@ CVE-2023-7013,0,0,752e84fc788817f789f383d9b4727a6a371c7a1c500c5d0ed88cf4177f1382
CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000
CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000
CVE-2023-7016,0,0,010884b21a27fa66d833a70681dd186e397f473cbb0b90536483fba7b0d7269d,2024-02-27T14:19:41.650000
CVE-2023-7017,0,1,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000
CVE-2023-7017,0,0,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000
CVE-2023-7018,0,0,9438a9ef02cb6b14eeff26492e18c6b4314ac91317f5ba8b28b4a172250c35b2,2023-12-30T03:13:12.367000
CVE-2023-7019,0,0,25421d5b7b02bc2542949247708020c3ce3a00d66a261d8b3c79bad4af5b1cd1,2024-01-17T22:28:36.323000
CVE-2023-7020,0,0,7d3304d8f230cb46404a5f4e0c7dfc242c13c646702476b3fd55147c8232dd5a,2024-05-17T02:34:03.503000
@ -240944,7 +240944,7 @@ CVE-2023-7081,0,0,b94c538c220abbbf5d50ca8a2904f1fe370fbb1f80a5e1f3321f9af9bffbc7
CVE-2023-7082,0,0,500d0f2d877d9984b63decc202acb4ee4bb46b23d005a29465c40aa2ce7d0bca,2024-01-26T19:48:56.570000
CVE-2023-7083,0,0,cb22c9eca48a356f4e09d670d9f560809daf8ed155fa4fd28ed59b232188d26d,2024-01-19T14:54:30.993000
CVE-2023-7084,0,0,4632f03cec16c49d84207124ebe67a266da26c671bc47e64aa3e00e71deebb1b,2024-01-19T14:54:24.987000
CVE-2023-7085,0,1,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000
CVE-2023-7085,0,0,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000
CVE-2023-7089,0,0,de15bf10cbbafe87d399a0ec4c918efb24631900a27c9c1192eff372993ed731,2024-02-03T00:27:31.313000
CVE-2023-7090,0,0,a5b4a70cda853965b97ddccc4bf6511943919b8d4fb98b9077b8f1637ede54e4,2024-02-08T10:15:13.540000
CVE-2023-7091,0,0,d58faa483178a62c20472bf1bded86f6b329c385b83c74a05c3e1f3b3b217008,2024-05-17T02:34:08.657000
@ -241015,7 +241015,7 @@ CVE-2023-7163,0,0,54f5e7a55d48eb95c47fe9ab2bd934c769b28ba59ea5fbda349ed798a02bdb
CVE-2023-7164,0,0,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000
CVE-2023-7165,0,0,9579de52ee223f320f228c1ef75c7d093c7dd9bb72a0fc1f5802e6bcb3ff7ba2,2024-08-09T19:35:02.617000
CVE-2023-7166,0,0,6cedf7ff09611c5f6f6894ca5635265e9233fca36dede244b351d519590f0234,2024-05-17T02:34:15.110000
CVE-2023-7167,0,1,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000
CVE-2023-7167,0,0,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000
CVE-2023-7169,0,0,ab91bd41244dde388327206c23937e5dca7ce4b0de2116a1c3757d023bfdbdc4,2024-02-15T02:29:40.877000
CVE-2023-7170,0,0,c09ccb7568e9a7781a5b4886b0c86c25c0a32c50adfe4049560ce5dfc4fe85bc,2024-01-26T21:05:46.627000
CVE-2023-7171,0,0,ca5e0c79c1ad7ffbcf6087eb7053f4be605bc976e841898426c6792174a905d1,2024-05-17T02:34:15.343000
@ -241107,7 +241107,7 @@ CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c
CVE-2024-0010,0,0,0619a8beffc460e406861d5436887a98d4820a4ca409aea20f604a00879fcec0,2024-02-15T06:23:39.303000
CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50ac,2024-02-15T06:23:39.303000
CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000
CVE-2024-0015,0,1,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
CVE-2024-0015,0,0,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000
CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000
CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
@ -241139,10 +241139,10 @@ CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c47
CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000
CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000
CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000
CVE-2024-0048,0,0,30be6e3e50a23d26d89c4e1eb4fa3a008e8939a0b64350645365e22b39561aec,2024-03-12T12:40:13.500000
CVE-2024-0048,0,1,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000
CVE-2024-0049,0,0,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000
CVE-2024-0050,0,0,58a42c9b281faf7f034f105a443afa241b3c1edb6abc4c502f110ae260e2255e,2024-08-14T20:35:05.473000
CVE-2024-0051,0,0,499108fe16dea1529516a3cfe4336e416f629611e159efd5458affbb8c6db782,2024-03-12T12:40:13.500000
CVE-2024-0051,0,1,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000
CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000
CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898c6,2024-03-12T12:40:13.500000
CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46
@ -241950,7 +241950,7 @@ CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368
CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000
CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000
CVE-2024-0972,0,0,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000
CVE-2024-0973,0,1,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000
CVE-2024-0973,0,0,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000
CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000
CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000
CVE-2024-0976,0,0,cc7f106853c76332cf2c1434fc9c2b994b6bd96e33b062831e11057ccad8d2cf,2024-03-13T18:16:18.563000
@ -242233,7 +242233,7 @@ CVE-2024-1267,0,0,0ac3a4ad3c33b1de1cb6d3c82dc409665a58abf06843c3ddfdea13f760f08d
CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b804c,2024-05-17T02:35:22.040000
CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000
CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000
CVE-2024-1273,0,1,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000
CVE-2024-1273,0,0,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000
CVE-2024-1274,0,0,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000
CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000
CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000
@ -242273,7 +242273,7 @@ CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15
CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000
CVE-2024-1313,0,0,e178cffe6aa77a4f0d6d1f0bc0814c15387ceb02accf822d00ca94cf3dcbb92c,2024-06-10T18:15:24.947000
CVE-2024-1315,0,0,25a55ec7d2eabca19718f4f801048334cc1cea56ed0621182dceeddb8f9f2d51,2024-04-10T13:24:00.070000
CVE-2024-1316,0,1,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000
CVE-2024-1316,0,0,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000
