Auto-Update: 2024-08-15T16:00:29.207261+00:00

This commit is contained in:
cad-safe-bot 2024-08-15 16:03:24 +00:00
parent 27ae805734
commit 4cf476e93a
43 changed files with 2666 additions and 203 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3295",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-17T02:15:08.917",
"lastModified": "2024-08-12T13:38:11.290",
"vulnStatus": "Modified",
"lastModified": "2024-08-15T14:29:56.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -56,6 +56,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21067",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:25.123",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-08-15T15:35:02.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21107",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:32.110",
"lastModified": "2024-04-17T12:48:07.510",
"lastModified": "2024-08-15T15:35:03.743",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21110",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:32.617",
"lastModified": "2024-04-17T12:48:07.510",
"lastModified": "2024-08-15T15:35:04.813",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21114",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:33.300",
"lastModified": "2024-04-17T12:48:07.510",
"lastModified": "2024-08-15T15:35:05.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25196",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T14:15:09.160",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-08-15T14:35:01.030",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que las versiones humildes de Open Robotics Robotic Operating Sytstem 2 (ROS2) y Nav2 conten\u00edan un desbordamiento de b\u00fafer a trav\u00e9s del proceso nav2_controller. Esta vulnerabilidad se activa mediante el env\u00edo de un archivo .yaml manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/ros-planning/navigation2/issues/4005",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28066",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T13:15:08.247",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-08-15T15:35:07.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,46 @@
"value": "En el firmware 1.10.4.3 de Unify CP IP Phone, se utilizan credenciales d\u00e9biles (una contrase\u00f1a ra\u00edz codificada)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1391"
},
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://syss.de",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28741",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-06T19:15:07.247",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-08-15T15:35:08.427",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de cross-site scripting en EginDemirbilek NorthStar C2 v1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente login.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32901",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-06-13T21:15:54.430",
"lastModified": "2024-07-11T14:23:01.377",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-15T15:35:09.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33228",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-22T16:15:10.490",
"lastModified": "2024-05-22T18:59:20.240",
"lastModified": "2024-08-15T15:35:10.277",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en el componente segwindrvx64.sys de Insyde Software Corp SEG Windows Driver v100.00.07.02 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33228",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33960",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T12:15:49.130",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:08:32.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -51,10 +81,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33979",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.223",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:07:24.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -51,10 +71,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33980",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.477",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:07:53.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -51,10 +71,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33981",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-08-06T11:16:06.733",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-15T14:08:13.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -51,10 +71,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37273",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T19:20:15.363",
"lastModified": "2024-06-11T14:12:23.210",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-15T14:35:03.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37849",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T14:15:13.300",
"lastModified": "2024-08-01T18:41:11.900",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-15T15:35:11.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39549",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-11T17:15:15.433",
"lastModified": "2024-07-11T18:09:58.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:15:56.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -84,6 +84,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
},
{
"source": "sirt@juniper.net",
"type": "Secondary",
@ -95,10 +105,757 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"versionEndIncluding": "21.1",
"matchCriteriaId": "6137CE1A-C9AC-4FDE-801F-E40249F902BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
"matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*",
"matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s6:*:*:*:*:*:*",
"matchCriteriaId": "44E98BC3-1D43-481A-AB09-FFA502C36AAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s7:*:*:*:*:*:*",
"matchCriteriaId": "1A0DA88F-6C61-4FEA-ABF3-99F7DD43DB0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
"matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "BC449CC7-B2D6-41CB-8D6C-81DE89E79520"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
"matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "19326769-2F08-4E61-8246-CCE7AE4483F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
"matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "7E5688D6-DCA4-4550-9CD1-A3D792252129"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "8494546C-00EA-49B6-B6FA-FDE42CA5B1FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "8BB98579-FA33-4E41-A162-A46E9709FBD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*",
"matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "1ADA814B-EF98-45B1-AF7A-0C89688F7CA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*",
"matchCriteriaId": "78481ABC-3620-410D-BC78-334657E0BB75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "BE8A5BA3-87BD-473A-B229-2AAB2C797005"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "8B74AC3E-8FC9-400A-A176-4F7F21F10756"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*",
"matchCriteriaId": "89524D6D-0B22-4952-AD8E-8072C5A05D5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "AD69A194-1B03-44EA-8092-79BD10C6F729"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
"versionEndIncluding": "21.1",
"matchCriteriaId": "C8404916-D496-41C8-896B-24BAFE956C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
"matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*",
"matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s7:*:*:*:*:*:*",
"matchCriteriaId": "909FC378-EBFE-4BA9-8393-0C8301438020"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
"matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "9DB01252-2F11-41DB-9023-C74FD723334E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s6:*:*:*:*:*:*",
"matchCriteriaId": "F91450D5-F8CE-42EA-BB7E-312FCE024CD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s7:*:*:*:*:*:*",
"matchCriteriaId": "4E616550-8711-4282-A8A1-11BD5974E650"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "2FB9F20B-7683-4B0D-8D2B-5569414EBC29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*",
"matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "61F649B0-0121-4760-9432-5F57214EFC2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*",
"matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "9800BA03-E6BF-4212-B2E7-69C0FD27D294"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "ACCA655D-C542-44F1-B183-4C864CFF2D4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "6D499B19-A91A-4B76-B1CB-6A07A4CB212B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*",
"matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "A4BB6910-B994-45FD-8153-5EC00EE842E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9D7F0D73-85EE-4A07-B51B-6BF52ECBA75E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "FE777A1F-9CD9-426E-AF1C-FBE01EB9A4A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "7147BA60-30A5-4CED-9AAF-F6BEA0528B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*",
"matchCriteriaId": "0DD89AAD-C615-42AF-B8AF-E6067862F0F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "28AFF11D-E418-4A76-B557-F60622602537"
}
]
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA83011",
"source": "sirt@juniper.net"
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41256",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-31T21:15:18.117",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-15T14:27:18.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Las configuraciones predeterminadas en la funci\u00f3n ShareProofVerifier de filestash v0.4 hacen que la aplicaci\u00f3n omita el proceso de verificaci\u00f3n del certificado TLS al enviar c\u00f3digos de verificaci\u00f3n por correo electr\u00f3nico, lo que posiblemente permita a los atacantes acceder a datos confidenciales a trav\u00e9s de un ataque de man-in-the-middle."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.4",
"matchCriteriaId": "F46510CC-65D9-41B7-885E-42CB8CE49494"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41258",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-31T21:15:18.200",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-15T14:30:16.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": " Se descubri\u00f3 un problema en filestash v0.4. El uso de ssh.InsecureIgnoreHostKey() deshabilita la verificaci\u00f3n de la clave del host, lo que posiblemente permita a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de man-in-the-middle."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.4",
"matchCriteriaId": "F46510CC-65D9-41B7-885E-42CB8CE49494"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/nyxfqq/ed8c2ba3398c9e28cd8dbf0902bd8edf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41955",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-31T20:15:06.793",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-15T14:10:40.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.5",
"matchCriteriaId": "1379CCAF-9D62-4D48-869D-09D6FB3D4326"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/fdaad81314f393d324c1ede79627e9d47986c8c8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-8m9j-2f32-2vx4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4187",
"sourceIdentifier": "security@opentext.com",
"published": "2024-07-31T21:15:18.320",
"lastModified": "2024-08-01T12:42:36.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-15T14:45:27.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -73,10 +105,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:filr:24.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0872B0-D841-491D-8442-4DA5441EF1DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:filr:24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "55F710C5-B6B3-4D8E-8B0D-A9891DAF5650"
}
]
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000032291",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-42477",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-12T15:15:21.050",
"lastModified": "2024-08-12T18:57:29.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:02:23.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "llama.cpp provides LLM inference in C/C++. The unsafe `type` member in the `rpc_tensor` structure can cause `global-buffer-overflow`. This vulnerability may lead to memory data leakage. The vulnerability is fixed in b3561."
},
{
"lang": "es",
"value": "llama.cpp proporciona inferencia LLM en C/C++. El miembro \"tipo\" inseguro en la estructura \"rpc_tensor\" puede provocar un \"desbordamiento de b\u00fafer global\". Esta vulnerabilidad puede provocar una p\u00e9rdida de datos de la memoria. La vulnerabilidad est\u00e1 solucionada en b3561."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "b3561",
"matchCriteriaId": "959A4095-3418-4510-B812-74AC693D3DAC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-mqp6-7pv6-fqjf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-42478",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-12T15:15:21.277",
"lastModified": "2024-08-12T18:57:29.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:03:32.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address reading. This vulnerability is fixed in b3561."