CVE-2024-1317,0,0,e6b73971b8fadcf515a25ac1e50eb31e33a60418d7d45cd3d52420834e679d55,2024-02-29T13:49:29.390000
CVE-2024-1318,0,0,5ba6af40f86ed8ef42439c311587e2b7fcfc352f41e84ea7a6e6cadfbc71379b,2024-02-29T13:49:29.390000
CVE-2024-1319,0,0,903406ad02ffa43d0d568c21b4803da244dc9d7ce0c7f684b31acb02d2ec9380,2024-03-05T13:41:01.900000
@ -242288,7 +242288,7 @@ CVE-2024-1327,0,0,ae9f5cba237be94589254d7283daa73f7fafabd33cfebb17147581f2cee609
CVE-2024-1328,0,0,7073f5514db5b26279568b528e71529068f45e6ad24d9e6819ac92a07723ef47,2024-03-12T12:40:13.500000
CVE-2024-1329,0,0,2cd50cabd5bf81a4f9539c2a3a992a874338213f75ad414ccf75d557c037546e,2024-02-15T18:27:28.837000
CVE-2024-1330,0,0,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000
CVE-2024-1331,0,1,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000
CVE-2024-1331,0,0,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000
CVE-2024-1332,0,0,b1d0012a9e40c173cc8f28116508227ff7724ad8f4f969c3dc5f4b0e2f08d038,2024-05-24T13:03:05.093000
CVE-2024-1333,0,0,bd53e9cdde226b8c165843c67dcea5ab4ff36ead472bf29231b1c2f3f1abcb85,2024-08-27T21:35:07.153000
CVE-2024-1334,0,0,fe4c6be53440216c757c2bf51b270a3930f5c7dd35674ef18ead1fe70ed3fa7c,2024-02-29T13:49:29.390000
@ -243031,16 +243031,16 @@ CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bb
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000
CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000
CVE-2024-20279,1,1,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000
CVE-2024-20279,0,0,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000
CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000
CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000
CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000
CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000
CVE-2024-20284,1,1,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000
CVE-2024-20285,1,1,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000
CVE-2024-20286,1,1,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000
CVE-2024-20284,0,0,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000
CVE-2024-20285,0,0,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000
CVE-2024-20286,0,0,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000
CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000
CVE-2024-20289,1,1,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000
CVE-2024-20289,0,0,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000
CVE-2024-2029,0,0,354f931e93072109dced3bc73857c32e7a282fc5266016d20bde6f1070f10b9d,2024-04-10T19:49:51.183000
CVE-2024-20290,0,0,95fa55047489b4a2ee370988084e137cebac8acab30010c47f69339f30b23cb9,2024-02-15T15:43:27.240000
CVE-2024-20291,0,0,c2ed04ab4eaaddf8b1bcc5dc083481f305536f5151be36cfe21c14f02472ee22,2024-02-29T13:49:29.390000
@ -243129,8 +243129,8 @@ CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20411,1,1,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000
CVE-2024-20413,1,1,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000
CVE-2024-20411,0,0,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000
CVE-2024-20413,0,0,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
@ -243140,7 +243140,7 @@ CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
CVE-2024-20446,1,1,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000
CVE-2024-20446,0,0,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
@ -243148,7 +243148,7 @@ CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f7
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
CVE-2024-20478,1,1,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000
CVE-2024-20478,0,0,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
@ -243668,23 +243668,23 @@ CVE-2024-21129,0,0,46efd627f8b87e045268cbee292986282d76e8b338e8626a07344d3f76a5e
CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000
CVE-2024-21130,0,0,c5d206e6fb887c84baa9c493ebc7d93f2ba4e2f0bacd858d2d5741cf02d71f96,2024-07-17T13:34:20.520000
CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
CVE-2024-21132,0,1,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
CVE-2024-21132,0,0,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
CVE-2024-21133,0,0,9a1197ce9530b48696d53f4b8d6c0bb018d1a324656fccf337eedb1d5dc8a23b,2024-07-17T13:34:20.520000
CVE-2024-21134,0,0,631920bbbb3f0a2e285eb8830426e0d345e96a6482baa287298491b83a91756a,2024-07-17T13:34:20.520000
CVE-2024-21135,0,0,9aadd6ca5a38f239443e4aa9211c7acd69c8becfda2781dc6ecf3e89d27baedd,2024-07-17T13:34:20.520000
CVE-2024-21136,0,1,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
CVE-2024-21136,0,0,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
CVE-2024-21137,0,0,8b1ccafbde54d689b232a5ba4da880526c6b578bae146f59db158760bdc4f414,2024-07-17T13:34:20.520000
CVE-2024-21138,0,0,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000
CVE-2024-21139,0,0,ac1e7874c883d227974696e6da1f4ea74ebc9ccd7cdf45b6f9f9065cbabb6c27,2024-07-17T13:34:20.520000
CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3d60,2024-08-01T13:46:27.193000
CVE-2024-21141,0,1,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
CVE-2024-21141,0,0,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
CVE-2024-21148,0,1,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
CVE-2024-21148,0,0,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
CVE-2024-21150,0,0,8bf7ad156aade7fa3f13e2261e319a8085198969642f90d90774096fb77f35b3,2024-07-17T13:34:20.520000
@ -243698,11 +243698,11 @@ CVE-2024-21158,0,0,abd2177430b15289f1dafe8369befc77334519d6a9221a02b1f5bfbbc009d
CVE-2024-21159,0,0,2ff4efcbe3aa08e46da9e0946901b69656a8a1ad9976fd197b8e18d6231382c7,2024-07-17T13:34:20.520000
CVE-2024-2116,0,0,db5680b78c73e9ed7444fef2da21a0c5bcac8a3e521c07413a62cc0c6dfac6ff,2024-03-29T12:45:02.937000
CVE-2024-21160,0,0,20f8ad0ce54327b1482f0174779d6b8936bf9313ce550cb111b84c1a3729be73,2024-07-17T13:34:20.520000
CVE-2024-21161,0,1,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000
CVE-2024-21161,0,0,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000
CVE-2024-21162,0,0,6599b8c3e8d4ce2bd56d758955204dc60835461542055bd440e060f275edef92,2024-07-17T13:34:20.520000