},
{
"lang": "es",
"value": "llama.cpp proporciona inferencia LLM en C/C++. El miembro puntero \"datos\" inseguro en la estructura \"rpc_tensor\" puede provocar una lectura de direcci\u00f3n arbitraria. Esta vulnerabilidad se soluciona en b3561."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "b3561",
"matchCriteriaId": "959A4095-3418-4510-B812-74AC693D3DAC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-5vm9-p64x-gqw9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-42479",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-12T15:15:21.490",
"lastModified": "2024-08-12T18:57:29.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-15T14:03:53.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address writing. This vulnerability is fixed in b3561."
},
{
"lang": "es",
"value": "llama.cpp proporciona inferencia LLM en C/C++. El miembro puntero \"datos\" inseguro en la estructura \"rpc_tensor\" puede provocar la escritura de direcciones arbitrarias. Esta vulnerabilidad se soluciona en b3561."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "b3561",
"matchCriteriaId": "959A4095-3418-4510-B812-74AC693D3DAC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-wcr5-566p-9cwj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:10.683",
"lastModified": "2024-08-15T14:15:10.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Huizhi enterprise resource management system v.1.0 and before allows a remote attacker to execute arbitrary code via the /nssys/common/Upload. Aspx? Action=DNPageAjaxPostBack component"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/HZ-cve/HZupload.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42677",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:10.813",
"lastModified": "2024-08-15T14:15:10.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Huizhi enterprise resource management system v.1.0 and before allows a local attacker to obtain sensitive information via the /nssys/common/filehandle. Aspx component"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/HZ-cve/HZlfi.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-42678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:10.910",
"lastModified": "2024-08-15T15:35:13.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Super easy enterprise management system v.1.0.0 and before allows a local attacker to execute arbitrary code via a crafted script to the /WebSet/DlgGridSet.html component."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYxss.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42679",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:11.003",
"lastModified": "2024-08-15T14:15:11.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Super easy enterprise management system v.1.0.0 and before allows a local attacker to execute arbitrary code via a crafted script to the/ajax/Login.ashx component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYsqli.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-42680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T14:15:11.107",
"lastModified": "2024-08-15T14:15:11.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Super easy enterprise management system v.1.0.0 and before allows a local attacker to obtain the server absolute path by entering a single quotation mark."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYinfo.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42744",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T20:15:09.110",
"lastModified": "2024-08-13T17:10:12.157",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-15T15:35:14.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-43373",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-15T15:15:21.217",
"lastModified": "2024-08-15T15:15:21.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "webcrack is a tool for reverse engineering javascript. An arbitrary file write vulnerability exists in the webcrack module when processing specifically crafted malicious code on Windows systems. This vulnerability is triggered when using the unpack bundles feature in conjunction with the saving feature. If a module name includes a path traversal sequence with Windows path separators, an attacker can exploit this to overwrite files on the host system. This vulnerability allows an attacker to write arbitrary `.js` files to the host system, which can be leveraged to hijack legitimate Node.js modules to gain arbitrary code execution. This vulnerability has been patched in version 2.14.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/j4k0xb/webcrack/blob/241f9469e6401f3dabc6373233d85a5e76966b54/packages/webcrack/src/unpack/bundle.ts#L79",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/j4k0xb/webcrack/commit/4bc5c6f353012ee7edc2cb39d01a728ab7426999",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-6347",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-08-15T15:15:22.093",
"lastModified": "2024-08-15T15:15:22.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "* Unprotected privileged mode access through UDS session in the Blind Spot Detection Sensor ECU firmware in Nissan Altima (2022) allows attackers to trigger denial-of-service (DoS) by unauthorized access to the ECU's programming session.\n * No preconditions implemented for ECU management functionality through UDS session in the Blind Spot Detection Sensor ECU in Nissan Altima (2022) allows attackers to disrupt normal ECU operations by triggering a control command without authentication."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve@asrg.io",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:D/RE:H/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "NOT_DEFINED",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "HIGH",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "cve@asrg.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://asrg.io/security-advisories/CVE-2024-6347",
"source": "cve@asrg.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6392",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-11T22:15:02.820",
"lastModified": "2024-07-12T12:49:07.030",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-15T14:56:16.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,18 +39,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.2.8",
"matchCriteriaId": "479CF10B-EE73-452F-BA16-3E26143812EE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/sirv/tags/7.2.6/sirv.php#L5197",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sirv/tags/7.2.6/sirv.php#L5338",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/229490c3-d820-4831-b105-a429512c2c60?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7262",
"sourceIdentifier": "security@eset.com",
"published": "2024-08-15T15:15:22.290",
"lastModified": "2024-08-15T15:15:22.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library.\nUsing the MHTML format allows an attacker to automatically deliver a malicious library on opening the document and a single user click on a crafted hyperlink leads to the execution of the library."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@eset.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:L/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NO",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "security@eset.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.wps.com/whatsnew/pc/20240422/",