CVE-2024-21163,0,0,1c218c6447f5bc6b8f4a4bcf8e9b987dd785d628ca9f5052cf582edba99f160a,2024-07-17T13:34:20.520000
CVE-2024-21164,0,1,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000
CVE-2024-21165,0,1,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000
CVE-2024-21164,0,0,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000
CVE-2024-21165,0,0,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000
CVE-2024-21166,0,0,ede3b755f5804621a8ef25d79d9679055f7e04ae20b8138869340e09adf91227,2024-08-01T13:46:33.843000
CVE-2024-21167,0,0,68c8f227666c06298257f7b468706125c2676562df674ce8154b7de7b4496211,2024-07-17T13:34:20.520000
CVE-2024-21168,0,0,c69572c1110a4cc480c0e5afb70d08f9984a6bb55f4f3c55f471c687df059b4a,2024-07-17T13:34:20.520000
@ -243948,7 +243948,7 @@ CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000
CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000
CVE-2024-21501,0,0,4ffd9a5028e89c48b31b0817cbc116780b2008c7130edf8593ed9cc79a68cf48,2024-06-10T18:15:25.273000
CVE-2024-21501,0,1,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000
CVE-2024-21502,0,0,fb5ae175e215ddb01ef01146351120b7135179219e17913fc19fbdc46d2b3141,2024-02-26T13:42:22.567000
CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000
CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46
@ -244074,7 +244074,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6
CVE-2024-21677,0,0,172011c5d5a06c0e2ca2f356ecd05cb171d9f8cbcabb5b389ad48344d43d1ad1,2024-03-20T13:00:16.367000
CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc778397e,2024-02-20T19:50:53.960000
CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000
CVE-2024-21682,0,1,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000
CVE-2024-21682,0,0,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000
CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000
CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
@ -245067,7 +245067,7 @@ CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0
CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000
CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000
CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000
CVE-2024-23244,0,1,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
CVE-2024-23244,0,0,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000
CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000
CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000
@ -245102,7 +245102,7 @@ CVE-2024-23272,0,0,862f7d259a6cfce25fc04a6db8d5e2417105b7f51cabfc9af10955b3e49ce
CVE-2024-23273,0,0,8ea5a132f7f9599d563a8466af6d69a139c2be77bdbd7e0c7a2fee86dd445737,2024-03-14T19:54:26.287000
CVE-2024-23274,0,0,d63dec58c682291f417ab20be0e0fbb2c8ea2b0b1f5246aeb4f66431c08118d0,2024-08-01T13:47:13.570000
CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8dfedf,2024-03-14T20:34:02.077000
CVE-2024-23276,0,1,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
@ -245115,7 +245115,7 @@ CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdf
CVE-2024-23285,0,0,5a0d4d7d553005e90735503704fdc16408a5286a022afa1dff47851a5d56c396,2024-08-27T21:35:09.383000
CVE-2024-23286,0,0,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000
CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000
CVE-2024-23288,0,1,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000
CVE-2024-23288,0,0,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000
CVE-2024-23289,0,0,88178045365eb11e89ccefeb5771451d6b6166955f5f6c5f6a64f2f080826233,2024-03-13T22:15:11.227000
CVE-2024-2329,0,0,11e6f1e43e05cca18867c7d5c048956c7fecd23b0254816ac97fead1b2517ae0,2024-05-17T02:38:10.443000
CVE-2024-23290,0,0,c464194e225931bf0d2137cac165c36f9146fd1d9e1ad3c4a6426c7b4df4b92d,2024-03-13T22:15:11.280000
@ -245692,7 +245692,7 @@ CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000
CVE-2024-24043,0,1,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
CVE-2024-24043,0,0,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000
CVE-2024-24050,0,0,d8a497c77556b4efbe72dd469fd71e81b74bd8a1e54cb63f7dab3892d7471943,2024-03-21T12:58:51.093000
CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000
@ -245739,7 +245739,7 @@ CVE-2024-24148,0,0,a02156e49f720741f5d47ffecf3d295f680f99f45fd5e722459fdf6b3749f
CVE-2024-24149,0,0,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee0a5,2024-08-13T19:35:04.837000
CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000
CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000
CVE-2024-24155,0,1,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000
CVE-2024-24155,0,0,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000
CVE-2024-24156,0,0,4d905495fcc21ea03b392e5dcfb4049afb36c88ec6395d026fb3a826675269b3,2024-08-19T20:35:03.650000
CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000
CVE-2024-2416,0,0,509b47b2b38dd8150594dfd075dd7f079b3bbd22e8420f2d63fb8a39e8d3ccb0,2024-03-13T12:33:51.697000
@ -245810,12 +245810,12 @@ CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583
CVE-2024-2432,0,0,57240eece5c1b31c057486728f6363c9217250d91f3d10c0c941fdad51a7f6e5,2024-03-13T18:15:58.530000
CVE-2024-24320,0,0,a5847bec026f9a38211f5c0373776488eb6f7d35353beef2a24ffd1ecc8d8864,2024-08-21T14:35:04.240000
CVE-2024-24321,0,0,88c98cb76542c8acb076726441dae70ba16682bd2171c6fbca3804855a845a0c,2024-02-15T05:02:58.427000
CVE-2024-24323,0,1,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000
CVE-2024-24323,0,0,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000
CVE-2024-24324,0,0,e65b7320bc70eb87aafe69f87ce443d4231ab35603a9991590cdc2a337dea76b,2024-02-01T04:49:29.220000
CVE-2024-24325,0,0,c48bdb59f66fc453df8a65a409e26ae0fc9e608ab91641625410877a482dad6a,2024-02-01T04:49:27.410000
CVE-2024-24326,0,0,ffd176ee9cc205937cd1eaded7dc4a650316e43005277f1af89616e40875e18b,2024-02-01T04:49:24.940000
CVE-2024-24327,0,0,b496192967607b64939b46dfafe2c91cb919e1f1a3928b7c8c6e7165f4559273,2024-02-01T04:49:22.830000
CVE-2024-24328,0,1,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000
CVE-2024-24328,0,0,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000
CVE-2024-24329,0,0,cd2cef58182ccada9d789908a0715e06b22ee8c2346a6ad57e7666e3ca17fc5f,2024-02-01T04:49:18.867000
CVE-2024-2433,0,0,af22ac085d1109b732837345c936d39f0c3c18741ae1714b3ff1934488777262,2024-03-13T18:15:58.530000
CVE-2024-24330,0,0,6f4394e82ffdaddc9904fbc3397bf25ed86fab2a1cc87acc40260a4358ba28b7,2024-02-01T04:18:43.927000
@ -246284,7 +246284,7 @@ CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd8
CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000
CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000
CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000
CVE-2024-25083,0,1,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000
CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
@ -246576,7 +246576,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
CVE-2024-25576,0,0,1298eb71baf232c73dfc082da86c1a427fcac3907201ddd5e757f1be26775922,2024-08-14T17:49:14.177000
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
CVE-2024-25579,0,1,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8cc67,2024-03-27T12:29:30.307000
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
@ -246649,7 +246649,7 @@ CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
CVE-2024-25655,0,1,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000
CVE-2024-25655,0,0,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
@ -246708,8 +246708,8 @@ CVE-2024-25741,0,0,fa774b03cf2ebe73114d17fe942f33d91843719d380f7003343f1feba56a5
CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000
CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000
CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000
CVE-2024-25746,0,0,aff52edf515c4bb2be3d1c40746c76af6ee680ba5675ccdda5ccab353d740e3d,2024-02-23T02:42:54.547000
CVE-2024-25748,0,0,9695611fe06c6e9b93fbd1431628cb47d8b27d680e5e9e22412df114dd60e72e,2024-02-23T02:42:54.547000
CVE-2024-25746,0,1,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
CVE-2024-25748,0,1,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000
CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000
CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000
@ -246756,11 +246756,11 @@ CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fa
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
CVE-2024-25854,0,0,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000
CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000
CVE-2024-25859,0,1,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000
CVE-2024-25859,0,0,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000
CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000
CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000
CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000
CVE-2024-25866,0,1,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000
CVE-2024-25866,0,0,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000
CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000
CVE-2024-25868,0,0,8468e8c7cd26d2e5838f8da558add0a0ea34e7d6538ad367885aebb852006e2e,2024-08-27T20:35:15.173000
CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000
@ -246877,7 +246877,7 @@ CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb
CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
CVE-2024-25992,0,0,9077f849d4dddde51329fbf2553fb349784d84e4a5aa50feb6dadd6e5e8acf0c,2024-03-12T12:40:13.500000
CVE-2024-25992,0,1,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
@ -247238,7 +247238,7 @@ CVE-2024-26467,0,0,f852e96e7aa9bd31104a7a5efbb92bf78ab3732b64936f49fadf5127e2447
CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ececaf,2024-02-26T16:32:25.577000
CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000
CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000
CVE-2024-26470,0,1,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
CVE-2024-26470,0,0,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000
CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000
CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000
@ -247263,7 +247263,7 @@ CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000
CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000
CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000
CVE-2024-26529,0,1,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000
@ -247953,7 +247953,7 @@ CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f2
CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000
CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000
CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000
CVE-2024-27212,0,0,4542230b3b8db890d26ca347c87e449ef2355e140f779178cb911b4a8d90a5c2,2024-03-15T20:15:08.910000
CVE-2024-27212,0,1,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000
CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
@ -247968,7 +247968,7 @@ CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213a
CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000
CVE-2024-27228,0,0,085b2888b9a3ea0ac5416508debf1f7f29728086a3efd3846db9b0b4ae138fe6,2024-03-15T20:15:09.193000
CVE-2024-27228,0,1,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000
CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000
CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000
CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000
@ -248217,7 +248217,7 @@ CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c148
CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b8a0,2024-03-01T15:23:36.177000
CVE-2024-27568,0,1,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
@ -248249,7 +248249,7 @@ CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c
CVE-2024-27629,0,0,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000
CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000
CVE-2024-27630,0,0,a1ea11c1c8b1f1d78e79a31b066ec8424df55ae64238847d3d73b77f87b170a7,2024-08-16T19:35:06.250000
CVE-2024-27631,0,0,0f8d82617ea0ef47c0189b84bb322ae748cad4086019c00bd045700a1d3c6ae1,2024-04-11T06:15:06.560000
CVE-2024-27631,0,1,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000