"source": "security@eset.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7263",
"sourceIdentifier": "security@eset.com",
"published": "2024-08-15T15:15:22.453",
"lastModified": "2024-08-15T15:15:22.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library.\nThe patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough. Another hyperlink parameter was not properly sanitized which leads to the execution of an arbitrary Windows library."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@eset.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NO",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "security@eset.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.wps.com/whatsnew/pc/20240422/",
"source": "security@eset.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7715",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-13T07:15:13.677",
"lastModified": "2024-08-14T21:15:17.320",
"lastModified": "2024-08-15T15:15:22.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7829",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T13:15:14.107",
"lastModified": "2024-08-15T13:33:37.047",
"lastModified": "2024-08-15T14:15:13.560",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7830",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T13:15:14.617",
"lastModified": "2024-08-15T13:33:37.047",
"lastModified": "2024-08-15T15:15:25.340",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7831",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T13:15:15.107",
"lastModified": "2024-08-15T13:33:37.047",
"lastModified": "2024-08-15T15:15:25.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -0,0 +1,144 @@
{
"id": "CVE-2024-7832",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T14:15:14.210",
"lastModified": "2024-08-15T14:15:14.210",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_get_fullscreen_photos of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument user leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_fullscreen_photos.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274730",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274730",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.390120",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7833",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T14:15:14.720",
"lastModified": "2024-08-15T14:15:14.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/aLtEr6/pdf/blob/main/3.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274731",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274731",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.385338",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-15T14:00:17.410441+00:00
2024-08-15T16:00:29.207261+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-15T13:59:35.813000+00:00
2024-08-15T15:35:14.590000+00:00
```
### Last Data Feed Release
@ -33,48 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260093
260104
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `11`
- [CVE-2024-7828](CVE-2024/CVE-2024-78xx/CVE-2024-7828.json) (`2024-08-15T13:15:13.197`)
- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-15T13:15:14.107`)
- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-15T13:15:14.617`)
- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-15T13:15:15.107`)
- [CVE-2024-42676](CVE-2024/CVE-2024-426xx/CVE-2024-42676.json) (`2024-08-15T14:15:10.683`)
- [CVE-2024-42677](CVE-2024/CVE-2024-426xx/CVE-2024-42677.json) (`2024-08-15T14:15:10.813`)
- [CVE-2024-42678](CVE-2024/CVE-2024-426xx/CVE-2024-42678.json) (`2024-08-15T14:15:10.910`)
- [CVE-2024-42679](CVE-2024/CVE-2024-426xx/CVE-2024-42679.json) (`2024-08-15T14:15:11.003`)
- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-08-15T14:15:11.107`)
- [CVE-2024-43373](CVE-2024/CVE-2024-433xx/CVE-2024-43373.json) (`2024-08-15T15:15:21.217`)
- [CVE-2024-6347](CVE-2024/CVE-2024-63xx/CVE-2024-6347.json) (`2024-08-15T15:15:22.093`)
- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-15T15:15:22.290`)
- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-15T15:15:22.453`)
- [CVE-2024-7832](CVE-2024/CVE-2024-78xx/CVE-2024-7832.json) (`2024-08-15T14:15:14.210`)
- [CVE-2024-7833](CVE-2024/CVE-2024-78xx/CVE-2024-7833.json) (`2024-08-15T14:15:14.720`)
### CVEs modified in the last Commit
Recently modified CVEs: `65`
Recently modified CVEs: `30`
- [CVE-2024-7462](CVE-2024/CVE-2024-74xx/CVE-2024-7462.json) (`2024-08-15T13:16:26.113`)
- [CVE-2024-7463](CVE-2024/CVE-2024-74xx/CVE-2024-7463.json) (`2024-08-15T13:15:55.170`)
- [CVE-2024-7464](CVE-2024/CVE-2024-74xx/CVE-2024-7464.json) (`2024-08-15T13:15:28.367`)
- [CVE-2024-7465](CVE-2024/CVE-2024-74xx/CVE-2024-7465.json) (`2024-08-15T13:11:59.413`)
- [CVE-2024-7507](CVE-2024/CVE-2024-75xx/CVE-2024-7507.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7513](CVE-2024/CVE-2024-75xx/CVE-2024-7513.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7515](CVE-2024/CVE-2024-75xx/CVE-2024-7515.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7624](CVE-2024/CVE-2024-76xx/CVE-2024-7624.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7625](CVE-2024/CVE-2024-76xx/CVE-2024-7625.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7628](CVE-2024/CVE-2024-76xx/CVE-2024-7628.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7792](CVE-2024/CVE-2024-77xx/CVE-2024-7792.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7793](CVE-2024/CVE-2024-77xx/CVE-2024-7793.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7794](CVE-2024/CVE-2024-77xx/CVE-2024-7794.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7797](CVE-2024/CVE-2024-77xx/CVE-2024-7797.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7798](CVE-2024/CVE-2024-77xx/CVE-2024-7798.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7799](CVE-2024/CVE-2024-77xx/CVE-2024-7799.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7800](CVE-2024/CVE-2024-78xx/CVE-2024-7800.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7808](CVE-2024/CVE-2024-78xx/CVE-2024-7808.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7809](CVE-2024/CVE-2024-78xx/CVE-2024-7809.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7810](CVE-2024/CVE-2024-78xx/CVE-2024-7810.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7811](CVE-2024/CVE-2024-78xx/CVE-2024-7811.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7812](CVE-2024/CVE-2024-78xx/CVE-2024-7812.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7813](CVE-2024/CVE-2024-78xx/CVE-2024-7813.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7814](CVE-2024/CVE-2024-78xx/CVE-2024-7814.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-7815](CVE-2024/CVE-2024-78xx/CVE-2024-7815.json) (`2024-08-15T13:01:10.150`)
- [CVE-2024-25196](CVE-2024/CVE-2024-251xx/CVE-2024-25196.json) (`2024-08-15T14:35:01.030`)
- [CVE-2024-28066](CVE-2024/CVE-2024-280xx/CVE-2024-28066.json) (`2024-08-15T15:35:07.070`)
- [CVE-2024-28741](CVE-2024/CVE-2024-287xx/CVE-2024-28741.json) (`2024-08-15T15:35:08.427`)
- [CVE-2024-32901](CVE-2024/CVE-2024-329xx/CVE-2024-32901.json) (`2024-08-15T15:35:09.947`)
- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-08-15T15:35:10.277`)