CVE-2024-27632,0,0,0bf9f7e4e2b38f2fc36100c20b55c947c0d336f90050dc79733290c2e357ef37,2024-08-16T19:35:06.933000
CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000
CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000
@ -248278,7 +248278,7 @@ CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7
CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000
CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000
CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000
CVE-2024-27705,0,0,538b62798ffb3deeb490d879f6c2b0551b7d4dbd846704c9743ab7991d01d3a0,2024-04-04T12:48:41.700000
CVE-2024-27705,0,1,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
@ -248631,7 +248631,7 @@ CVE-2024-28120,0,0,31f0663194c3ae59508b649362ee2d5539147691a5912e9e045c000f7246f
CVE-2024-28121,0,0,5d765bddd1522ef772672d7c5b7d192742701db6f681e7efbb273dbd45669d62,2024-03-13T21:16:00.460000
CVE-2024-28122,0,0,84073f6c96d7936717c065299f48850cb9a25df36eb3f8060c8dc4aa02997344,2024-03-11T01:32:39.697000
CVE-2024-28123,0,0,1f90dd93aca0d11a73a18e1eb6b5cda27a407eb4db9e34eaa0e325666a8f1c24,2024-03-21T12:58:51.093000
CVE-2024-28125,0,1,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000
CVE-2024-28125,0,0,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000
CVE-2024-28126,0,0,81385e85c5a93c53bb47fe916edfff61f701ac34a4427a9e5bf459631bdea34d,2024-03-26T12:55:05.010000
CVE-2024-28128,0,0,ff9121c55a5d465f19f3056b6278dc961489b664c0de60bae39143ce763e9dc9,2024-03-18T12:38:25.490000
CVE-2024-2813,0,0,d92b59c3edc51ec01f06a151ea9186c3488c58069c0b5769bb5f8edad6a74d59,2024-05-17T02:38:31.770000
@ -248775,7 +248775,7 @@ CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a2
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000
CVE-2024-28338,0,1,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
@ -248844,14 +248844,14 @@ CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89b
CVE-2024-28521,0,0,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000
CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000
CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000
CVE-2024-28537,0,1,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000
CVE-2024-28537,0,0,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000
CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000
CVE-2024-28545,0,0,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000
CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd135e7,2024-08-15T17:35:04.350000
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000
CVE-2024-28553,0,0,b9d57a68a744d3ccd5c404d587c9bf7a5b20480c53447cfc05c22ab7aa24ff54,2024-03-21T20:58:52.357000
CVE-2024-28553,0,1,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000
CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000
CVE-2024-28557,0,0,77a8a38b1b31bd457d2e1155d30ba64028e47880496797c0f23104b8d60d248a,2024-08-21T15:35:04.820000
CVE-2024-28558,0,0,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000
@ -248897,7 +248897,7 @@ CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a4
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
CVE-2024-28639,0,0,add78e1164c8df42f8993d3ec4e8bcc5efcf9c67ce1cf3d76c2a38423013e9f5,2024-03-17T22:38:29.433000
CVE-2024-2864,0,0,0b7092f6657eda771a1a9211b6ecdc80d9c4229cfeb8d1413066da331f243b95,2024-03-25T13:47:14.087000
CVE-2024-28640,0,1,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000
CVE-2024-28640,0,0,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000
CVE-2024-2865,0,0,55e62f341bb00366e8e43c3aae92bec34f13cdc149d9c58605d949f8282b8ec7,2024-03-25T16:43:06.137000
CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000
CVE-2024-28662,0,0,dab9197cc819aeac0bf0ea06401058d5cc75e9a0ba3a4ce1ecd76d7bcd7e31f2,2024-03-14T12:52:16.723000
@ -248913,12 +248913,12 @@ CVE-2024-28672,0,0,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000
CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000
CVE-2024-28677,0,0,c212bc6abeb632592f29fbc5fe22ee750468c999ed8be8e2db7f3e23376a076d,2024-03-13T18:15:58.530000
CVE-2024-28677,0,1,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000
CVE-2024-28678,0,0,b5c73aa5d385f8f65998ff1de30b4021247079d7e1aba9c219ff89ef49624a6a,2024-08-26T17:35:03.903000
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
CVE-2024-28681,0,1,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
@ -249417,7 +249417,7 @@ CVE-2024-29387,0,0,a7de4d7b83fd64ee90e8a52b42eaf0b9beccc3b6bea7a05d204d65990fc8f
CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000
CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000
CVE-2024-29392,0,0,5e4ea30f516a843bdc62850b43582fcaf1c5126262e50fed5352ce6a7a6be694,2024-05-22T18:59:20.240000
CVE-2024-29399,0,0,d5837116f884e80e697c2414bffb9a33585fc7eb16edc658512cc6480d48cc11,2024-04-11T12:47:44.137000
CVE-2024-29399,0,1,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000
CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df39a,2024-06-05T20:15:13.267000
CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000
CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000
@ -249478,7 +249478,7 @@ CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be
CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000
CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000
CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000
CVE-2024-29514,0,0,eb115f41feffccc853e81d533febd8becad8a070e1e7d9f658260b227fc1cfd6,2024-04-02T18:12:16.283000
CVE-2024-29514,0,1,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000
CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000
CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000
CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000
@ -249540,7 +249540,7 @@ CVE-2024-29753,0,0,2fe72d442a3bd6e3a448018f4b0c5fd08bbb9368714b97406c81c1f0d2544
CVE-2024-29754,0,0,b25a573175d6d8364c520f2c021a5fa5bc0a8d78f24f393d4d4bf2a3811b35a3,2024-04-08T18:49:25.863000
CVE-2024-29755,0,0,461a086b173843c1ce38032ceaf4026cd899fd13096838c66c3bf8c91a37dca7,2024-04-08T18:49:25.863000
CVE-2024-29756,0,0,a317fd9c651464f79ee6fff622436852efb1b09b79adc8a90233c2482f2cabef,2024-08-13T20:35:08.120000