- [CVE-2024-33960](CVE-2024/CVE-2024-339xx/CVE-2024-33960.json) (`2024-08-15T14:08:32.490`)
- [CVE-2024-33979](CVE-2024/CVE-2024-339xx/CVE-2024-33979.json) (`2024-08-15T14:07:24.257`)
- [CVE-2024-33980](CVE-2024/CVE-2024-339xx/CVE-2024-33980.json) (`2024-08-15T14:07:53.217`)
- [CVE-2024-33981](CVE-2024/CVE-2024-339xx/CVE-2024-33981.json) (`2024-08-15T14:08:13.003`)
- [CVE-2024-37273](CVE-2024/CVE-2024-372xx/CVE-2024-37273.json) (`2024-08-15T14:35:03.053`)
- [CVE-2024-37849](CVE-2024/CVE-2024-378xx/CVE-2024-37849.json) (`2024-08-15T15:35:11.593`)
- [CVE-2024-39549](CVE-2024/CVE-2024-395xx/CVE-2024-39549.json) (`2024-08-15T14:15:56.800`)
- [CVE-2024-41256](CVE-2024/CVE-2024-412xx/CVE-2024-41256.json) (`2024-08-15T14:27:18.487`)
- [CVE-2024-41258](CVE-2024/CVE-2024-412xx/CVE-2024-41258.json) (`2024-08-15T14:30:16.687`)
- [CVE-2024-4187](CVE-2024/CVE-2024-41xx/CVE-2024-4187.json) (`2024-08-15T14:45:27.797`)
- [CVE-2024-41955](CVE-2024/CVE-2024-419xx/CVE-2024-41955.json) (`2024-08-15T14:10:40.157`)
- [CVE-2024-42477](CVE-2024/CVE-2024-424xx/CVE-2024-42477.json) (`2024-08-15T14:02:23.130`)
- [CVE-2024-42478](CVE-2024/CVE-2024-424xx/CVE-2024-42478.json) (`2024-08-15T14:03:32.867`)
- [CVE-2024-42479](CVE-2024/CVE-2024-424xx/CVE-2024-42479.json) (`2024-08-15T14:03:53.203`)
- [CVE-2024-42744](CVE-2024/CVE-2024-427xx/CVE-2024-42744.json) (`2024-08-15T15:35:14.590`)
- [CVE-2024-6392](CVE-2024/CVE-2024-63xx/CVE-2024-6392.json) (`2024-08-15T14:56:16.490`)
- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-15T15:15:22.690`)
- [CVE-2024-7829](CVE-2024/CVE-2024-78xx/CVE-2024-7829.json) (`2024-08-15T14:15:13.560`)
- [CVE-2024-7830](CVE-2024/CVE-2024-78xx/CVE-2024-7830.json) (`2024-08-15T15:15:25.340`)
- [CVE-2024-7831](CVE-2024/CVE-2024-78xx/CVE-2024-7831.json) (`2024-08-15T15:15:25.947`)
## Download and Usage

View File

@ -38965,7 +38965,7 @@ CVE-2009-2342,0,0,bd361e0c361ffcb58198046b104cd344fec855308751fbf9b8543fb20662ad
CVE-2009-2343,0,0,36fa2598eb0d1daa450bf98f137eb9c3b109069bf3f5f91006700edc944a5db8,2009-07-09T04:00:00
CVE-2009-2344,0,0,9ab1c363a1f2e2e922458f65185e385879b1d11cd6551608da71910a7f97e130,2018-10-10T19:39:42.070000
CVE-2009-2345,0,0,a03c3c886f0080334a3b487fc57f64ff1f299c447418e92da4613f0e0e750174,2009-07-08T04:00:00
CVE-2009-2346,0,1,07d715f1f1489a7912845d12e53de3399a78ab09a7a308f742ffa2875013dddb,2024-08-15T12:44:24.983000
CVE-2009-2346,0,0,07d715f1f1489a7912845d12e53de3399a78ab09a7a308f742ffa2875013dddb,2024-08-15T12:44:24.983000
CVE-2009-2347,0,0,0bfda6df611f0dae5b28e14e6839bd58dc25a5eb7d7cb4bb0f298f9cfb066304,2018-10-10T19:39:43.400000
CVE-2009-2348,0,0,bff53c90c61cbd6c88f363956b7bc5d7ce5b7d7ff52c9b1f4d39936b3922858b,2023-11-07T02:04:06.660000
CVE-2009-2350,0,0,ad3ea17c88643ef0b133a72a8f8b77e72961684cb137ca7189445614d9b44687,2018-10-10T19:39:47.587000
@ -40316,7 +40316,7 @@ CVE-2009-3719,0,0,11975cf9055b3e784b5c65acee70145bf160b50d3cec2aca9993dc6c427ba3
CVE-2009-3720,0,0,e71e0c5edea7c31da12665b1c02a1ca0df518b2c8b5a3b7bffe471c157566195,2024-02-22T03:40:48.837000
CVE-2009-3721,0,0,71db801e2c9f36d381b0654132fb6baf92502a3dd9534cb18b869f1ba816b497,2021-06-04T15:34:14.673000
CVE-2009-3722,0,0,c74f9d22c998b93361153712fadd90e24d74f26c7dc35e38984a88d80fcd4cae,2023-02-13T01:17:49.517000
CVE-2009-3723,0,1,afe7b6ea46b5d2e05afad857c72ec74ce1b77724f0cfdca4fcc12da5be54a612,2024-08-15T12:44:24.983000
CVE-2009-3723,0,0,afe7b6ea46b5d2e05afad857c72ec74ce1b77724f0cfdca4fcc12da5be54a612,2024-08-15T12:44:24.983000
CVE-2009-3724,0,0,8963981ad474f106cf02c7b0b8b68158e13442ec2db6ed2a176b696c861a2e56,2020-01-16T17:56:50.210000
CVE-2009-3725,0,0,6bd8b6865c7e2f3b6831f91a849ea4c829483fcd913ee73613ead3ee798fd4fd,2018-11-16T15:46:38.050000
CVE-2009-3726,0,0,d73858dbb3a7004621a28fa2df49b6c4647b8b9f4d61b249e7fb7cd87a0c5ca1,2023-02-13T02:20:32.797000
@ -53818,7 +53818,7 @@ CVE-2012-2181,0,0,12b117fa503f2cee6c0dbb1cf3c70f9bbea4d04a441cd5bc6b9ba84e603cf0
CVE-2012-2183,0,0,d0032a3297bb3c070d3dae1d16fd7e73b6f3fd1f89aca8f233fb19d0bcaeccd4,2017-08-29T01:31:33.100000
CVE-2012-2184,0,0,22b090b918f6c2bedd96509827f3f9f210893317595f207d931ed745c9367085,2017-08-29T01:31:33.147000
CVE-2012-2185,0,0,474e8caf44f427bab3f656c21ad6c4a5cd481231df2278da9e07fe87c671e31b,2017-08-29T01:31:33.210000
CVE-2012-2186,0,1,d735d6061ce9251a18cb3830b02d927b631dddc82ba309bf0b1c7b630268ef78,2024-08-15T12:44:24.983000
CVE-2012-2186,0,0,d735d6061ce9251a18cb3830b02d927b631dddc82ba309bf0b1c7b630268ef78,2024-08-15T12:44:24.983000
CVE-2012-2187,0,0,d158e18f6afc338349731ff747fa2d6323158b84f52ea312eac46527fb875a96,2013-02-12T05:08:29.460000
CVE-2012-2188,0,0,9ac7776acbcde4fb27c51cfc3ae6ee100436645aacfc1889f9dd6700c1da51d3,2017-08-29T01:31:33.290000
CVE-2012-2190,0,0,b3030aa86774d8d9a8e64981329b18597344c5f658700d2f57bf3ade64fca8a7,2017-08-29T01:31:33.350000
@ -54478,7 +54478,7 @@ CVE-2012-2943,0,0,0767499135c00b9fd412a866c41e5fb1ec2995fb36c21f3d7557320e102fc9
CVE-2012-2944,0,0,422e394f62a6c6efcdd756412ae6b3808b7a86f7cdb77d582b3ba7d01c151a21,2018-01-05T02:29:32.837000
CVE-2012-2945,0,0,a0cbeccbe1b74716a39e13cc040f5c6d9e4724c522dfae1e2ca86a5e2d3bbf4c,2019-10-31T01:09:56.767000
CVE-2012-2947,0,0,589189191f132548c7419c1b1d8f949215801bc7e15542e0f0e1bcd1ac30d997,2017-11-13T16:44:23.247000
CVE-2012-2948,0,1,8492072bd0443dce647824926aa625e3846f32176f24d3aaac2e7bcbf9979981,2024-08-15T12:44:24.983000
CVE-2012-2948,0,0,8492072bd0443dce647824926aa625e3846f32176f24d3aaac2e7bcbf9979981,2024-08-15T12:44:24.983000
CVE-2012-2949,0,0,f162bd7a8ce3c5740295d8654ac1648063fb445e9c7cdeae7efe869bae08ed9b,2023-11-07T02:11:28.320000
CVE-2012-2950,0,0,7999b62e856fcaa9952cf2ddd7b772b30aab5f4cb3c2ddd057c3023a6eeb1357,2020-01-22T20:32:54.300000
CVE-2012-2951,0,0,10b13d4c37cc98202bf612867cec5c480c17a7ca662582155b9f66749fd011d1,2023-11-07T02:11:28.380000
@ -109162,7 +109162,7 @@ CVE-2017-9353,0,0,77ae59d89b3447288f6b49e12f88473541447ca5b59ecf2d6cf0b8df8ce8aa
CVE-2017-9354,0,0,74bbea4f38aa38b1d500ede1eb09ebbee7152879053608afcb71182b73744196,2023-11-07T02:50:45.430000
CVE-2017-9355,0,0,02dff81f45a6ca2763e2c32f680838df88d807f7a0bbbd608ef51e28cc51fef8,2017-08-13T01:29:23.523000
CVE-2017-9356,0,0,4749a20821d119bd219794fe7f7a983ce4f45d0a3ed9b7355cf2ad2ec330d3bd,2017-07-03T14:22:15.027000
CVE-2017-9358,0,1,4258e2ed4b3e6695e1ecad914e48af27c0b537a6af0deb81776563836e518100,2024-08-15T12:44:24.983000
CVE-2017-9358,0,0,4258e2ed4b3e6695e1ecad914e48af27c0b537a6af0deb81776563836e518100,2024-08-15T12:44:24.983000
CVE-2017-9359,0,0,2368321c04ceb311f621a1797010d5c1e4caec96be51d83047a784b9e629856f,2017-11-05T01:29:02.927000
CVE-2017-9360,0,0,27af1527e8bd8cb56bf2337ef3112354ffc971aeee812bae89f132b10193e916,2017-06-06T20:24:18.207000
CVE-2017-9361,0,0,7e2dadd9afff52eb2d5eb35231870617f265bf9fb44ebe5e2297f75681ffafef,2017-06-06T20:22:01.503000
@ -113221,7 +113221,7 @@ CVE-2018-12222,0,0,cd594ade51c94d0f99c34c14f8add57c93e4d3db7f36434a71ca1947b30de
CVE-2018-12223,0,0,2a195e3a8b8184df110572fc1870d7c2c5cbe4ffe1ea713b5062d1b4a7564646,2019-10-03T00:03:26.223000
CVE-2018-12224,0,0,962c04fd6b14f784f6830c7b1410be9e1be28ddf64a003e6aca217329378b58a,2019-04-04T19:29:01.197000
CVE-2018-12227,0,0,e3dc78a26288f1ec7ee409d718263fc2f9d76c11c03ed4914627c73f2bb75876,2019-03-29T16:22:30.603000
CVE-2018-12228,0,1,9b43e2e7a7d7b2cd95d3264f52a35577e70170220eacfc60b2345eb23a196fe2,2024-08-15T12:44:24.983000
CVE-2018-12228,0,0,9b43e2e7a7d7b2cd95d3264f52a35577e70170220eacfc60b2345eb23a196fe2,2024-08-15T12:44:24.983000
CVE-2018-12229,0,0,25183f6fb4e14d66039ab1217619d8e91e185df98f3098342ce6974b7841295c,2018-08-08T18:32:54.820000
CVE-2018-1223,0,0,7241c05835c252b2e511784df2672a05abace94e20818ac4eff57055d327105f,2020-03-09T13:45:00.793000
CVE-2018-12230,0,0,949409450595b73389c4fb9a6505293c7e02d87eb32957efe4e3f6a66ef687c6,2018-09-11T12:03:15.493000
@ -156697,7 +156697,7 @@ CVE-2020-28221,0,0,b11d94bc598da000ee9b78f24e2814eb8c0c04f20c200e02f257adb800ce4
CVE-2020-2823,0,0,6b68b4bbe504bd86d617b8c125a3a1ceca54ef19c0f43738de3a8c82409f9112,2020-04-17T16:13:29.850000
CVE-2020-2824,0,0,180a2152fd5c33c4ccc27b192f0d24b040b80007cae66423829dbad240e887f0,2020-04-17T15:48:59.597000
CVE-2020-28241,0,0,4ca96ae72dcaba86c7464f7628625868cb320e96f441934f45770a98fdc59388,2023-11-07T03:21:08.773000
CVE-2020-28242,0,1,070b828b2605ab0855888bd7f0deb32282a00ff152c4ce89f27a5f211bd6b359,2024-08-15T12:44:24.983000
CVE-2020-28242,0,0,070b828b2605ab0855888bd7f0deb32282a00ff152c4ce89f27a5f211bd6b359,2024-08-15T12:44:24.983000
CVE-2020-28243,0,0,ff545549e2630bab3a1ae46b88c90b9340db8e930c79e67f90052cce6f11f301,2023-12-21T18:31:01.147000
CVE-2020-28246,0,0,920a15c00fde9dba9eef987095ad655f584207e7e2e5552e4bcc4fb5e0f9bede,2024-08-04T17:15:36.533000
CVE-2020-28247,0,0,ed4051a79440da97fc22222cf7fdc82e25006815ee2f79f479d486711bda5fd0,2021-01-29T01:00:46.653000
@ -156773,7 +156773,7 @@ CVE-2020-28323,0,0,0279ea3556e7bb10a45900b2665d842e0cd7ec34817a16271c11abce46b85
CVE-2020-28324,0,0,4c3da1c0a596b6978bf1d7c3b41b14a088a58cd5c0310f7f04a7df27f27d1f43,2023-11-07T03:21:19.213000
CVE-2020-28325,0,0,2266b22dd81c5e68286c4a64367eb1fc60323d8d718ac805b66c00371a2a0286,2023-11-07T03:21:19.453000
CVE-2020-28326,0,0,27cae8c50e4c1de97c5d9d314379f52f5de9609b63408f6f180947df66bdc139,2023-11-07T03:21:19.687000
CVE-2020-28327,0,1,0c504b9213de0da76a43c443b8c2eb38db819606e565b20795bd81ad31ca56d2,2024-08-15T12:44:24.983000
CVE-2020-28327,0,0,0c504b9213de0da76a43c443b8c2eb38db819606e565b20795bd81ad31ca56d2,2024-08-15T12:44:24.983000
CVE-2020-28328,0,0,fed7b032c0d9d4c0dc0bdfd701dafd144718e9468ae6f60c2482e1307a36c77d,2021-12-02T19:23:31.560000
CVE-2020-28329,0,0,662780921005238035baea1eb3d4b8c93202351f28686648d059bfd5ccf76613,2020-12-04T18:30:39.837000
CVE-2020-2833,0,0,3d3fc2dae6d5321a3c7f51c3a73e20d9bd91a7ce445b10c0714b2b803210f78f,2020-04-17T17:12:25.927000
@ -224736,7 +224736,7 @@ CVE-2023-3291,0,0,00fc96abca2c8a545f91e8bae7ebecfa7718dc43d0e1342f2015e152babb98
CVE-2023-3292,0,0,b8ef5306ce74b9329b1620092abdf02378458b4d99143d5d695cd947fdd9bb06,2023-11-07T04:18:24.753000
CVE-2023-3293,0,0,72720dc679e6136c56dea1818ea89a7c6e888dfcb7dd739b8f7bb9a85a705eb5,2023-06-22T21:30:35.250000
CVE-2023-3294,0,0,1b4b00e0f705616d410fa9b39e1092447f9eed6300fb3dc7ef135392d7ad651f,2023-06-23T21:26:49.927000
CVE-2023-3295,0,0,e779ba829a6c7d52ccc35560a769470cd0c0a23af3caba3e359a5d5a3ab56dc1,2024-08-12T13:38:11.290000
CVE-2023-3295,0,1,704c26997561313920882ef0f5ef791d87fe1841ab000824e92df70b9b0fb48f,2024-08-15T14:29:56.513000
CVE-2023-32955,0,0,61d0e49080cedd0522d34227a5c22e22b65390bc79180c9847f44956574b84ba,2023-11-07T04:14:43.563000
CVE-2023-32956,0,0,6d79fbebbb8abd430f92328682c7425ff22687ac72560487627c14368840946b,2023-11-07T04:14:43.633000
CVE-2023-32957,0,0,b9c2446981231de3a55c46ec344d8368a4af380806615df14b0a4cff6b315c3d,2023-11-21T01:05:39.910000
@ -237313,7 +237313,7 @@ CVE-2023-5031,0,0,04bef1332046fe66f966e350e278e31343a5f3babd618b80f6a69200c058eb
CVE-2023-50311,0,0,6177f328b2324f302b8dcb8eb103523617a5f63e530ec910874929d15a42e5be,2024-04-02T17:55:47.107000
CVE-2023-50312,0,0,2bad74315adc5a15838005e613036a33cb3767df680b81a37071695206496d89,2024-03-01T14:04:26.010000
CVE-2023-50313,0,0,0ff1dc09ff0045844fa80710a45c5539f6e888446fbdc5db21cb236b97018b79,2024-04-08T22:48:41.757000
CVE-2023-50314,0,1,58ff5c4254e01fd320ec534ada600ba8e9bd8a2e2bf78bca8828c6872b3e9a11,2024-08-15T13:01:10.150000
CVE-2023-50314,0,0,58ff5c4254e01fd320ec534ada600ba8e9bd8a2e2bf78bca8828c6872b3e9a11,2024-08-15T13:01:10.150000
CVE-2023-50315,0,0,5d3fec02d3b831b7b70560b22ddccb82fe7001024adf6eb01c8c771bd87dece9,2024-08-14T17:49:14.177000
CVE-2023-5032,0,0,073a37b539bb398cfe7e631454583736447513e57b785dbc4f679f0eb520eef2,2024-05-17T02:32:48.020000
CVE-2023-50324,0,0,aab919cee62264c7fcf8e9369fe91cee7492eb240d5eac088e531a759730137d,2024-03-01T14:04:26.010000
@ -243420,7 +243420,7 @@ CVE-2024-21063,0,0,73270d165bc0b9fbb9db2ba8819a13b23a6c11f25a3f1c5d26effd3bfb361
CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000
CVE-2024-21065,0,0,1c4717813b1a034170a9d85c7f01f49a9a6817cd44eb3976adb8d53a84de595b,2024-04-17T12:48:31.863000
CVE-2024-21066,0,0,75a7d2ca04151ae301b20afa61195ac0f69e1c6988e947105f46ee0037cd9d3d,2024-04-17T12:48:31.863000
CVE-2024-21067,0,0,14100e98ff6c7ada8a3a74706f71a77e94987159ae2a72c4d36cb1d8662c05f2,2024-04-17T12:48:31.863000
CVE-2024-21067,0,1,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000
CVE-2024-21068,0,0,5397ed6276bc380474002ef2f826d2dbb33ae28ef93eb95352209ca8f93abe8f,2024-04-26T09:15:11.273000
CVE-2024-21069,0,0,e8fb038125081aee0289d623e5836cee4ae9c0f693a34e8e6777594462628a90,2024-04-26T09:15:11.350000
CVE-2024-2107,0,0,902766287c54c3e88a205ae58fbc93817b4ac63ce16c76170f3874ff8989f8ce,2024-03-13T12:33:51.697000
@ -243464,15 +243464,15 @@ CVE-2024-21103,0,0,2f3299fda2cbf8e902f3515fd0d48b9d8de5702ec09ff6c5557d6ae05b059
CVE-2024-21104,0,0,eebfe4dd9b21aaa35ec722f534d9449bff2c7a22cb7852b7fed566ff1ff264ce,2024-04-17T12:48:31.863000
CVE-2024-21105,0,0,a025937dea1ddbc18632fa98b68490251974c0a63176360144d7d1a06954f7bb,2024-04-17T12:48:31.863000
CVE-2024-21106,0,0,ab50f512ef43406c6bec553aae7f9997284c506ca99d62550b6d1b274cae0f7e,2024-04-17T12:48:31.863000
CVE-2024-21107,0,0,77905ed9b866b77f6f0af4fbc5291636afef9848fc7fd96fa27fb48c9e9eee32,2024-04-17T12:48:07.510000
CVE-2024-21107,0,1,8b22c366b8e56e1eace3e0c72769115530475e44eb4f180061f1d02595110799,2024-08-15T15:35:03.743000
CVE-2024-21108,0,0,457a95edc17f2d19406b77901b0315a9c16fbc7197ac7f42787f9b5f2f03b290,2024-04-17T12:48:07.510000
CVE-2024-21109,0,0,13d20bf3677261be2a53b120554676e417e029919531127b8331decaf3e0f066,2024-04-17T12:48:07.510000
CVE-2024-2111,0,0,6adfb64278e268a55141857a7e32fae75bf1ecf0e5097a377cb5910d9bfa0b89,2024-03-28T12:42:56.150000
CVE-2024-21110,0,0,64a8bccdd00c64791f3effdeb7c25b8f08a3042308c089ce392b19fc811bd013,2024-04-17T12:48:07.510000
CVE-2024-21110,0,1,2fb76e40bdb06e3e3079fd1da0264d6fd11a04c3085a1e1767dcd00caebab0fc,2024-08-15T15:35:04.813000
CVE-2024-21111,0,0,a4bd64a6248fb685a1f5cd3f64253f1bc5d465a5d8c33da50a6b56c616fbffc7,2024-04-17T12:48:07.510000
CVE-2024-21112,0,0,3843b79307daf90b6a1d0b5fe81ebf05f9b8f1c6159511f73ad1005727089ea0,2024-04-17T12:48:07.510000
CVE-2024-21113,0,0,27396ff3e441e5311fb8ad3fdb1a14daec1460b787f5096e64cb0d17049922ca,2024-04-17T12:48:07.510000
CVE-2024-21114,0,0,a68db21f071867d460d9ecb7787f01d140df4d7b01a2a39927ac583583cfba60,2024-04-17T12:48:07.510000
CVE-2024-21114,0,1,0880b4b822c0833beb112d172fe417240b3cb185b690f6da3505b6f7c47508fd,2024-08-15T15:35:05.830000
CVE-2024-21115,0,0,b1c90510e7789603a593fb63cf663c692bc761a2febc313e5f2e11a678db9f6e,2024-04-17T12:48:07.510000