CVE-2024-29757,0,0,649b65f43c61d43545d866e7cc6327f7ac42ed952b447288a1641e2c8a6c415a,2024-04-08T18:49:25.863000
CVE-2024-29757,0,1,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000
CVE-2024-29758,0,0,e99e03c9577f34d61d791ec358a8107af85a294778a310a65b4722e9f6af13d4,2024-03-27T15:49:41.437000
CVE-2024-29759,0,0,f4cc1ab31785f6c5323fd4d9a7da94ce475eca6cb36b30795902b25143b7dbeb,2024-03-27T15:49:41.437000
CVE-2024-2976,0,0,31ce9b59b83e33d10ee556791a66c7b468926a678a71bf4f87b9bde3e94a00ea,2024-05-17T02:38:39.800000
@ -250321,7 +250321,7 @@ CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000
CVE-2024-30565,0,1,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000
@ -250338,14 +250338,14 @@ CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d
CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000
CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000
CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000
CVE-2024-30591,0,0,e75a0dcfcb07a21c8d312cadcff98d8748de148e045209e07a96a4401e42a2fd,2024-03-28T16:07:30.893000
CVE-2024-30591,0,1,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000
CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000
CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000
CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000
CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000
CVE-2024-30596,0,0,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000
CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000
CVE-2024-30598,0,0,5522799fef0d78c0e4f9a84a19e85c4ae628d4ef9d72cf9af60f6cc653518431,2024-03-28T16:07:30.893000
CVE-2024-30598,0,1,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000
CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000
CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000
CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000
@ -250363,7 +250363,7 @@ CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69a
CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000
CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000
CVE-2024-30624,0,1,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000
CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000
@ -251081,7 +251081,7 @@ CVE-2024-31815,0,0,3a4fb879bd99cdccbff5aa7dddf7124d852246045820d3d5445bebcfb10f3
CVE-2024-31816,0,0,b044f3a9b0aa1619e0c2fca0cc8f8b5745d80dbd48fcbf7e00f1caed5cc7299b,2024-08-14T14:35:18.370000
CVE-2024-31817,0,0,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000
CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000
CVE-2024-31819,0,0,4c17599099dc08aeb493ec31eb828cd358a289cc73a85088c37e9c52e7886635,2024-04-11T12:47:44.137000
CVE-2024-31819,0,1,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000
CVE-2024-3182,0,0,5b91472f2c23656576ba0485d37ef11d644641d0d37c54a71b00010283df192c,2024-08-01T16:35:10.453000
CVE-2024-31820,0,0,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000
CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000
@ -252671,7 +252671,7 @@ CVE-2024-34083,0,0,be7ff33683a966fd2e2a91bd6e6ef912f3af6f70d27ba06b83f6ba7e43054
CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1796,2024-05-07T20:07:58.737000
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
CVE-2024-34087,0,1,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
CVE-2024-34090,0,0,4dc7a0402f56619348ec9c3e24642b60cff8f706f450ee8cc2f0663fc31edfc2,2024-05-06T19:53:38.797000
@ -253461,10 +253461,10 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b
CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000
CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000
CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000
CVE-2024-35325,0,1,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000
CVE-2024-35326,0,1,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000
CVE-2024-35328,0,1,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000
CVE-2024-35329,0,1,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000
CVE-2024-35325,0,0,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000
CVE-2024-35326,0,0,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000
CVE-2024-35328,0,0,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000
CVE-2024-35329,0,0,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000
CVE-2024-35338,0,0,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000
@ -255885,7 +255885,7 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,1,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
@ -256231,14 +256231,14 @@ CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
CVE-2024-39502,0,0,99b689f6371529c59a665d9c426727398f43183fffa63b58cc95bb184d69fa0a,2024-07-12T16:34:58.687000
CVE-2024-39503,0,0,5e4d34ef2c4459378b0d2181b74587a03eb064853eaebcf5be4aab1548d06b82,2024-07-12T16:34:58.687000
CVE-2024-39504,0,0,48e2769b3ec4323ba69968251bb1c73f2d2616daaec5e45b600501ae1422b174,2024-07-12T16:34:58.687000
CVE-2024-39504,0,1,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000
CVE-2024-39505,0,0,33dc1a3989cb5c060d5c4f30fa91554943c85a657f65588f826529ceef0f94a9,2024-07-12T16:34:58.687000
CVE-2024-39506,0,0,ae829e3f00d20cc7d46d93444ea3ee66289ca64644968e1acadf28fe34c4de5b,2024-07-12T16:34:58.687000
CVE-2024-39506,0,1,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000
CVE-2024-39507,0,0,1f47c187fd37c3a4a4dbd94d24344ef551d55fa35ab3ff979c4b1cc67002f4d5,2024-07-12T16:34:58.687000
CVE-2024-39508,0,0,26013578589e34725fa81a94c339e09cc309ea5ca5a92a64ba271fcd81f91dee,2024-07-12T16:34:58.687000
CVE-2024-39509,0,0,6f4a3358b91af56191a71e0d0b835dd811a8ac97ff57de735049825822c090da,2024-07-12T16:34:58.687000
CVE-2024-3951,0,0,5ca8c536acbbd299aeb225ced02a6adee99ff33cec2e6b61bb0e0674eb9863cc,2024-05-08T17:05:24.083000
CVE-2024-39510,0,0,0330eb4016b902660bd24b4fa194acb334e0589010f7fd402923aa619b0e4b9a,2024-07-12T16:34:58.687000
CVE-2024-39510,0,1,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
@ -256396,7 +256396,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
CVE-2024-39717,0,0,5bff20e776d919aa9302ca536a347b754ee87a4d4da8c8233bd51a9093bc293e,2024-08-27T16:15:07.400000
CVE-2024-39717,0,1,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
@ -256429,7 +256429,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
CVE-2024-3980,0,1,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
CVE-2024-3980,0,0,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000
CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000
@ -256437,7 +256437,7 @@ CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2
CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000
CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
CVE-2024-3982,0,1,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
CVE-2024-3982,0,0,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
CVE-2024-39822,0,0,cb2d1986932d128ad1eb7e7cc883dcc2562e93b2f186e64c96f02bfcb19b2244,2024-08-14T17:49:14.177000
@ -256523,7 +256523,7 @@ CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae345056
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
CVE-2024-39930,0,1,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000
CVE-2024-39930,0,0,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000
CVE-2024-39931,0,0,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000
CVE-2024-39932,0,0,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000
CVE-2024-39933,0,0,b6d32209bff3b62be34bd9bfc29ae3793bbd5d0463ddb473f2add5c3bc3eb1dd,2024-07-12T16:11:56.423000
@ -256666,8 +256666,8 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000
CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000
CVE-2024-40530,0,1,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
CVE-2024-40531,0,1,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
@ -256853,7 +256853,7 @@ CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
CVE-2024-40897,0,0,7f0ff77f7480d176e5ca1f86675f7cea8983627e8b9afaea0e9328e4e4b96a32,2024-08-27T13:52:53.790000
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
CVE-2024-40899,0,1,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
@ -256889,9 +256889,9 @@ CVE-2024-40929,0,0,922566e6896182fcd86bab51cbd2b2f5e83578ebe1d9528e2a3d395a2a144
CVE-2024-4093,0,0,4094c134af1a117994cc6fa0b479bc18db1d53d46b6fa3e1bad5f760245c30a1,2024-05-17T02:40:15.433000
CVE-2024-40930,0,0,b4f4f0f521513c469fe141e4f04568fa708146afbf26b9e43ef67c49fbb97034,2024-07-12T16:34:58.687000
CVE-2024-40931,0,0,1ce51d0c1cf3e56971909d12fef17b7b190325030f87851f102025b07310a339,2024-07-12T16:34:58.687000
CVE-2024-40932,0,0,e8ec84595af9a30f4368e085ee7539630fc3b219591ec1d658603c900fdd00fa,2024-07-12T16:34:58.687000
CVE-2024-40932,0,1,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000
CVE-2024-40933,0,0,96771d62b803cb6fb8413f216e98fe7325b9f160d5178302017c1ebbfdf41ad1,2024-07-12T16:34:58.687000
CVE-2024-40934,0,0,bf33c91dae3b9649da53d2fa1482b0bf2738fdf0a9af98a8aa39239165b4e9e9,2024-07-12T16:34:58.687000
CVE-2024-40934,0,1,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000
CVE-2024-40935,0,0,a229105c5d2bb66ee17d53a34892f169d9c296108d2f7d99e57d4944bc30c1f0,2024-07-12T16:34:58.687000
CVE-2024-40936,0,0,34f66f9dfd47f0ce49d1c77b26ffc55123e4f460cffd6c4a4b7f8e6444317e13,2024-07-12T16:34:58.687000
CVE-2024-40937,0,0,18b0b0dc1e836fe3ae2e170c8982a2b4836f0393f58deb5f92b95d810e69aed1,2024-07-12T16:34:58.687000
@ -256913,12 +256913,12 @@ CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000
CVE-2024-40955,0,0,4f78b513b01dfd2400b7927009e3f8081393369b68b71a3a8bf67f98b5e12e0c,2024-07-12T16:34:58.687000
CVE-2024-40956,0,0,01fdb45f44f8095c8f9389fef0857cd7ac1f55e504ec60f396a8f9e5482a8269,2024-07-12T16:34:58.687000
CVE-2024-40957,0,0,ba43e6ddc634305a816231c000c7b443548485728739cecf3ba6005f6c02b2f3,2024-07-12T16:34:58.687000
CVE-2024-40958,0,0,c4b20d9cb20e4970bb454dd1d6fa22674e8409df2a8f77cff22e9737b19836ab,2024-07-12T16:34:58.687000
CVE-2024-40959,0,0,e7c156318badfedaa056792bcbefa34231e67bdbb7ed04e052f8e0abfa80614c,2024-07-12T16:34:58.687000
CVE-2024-40954,0,1,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
CVE-2024-40955,0,1,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
CVE-2024-40956,0,1,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
CVE-2024-40957,0,1,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000
CVE-2024-40958,0,1,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000
CVE-2024-40959,0,1,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000
CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000
CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
@ -257125,6 +257125,7 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
CVE-2024-41236,1,1,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000
CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
@ -257164,7 +257165,7 @@ CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
CVE-2024-41310,0,1,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
CVE-2024-41310,0,0,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000
@ -257232,8 +257233,8 @@ CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a8
CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b51898fb,2024-08-01T13:58:53.253000
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-41564,1,1,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000
CVE-2024-41565,1,1,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000
CVE-2024-41564,0,0,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000
CVE-2024-41565,0,0,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
CVE-2024-41572,0,0,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000
@ -257268,8 +257269,8 @@ CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d
CVE-2024-41651,0,0,57f3cb7d00e7e9511d0d03f9437ce1a28380d574f08dab4c3cea3241ce2f7fe3,2024-08-14T21:35:07.780000
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
CVE-2024-41657,0,1,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
CVE-2024-41658,0,1,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000
CVE-2024-41657,0,0,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
CVE-2024-41658,0,0,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000
CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
@ -257955,7 +257956,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
CVE-2024-42698,1,1,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000
CVE-2024-42698,0,0,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
@ -258020,7 +258021,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
CVE-2024-42818,0,0,95f0b34855c9e871f13f61a27d7d6c078da48a4416445325f9775ca851de2f13,2024-08-26T19:10:18.890000
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
CVE-2024-42845,0,1,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28
@ -258030,7 +258031,8 @@ CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c26
CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
CVE-2024-42900,1,1,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
CVE-2024-42900,0,0,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
CVE-2024-42905,1,1,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000
@ -258331,7 +258333,7 @@ CVE-2024-43444,0,0,fbee9de686ac80a9fde5553d13b4aef0864614401bc5081d1c7ab76503d44
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
CVE-2024-43472,0,0,f0bdeaadc10d27ea81613820adf34fe3715a0574820193114227d17964089794,2024-08-19T13:00:23.117000
CVE-2024-43472,0,1,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
CVE-2024-43477,0,0,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
@ -258494,7 +258496,7 @@ CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c7
CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000
CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000
CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000
CVE-2024-43915,0,1,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
@ -258591,6 +258593,7 @@ CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44761,1,1,361838cb7a1b116b9f497344dd8aff3b164952f24f968d85f6ede5ec3de92766,2024-08-28T19:15:08.933000
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
@ -258611,6 +258614,9 @@ CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50a
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
CVE-2024-44913,1,1,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000
CVE-2024-44914,1,1,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000
CVE-2024-44915,1,1,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
@ -258666,9 +258672,9 @@ CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9
CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943350,2024-08-26T12:47:20.187000
CVE-2024-45191,0,0,2a889b4602938b6e2674b0bf815335db30baaadca4c51b450f01e34042d695de,2024-08-23T16:18:28.547000
CVE-2024-45192,0,0,30eddbb92dad40ea47915eb7180399e22941399795ea5b18c4d640a6070b3421,2024-08-23T16:18:28.547000
CVE-2024-45193,0,0,d6f872fc649469c5b3046e7ef10246f8b1741f908732214cb33afbe1f14b40ed,2024-08-23T16:18:28.547000
CVE-2024-45191,0,1,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000
CVE-2024-45192,0,1,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000
CVE-2024-45193,0,1,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
@ -259002,7 +259008,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
CVE-2024-4872,0,1,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
CVE-2024-4872,0,0,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
@ -259986,7 +259992,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000
CVE-2024-6053,1,1,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000
CVE-2024-6053,0,0,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000
@ -260240,7 +260246,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69
CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000
CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000
CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000
CVE-2024-6361,0,0,c78d54a60cbe74050dfcceec663bceae239fbbf7a647cea8c5a73a6e5ad54d91,2024-08-06T16:30:24.547000
CVE-2024-6361,0,1,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
@ -260694,7 +260700,7 @@ CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830ad
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
CVE-2024-7061,0,0,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000
CVE-2024-7061,0,1,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000
CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000
CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000
CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000
@ -261047,8 +261053,8 @@ CVE-2024-7569,0,0,07c556a0d4f236c73af8fac785c7f2963a3da01e4fc90b977a8fbdbb989590
CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
CVE-2024-7578,0,0,6775b71bfb147f33ac75e26864dff0d49501fe87846b04dfe823255ec77604d5,2024-08-07T15:17:46.717000
CVE-2024-7579,0,0,889817c5384ba36003787d6aa90c4889164dbbf7f4fbfe5c6f0287e20d3cf6ed,2024-08-07T15:17:46.717000
CVE-2024-7578,0,1,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
CVE-2024-7579,0,1,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000
CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
@ -261148,8 +261154,8 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
CVE-2024-7744,1,1,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000
CVE-2024-7745,1,1,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000
CVE-2024-7744,0,0,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000
CVE-2024-7745,0,0,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000
CVE-2024-7746,0,0,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
@ -261248,8 +261254,8 @@ CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bb
CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000
CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000
CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000
CVE-2024-7940,0,1,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
CVE-2024-7941,0,1,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
CVE-2024-7941,0,0,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000
CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000
CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000

Can't render this file because it is too large.