CVE-2024-21116,0,0,72e72f8f571890e066dee87876aa4475cbba55214ef3d60e82bbaa99711e97c4,2024-04-17T12:48:07.510000
CVE-2024-21117,0,0,c00c4008bc12621d52c01b8472214c0be8ae4e9de0cb223458bb38ef939dfb04,2024-04-17T12:48:07.510000
@ -246064,7 +246064,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
CVE-2024-25024,0,1,cef2cf5d8bdafc1d79b6529f73e186659217d4df27ac33f172a4460da159b308,2024-08-15T13:01:10.150000
CVE-2024-25024,0,0,cef2cf5d8bdafc1d79b6529f73e186659217d4df27ac33f172a4460da159b308,2024-08-15T13:01:10.150000
CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000
CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000
CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000
@ -246182,7 +246182,7 @@ CVE-2024-25189,0,0,877bbe35db73d3ea174dbc6f324dcb523b6e20a064afb2e87ac0944b71bf3
CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000
CVE-2024-25190,0,0,5e7fcee6e1d49c76382f955314af222553d106a1254553833783057b6c9de687,2024-02-15T05:03:08.533000
CVE-2024-25191,0,0,a79a6f6dac299c349e2de385c864fbf66ec48043f058d11d55221ed1f7cad150,2024-02-15T05:03:05.180000
CVE-2024-25196,0,0,71b1b8c21e9030e7bad7b4e709c1cfc6025ee6669c3270f4efb2777d247006f5,2024-02-20T19:50:53.960000
CVE-2024-25196,0,1,4e1523df7155bcca6a8e3ac35657f04bf40ec93a62ac21976dc74cbf4e73e9ca,2024-08-15T14:35:01.030000
CVE-2024-25197,0,0,ca56aa502aafa76f9e203f1bfea1c7e7bb5407645a514e5c3184e8ae0b1b850e,2024-02-20T19:50:53.960000
CVE-2024-25198,0,0,8aa0d37f4bf223abe553de23cb491c2673e155f232b262f589f7488596dbdbf5,2024-08-01T13:47:35.120000
CVE-2024-25199,0,0,80cf865856345425a1255aaeff9a118b47eca4bf7d8e991fd2be82a76d5447fd,2024-02-20T19:50:53.960000
@ -247669,7 +247669,7 @@ CVE-2024-27109,0,0,d3f8df7e2e16d6aee5f99946bcfb2fb0ff8c289ba8999eb65f0360c55dca0
CVE-2024-2711,0,0,50ffd1863952a28cb20d757a1f3a8a646342dad98b8dd38660e5f27155377268,2024-05-17T02:38:26.583000
CVE-2024-27110,0,0,cbd5f20a9295447075c0d9ddae39d8a0518f51482cf9653676931acac4a2af17,2024-05-14T19:17:55.627000
CVE-2024-2712,0,0,12d5f119117cab5321059a19687d0b6e7d22fe860cd65815723e1f9810583e44,2024-06-27T19:15:13.167000
CVE-2024-27120,0,1,fe4cfa7158f309e965bd60f4141486001c7b54e134bc8dc5feb572e42289e515,2024-08-15T13:01:10.150000
CVE-2024-27120,0,0,fe4cfa7158f309e965bd60f4141486001c7b54e134bc8dc5feb572e42289e515,2024-08-15T13:01:10.150000
CVE-2024-27121,0,0,a143f37592e6d07ec906ccaf9ea9992751c531fdc28e20e87ec32ec9de043968,2024-03-12T12:40:13.500000
CVE-2024-27124,0,0,26db67db3453e1dd267c91698f9b1417c8d160e52aa7cf62e0f7bdbf1310db55,2024-07-03T01:50:21.947000
CVE-2024-27127,0,0,9db4e520391111d0d952131fd607fdbcf8e683f9c38cfdc16ee36395b41e60cb,2024-05-21T16:53:56.550000
@ -248376,7 +248376,7 @@ CVE-2024-28061,0,0,69ae8c16e1b63fd4290855dfe7823169455b79a10f705efce789e14ccfaa8
CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000
CVE-2024-28064,0,0,f454583b636a828554dbb6ac6e6f380d26d3ae9df36559678c0289b609fca957,2024-08-01T13:48:58.547000
CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000
CVE-2024-28066,0,0,85b2ab7ba2d9e65bbfe9842581e7e71a43b5d7c51a5dfddd95c5c977ea9d5e9b,2024-04-08T18:48:40.217000
CVE-2024-28066,0,1,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000
CVE-2024-28067,0,0,87f8f4904932894fbb80fce767ebf619e7e55e28806f6fe43c6dfd5af113cbe6,2024-07-12T14:57:36.897000
CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000
CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000
@ -248741,7 +248741,7 @@ CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888
CVE-2024-28739,0,0,36caa1134a8a7b2783edbb7df33b4da4cf1e215d5eea570ae15bc02fd363246e,2024-08-12T18:18:17.717000
CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000
CVE-2024-28740,0,0,828c63e17a66fa4cadbb23231d1ca9181a080d393e3a1f53175371eb551af743,2024-08-12T18:19:33.337000
CVE-2024-28741,0,0,3bc89e24ccc97e59e30e4828003cace9f36d1730b364ef896439edd9448aa78f,2024-04-08T18:48:40.217000
CVE-2024-28741,0,1,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000
CVE-2024-28744,0,0,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000
CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000
CVE-2024-28746,0,0,28e0f82b5245c8fee772a7fa2b89a2e8a2df0c79bfc4434d8d6d416163396ab6,2024-05-01T19:15:22.510000
@ -250856,7 +250856,7 @@ CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b83648
CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000
CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000
CVE-2024-31804,0,0,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000
CVE-2024-31805,0,1,6699d756bac943267782c342726fc7b8e1467259d7db700128f1c6fb49e3e5be,2024-08-15T13:35:01.687000
CVE-2024-31805,0,0,6699d756bac943267782c342726fc7b8e1467259d7db700128f1c6fb49e3e5be,2024-08-15T13:35:01.687000
CVE-2024-31806,0,0,0d23d3a16c910921a17f301055f98f9b17ff477b46facd9fbf2663ed7a6ab3c1,2024-08-01T13:51:09.630000
CVE-2024-31807,0,0,f1a9413060f21c220e1cb5e48db6f606b506243c0f13c9e1b8f8ac68e26c4bf4,2024-08-13T15:35:10.810000
CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda829f7,2024-08-01T13:51:09.823000
@ -250916,7 +250916,7 @@ CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aac
CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000
CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000
CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000
CVE-2024-31882,0,1,52eff0bcd5e6ba4a1336c357afeb83ec6fcf68993a4df9af1c5ae222ccb729aa,2024-08-15T13:01:10.150000
CVE-2024-31882,0,0,52eff0bcd5e6ba4a1336c357afeb83ec6fcf68993a4df9af1c5ae222ccb729aa,2024-08-15T13:01:10.150000
CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000
CVE-2024-31887,0,0,ca1dcd6dc6fe353a02ec0a4cea716a53938c4b835e7c6779724d1f7fe8375c4c,2024-04-17T12:48:07.510000
CVE-2024-31889,0,0,551bcd3e36a73e2bb38d2c501766c5b52ca7977e525b06f960ceabe308a1516f,2024-05-31T19:14:47.793000
@ -251705,7 +251705,7 @@ CVE-2024-32898,0,0,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f634794
CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000
CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000
CVE-2024-32900,0,0,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000
CVE-2024-32901,0,0,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000
CVE-2024-32901,0,1,0396668e4055b6cf30063754945d8be1d532a6ec0e47e38129ed67921f73e173,2024-08-15T15:35:09.947000
CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a2bf,2024-07-16T14:57:42.527000
CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000
CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000
@ -251886,7 +251886,7 @@ CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000
CVE-2024-33227,0,0,28dd1771db477989c0572e57f26fd3346bd032b5331c9baa2149840f310b32df,2024-05-22T18:59:20.240000
CVE-2024-33228,0,0,6fddfa2ac54ffbc147f4f4abcb25def40af05edc7dcd5b21e72e2f55460a7aff,2024-05-22T18:59:20.240000
CVE-2024-33228,0,1,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000
CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000
@ -252339,7 +252339,7 @@ CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc7
CVE-2024-33957,0,0,0e1e5f4730a34b23552c2231c245e18108db52e780fcaa99c647a1ead4fde0f9,2024-08-06T16:30:24.547000
CVE-2024-33958,0,0,b573d372b0d7ecaf1ad956ff6d0a05063e98ba29cfc5e03db4b15bd271dc6f01,2024-08-06T16:30:24.547000
CVE-2024-33959,0,0,7c0cd3b349dca2c5025b80d137d364d4b069eb5d0a51d215a853a38c247c583c,2024-08-08T21:02:25.943000
CVE-2024-33960,0,0,2ad498d81eba49f4a5e7a393b8038b75bde51710a29054d602c822280c14c088,2024-08-06T16:30:24.547000
CVE-2024-33960,0,1,345b70b65d026ebd294cd6f28decbfa8d641a9e026fde662cbe189d3e2ab9a61,2024-08-15T14:08:32.490000
CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
CVE-2024-33963,0,0,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000
@ -252358,9 +252358,9 @@ CVE-2024-33975,0,0,24d9f8b7189c6e049a2d195b8e70f6d865af89b6e07e97dd7c966c273f1ab
CVE-2024-33976,0,0,67f5f835747af0987a350b4d42b3bce1f04168a323132a627d10afd7d71c4f21,2024-08-06T16:30:24.547000
CVE-2024-33977,0,0,405178aa69e8c523d5255a40363518e9f3def64819b4c1b13860e42870541184,2024-08-06T16:30:24.547000
CVE-2024-33978,0,0,d9fa5afc6af12f1b1775f97e83f5db2f011fa6bd1262b6c0199a8a9aeedc346a,2024-08-06T16:30:24.547000
CVE-2024-33979,0,0,dfed535c5c088c982cc982c913db9bd03e95887458fb5c6e3b8f8a5513af823d,2024-08-06T16:30:24.547000
CVE-2024-33980,0,0,4eba04bc64e562fbf0ace4bc2913382276d1832c7c9b0e2ad3ab93144fab8dd8,2024-08-06T16:30:24.547000
CVE-2024-33981,0,0,e3eb316303f7a79daf960db918660586a68c7c4b30a224b6c6a147302290c8cd,2024-08-06T16:30:24.547000
CVE-2024-33979,0,1,b23f4bb2f30d829ac2b8337cbc397ab525114fa50ab62ece57b2e0097ce56196,2024-08-15T14:07:24.257000
CVE-2024-33980,0,1,4cc48478ea1d3758bfbc31648e401c46fb3a2b5528e5044fc92305300898eb87,2024-08-15T14:07:53.217000
CVE-2024-33981,0,1,8ca9e43815221320ccf66237d8bdbf16507b4f0cfcab2dfe65108c8b4c13f496,2024-08-15T14:08:13.003000
CVE-2024-33982,0,0,a5a400641b1905999f31649b77caed7e5463d643fd1a494924a5db164364e9b4,2024-08-06T16:30:24.547000
CVE-2024-33983,0,0,a83a104a81a24ca7cfe520571c3e6d45ba9414fc29d7ee2d6ed46d045aaab087,2024-08-06T16:30:24.547000
CVE-2024-33984,0,0,80dbb8d6d0ae9c62edcd055d5bea689800e85b11af62d3cc2fcb35e6df78c974,2024-08-06T16:30:24.547000
@ -253084,7 +253084,7 @@ CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff1
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
CVE-2024-35124,0,0,eebade4e344820896ada54a221712227782e55a7cb2e2d641368b18349f7b717,2024-08-13T12:58:25.437000
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
CVE-2024-35136,0,1,78b438c3be398b6caabee193a52ce1a71734e3871e784820d98c4079f2e843ed,2024-08-15T13:01:10.150000
CVE-2024-35136,0,0,78b438c3be398b6caabee193a52ce1a71734e3871e784820d98c4079f2e843ed,2024-08-15T13:01:10.150000
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000
@ -253092,7 +253092,7 @@ CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794
CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000
CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000
CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000
CVE-2024-35152,0,1,7bad72ae24123d07d5dae8008de53f4f5fbd9eaddf4dbef1423bde613b4ed2f3,2024-08-15T13:01:10.150000
CVE-2024-35152,0,0,7bad72ae24123d07d5dae8008de53f4f5fbd9eaddf4dbef1423bde613b4ed2f3,2024-08-15T13:01:10.150000
CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000
CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000
CVE-2024-35155,0,0,371571e1aae62a09e601d6099b5578266a4a707997394118a0b1e39997d5568b,2024-08-01T17:56:03.997000
@ -254588,7 +254588,7 @@ CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515b
CVE-2024-3727,0,0,db60e8166385f10211c2718c5bee0a37482c488d5e297dbcf62d143b9a845b73,2024-08-13T17:15:23.653000
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
CVE-2024-37273,0,0,701ddd83e97e8ea6c808ca5d8f57033bb1466851ddfe669965d2b1947df1df2f,2024-06-11T14:12:23.210000
CVE-2024-37273,0,1,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
CVE-2024-37275,0,0,ed16fc8bc6c608f35a8b7d5acc4e01aceb7115e810ed76f0ef20187fdb243170,2024-07-24T02:52:01.253000
CVE-2024-37278,0,0,f099ad6e686108b7aa0982a8f779de2fbae21e6d456841af0260dad64229b388,2024-07-24T02:51:37.857000
CVE-2024-37279,0,0,31cbe3e974fd27b1c5c854af28b34c2989a9118ebf3b3e54bb5c16795495edb9,2024-06-13T18:35:19.777000
@ -254767,7 +254767,7 @@ CVE-2024-37521,0,0,e9aebf31c63791ab4f95255134c2db65267eec1085288684d0f21a4a1118f
CVE-2024-37522,0,0,8d0ca9ac1272094da7900aa5aa9c5ded401dd6ca5f585f197834c48735f10240,2024-07-22T13:00:31.330000
CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd8099664ec,2024-07-22T13:00:31.330000
CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000
CVE-2024-37529,0,1,771cf9fe059d76f79b4eff421ffd3e496a6273cc96100c8769dab2ed7617195e,2024-08-15T13:01:10.150000
CVE-2024-37529,0,0,771cf9fe059d76f79b4eff421ffd3e496a6273cc96100c8769dab2ed7617195e,2024-08-15T13:01:10.150000
CVE-2024-3753,0,0,84eff4df8db1a00368e62ddb5ee92a92d75f6c87384a685b642620e2007cf84f,2024-08-01T13:56:41.100000
CVE-2024-37532,0,0,45919b76fbf8caed85c6eed116f206909b848d159e913e9fa67d2f60af5f6be6,2024-06-20T16:07:50.417000
CVE-2024-37533,0,0,d82586c3abd351c16093df491355c34e8750e635410a84408441a8e9ff8b85a0,2024-07-25T12:36:39.947000
@ -254910,7 +254910,7 @@ CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60
CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000
CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000
CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
CVE-2024-37849,0,0,e72cb95ec5b2547b0995574b6fc0f48f3b1fcec22199ffd15599733145952607,2024-08-01T18:41:11.900000
CVE-2024-37849,0,1,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000
CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000
CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000
CVE-2024-37856,0,0,3b2c5fbeccee511c1f982fae5c819d203e5df06806ae143d685413cbae07336d,2024-07-30T13:33:30.653000
@ -255996,7 +255996,7 @@ CVE-2024-39543,0,0,aaaad3e02df0b0d6d56ce697644f4ead0224422eef8d860010b2b8a0e7c3b
CVE-2024-39545,0,0,1eb5c972b938ca677d55ad154dd167ed070fc69afd56e645990ea5adac9fd888,2024-07-11T18:09:58.777000
CVE-2024-39546,0,0,e16dcfa4fc66ceb6eb147443dbf92ba41be6e9e538dcfdb9345e3a289eefbf1c,2024-07-12T16:11:53.397000
CVE-2024-39548,0,0,f508a41c267f71c0128d6c49ba38f3ffa926a8d4647ec725429fd94a8d643cbd,2024-07-11T18:09:58.777000
CVE-2024-39549,0,0,83b6facd1e2147b716054939f8174b72223d922c2afe4d889562b9eddf228d33,2024-07-11T18:09:58.777000
CVE-2024-39549,0,1,35f2c1bcd8c81702a00421faf40f87e7195f0ae100c438acf9bee22328a96831,2024-08-15T14:15:56.800000
CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000
CVE-2024-39550,0,0,5bb40c1c6118db31096ceb73a5335d2e11deae5cbb65f13e233b49f728e16419,2024-07-11T19:15:12.157000
CVE-2024-39551,0,0,36bf61155e3a3db50c94319d239c2bdb1bd13565a0d3a2d4d881f71cf975abe6,2024-07-11T19:15:12.260000
@ -256337,20 +256337,20 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b
CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000
CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
CVE-2024-40464,0,1,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33
CVE-2024-40465,0,1,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000
CVE-2024-40472,0,1,7d325ed778605ea62befe2fe23f0c336d0e6ecc42db2791564a81ce5488761f0,2024-08-15T13:25:05.657000
CVE-2024-40473,0,1,fae125d6208bbe8cec385e28019f920962566f6a2e33ffb0f8e49b21974c8449,2024-08-15T13:39:29.240000
CVE-2024-40474,0,1,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829b18,2024-08-15T13:40:01.357000
CVE-2024-40475,0,1,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000
CVE-2024-40476,0,1,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000
CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33
CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000
CVE-2024-40472,0,0,7d325ed778605ea62befe2fe23f0c336d0e6ecc42db2791564a81ce5488761f0,2024-08-15T13:25:05.657000
CVE-2024-40473,0,0,fae125d6208bbe8cec385e28019f920962566f6a2e33ffb0f8e49b21974c8449,2024-08-15T13:39:29.240000
CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829b18,2024-08-15T13:40:01.357000
CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000
CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000
CVE-2024-40477,0,0,0ebd8b8f59a35dda2b3e292f3675b27eb6ffc42149072e05c13180f024ce3e21,2024-08-13T01:13:46.877000
CVE-2024-40478,0,0,c52d89ab86aaf3f734a40597d5b00313c948fc2e1e77e0656955644084643dfa,2024-08-12T13:41:36.517000
CVE-2024-40479,0,0,0e859692d2dcdb68471916e06e469ab263533fd2f9afcecfe52d53c988a5da77,2024-08-13T01:13:47.860000
CVE-2024-40480,0,1,8a5587d0c52b3e2bab6e37cd2c4376f46191977b095b6fb4b6027fa3bdca9dcc,2024-08-15T13:47:50.450000
CVE-2024-40481,0,1,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000
CVE-2024-40480,0,0,8a5587d0c52b3e2bab6e37cd2c4376f46191977b095b6fb4b6027fa3bdca9dcc,2024-08-15T13:47:50.450000
CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000
CVE-2024-40482,0,0,9a3a01b5782aa51ef209e482e70f047b430b9828561a94171012474df4d532a4,2024-08-13T01:13:50.130000
CVE-2024-40484,0,1,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000
CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000
CVE-2024-40486,0,0,206068d4d3a686bb79ffe5f57501930cd1fe13ada3eb39bb4b41ff953c8c8a8c,2024-08-13T01:13:52.383000
CVE-2024-40487,0,0,005a09265ebc099b9fcb5976da33b894e6213384a847e53e8ae4a2bd87b7e372,2024-08-12T13:41:36.517000
CVE-2024-40488,0,0,29149e46f549d6c8fa1979da87e45c07630bc970cf31d75d73d9d6723dc075d0,2024-08-13T01:13:53.230000
@ -256413,9 +256413,9 @@ CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5b
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
CVE-2024-40617,0,0,7e202d6e3a6a7f1f99f642a0ac78e8a414409382efde0e52849f3dc8f46222c1,2024-07-17T13:34:20.520000
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
CVE-2024-40619,0,1,ea93e4171451f548208f044dfab4f4efb10b5f11d3d61496f079a8f705287721,2024-08-15T13:01:10.150000
CVE-2024-40619,0,0,ea93e4171451f548208f044dfab4f4efb10b5f11d3d61496f079a8f705287721,2024-08-15T13:01:10.150000
CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000
CVE-2024-40620,0,1,71713fcfb38141fbf2f0a69f3f32bf9f9dd02aa1317d107db78803e36c2e64e8,2024-08-15T13:01:10.150000
CVE-2024-40620,0,0,71713fcfb38141fbf2f0a69f3f32bf9f9dd02aa1317d107db78803e36c2e64e8,2024-08-15T13:01:10.150000
CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000
CVE-2024-40626,0,0,a78d44649981609909e27d22ccb6346946292f7107bba7f84553b3eaa01a5871,2024-07-16T18:00:02.110000
CVE-2024-40627,0,0,9135682f430d5bd3e848a020970fdae52f5ba66833f8d323b6fb81718428c2a6,2024-07-16T13:43:58.773000
@ -256836,10 +256836,10 @@ CVE-2024-41250,0,0,ed2ec7774a8ec7b69d0fb8bbb5a6282e439116063707acc8ce2b97cfaf8b3
CVE-2024-41251,0,0,da008bc6dc7814b48f867f21af4633a6806e17edefa70e303dbf35845dd6cab0,2024-08-08T20:35:09.980000
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
CVE-2024-41254,0,1,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000
CVE-2024-41254,0,0,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000
CVE-2024-41255,0,0,7cc2545787669f116d3dff916e600823ce1d7be3e6c14b4dba9c7bef750d7295,2024-08-01T15:35:18.570000
CVE-2024-41256,0,0,1bf0b121e504fbd022f127340154e7cb8fcfb04505e0f7d02e6472303f883868,2024-08-01T12:42:36.933000
CVE-2024-41258,0,0,76b722665ab6223e41ba7e3d8945bf1a36e3d6ce75d31b29574bb0e37bab2587,2024-08-01T12:42:36.933000
CVE-2024-41256,0,1,491cd68a00bcf62a1e4266f260b99772e9ecb5d3fe1acae9bf2653c92a9cc1d5,2024-08-15T14:27:18.487000
CVE-2024-41258,0,1,a0ffce639d49eabf0a263282d26fc952b91860246deee0783640dbbfce6238d6,2024-08-15T14:30:16.687000
CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fccf6,2024-08-02T16:35:51.213000
CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000
CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000
@ -257076,7 +257076,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6
CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000
CVE-2024-41865,0,0,1c9d0b02e42a91c1b2481279c221e04b60cecfc41a7fc125ed37cdc3f4660a28,2024-08-14T17:49:14.177000
CVE-2024-41866,0,0,a425f2bc051ad8982696461ab1b5de2a60d8bc87ff38cd9f8c5725fb049e77fb,2024-08-14T17:49:14.177000
CVE-2024-4187,0,0,6e41c1b7087e8ddcfaf3801328e1ee1bd29a767b33bcf1748327754d0e784ada,2024-08-01T12:42:36.933000
CVE-2024-4187,0,1,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000
CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000
CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
@ -257122,7 +257122,7 @@ CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1
CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000
CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000
CVE-2024-41954,0,0,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000
CVE-2024-41955,0,0,5cc7c41b3793b9bfbfffe5ce80cc2ba3b224b9e2e273665abd77af2754fbe18c,2024-08-01T12:42:36.933000
CVE-2024-41955,0,1,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab3c1,2024-08-15T14:10:40.157000
CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000
CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000
CVE-2024-41958,0,0,ac2d465ee5b5b310612655a7cc0163ff8c5d740ff2b286b950528d6c8e63af4d,2024-08-06T16:30:24.547000
@ -257347,14 +257347,14 @@ CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de9707413
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
CVE-2024-42353,0,1,b9621cd8763f88a53f5b098ec4fa4089ac4eb4f9bb7ec8eb962c2fc710d76fef,2024-08-15T13:01:10.150000
CVE-2024-42353,0,0,b9621cd8763f88a53f5b098ec4fa4089ac4eb4f9bb7ec8eb962c2fc710d76fef,2024-08-15T13:01:10.150000
CVE-2024-42354,0,0,530679279c657883c4b35ba657ab96e7283f524459574665a6f69e940f2dd9b1,2024-08-12T15:49:58.230000
CVE-2024-42355,0,0,4d53406f017c64f607be0598b7dd1b3fb3451e70edad6092c759f1ac9d9afdaf,2024-08-12T15:40:32.777000
CVE-2024-42356,0,0,71e7dc9901543344eaef3df0bcbcdd32b411ba29d6c2531b0f605cb85111defa,2024-08-12T15:34:08.190000
CVE-2024-42357,0,0,7b039f202cf78cd0431d1a42b63791f2941347495cf765d1f5a63b93271755ea,2024-08-12T15:26:19.520000
CVE-2024-42358,0,0,3235df447217095f8cbf5213ea3a6f300e00850291878619ee95d2566fd638a9,2024-08-12T18:50:20.967000
CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000
CVE-2024-42360,0,1,dc4f22d979b7665e0b696984f4c37e2c0c9ca0048a6560c57c6062a410b59017,2024-08-15T13:01:10.150000
CVE-2024-42360,0,0,dc4f22d979b7665e0b696984f4c37e2c0c9ca0048a6560c57c6062a410b59017,2024-08-15T13:01:10.150000
CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000
CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000
CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000
@ -257405,9 +257405,9 @@ CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67
CVE-2024-42470,0,0,c2337f1ff190575de6395575b084daf7bce25ccaf9e3e76f2820207f899cd76d,2024-08-12T13:41:36.517000
CVE-2024-42473,0,0,4ed1851fb406b4127fd12c2bea40398eaaed7991df0df7d58ed2677a68f6e622,2024-08-12T13:41:36.517000
CVE-2024-42474,0,0,4857cb5e72d8ea0d32d5af9cf7ffd6ae8ca8513ca577f0cc8130743d345121e8,2024-08-12T18:57:17.383000
CVE-2024-42477,0,0,c9e466b6dcdc98b8129d2dff7534d12d9b68a0ebf35a40d8abf91f60f8e6e66c,2024-08-12T18:57:29.247000
CVE-2024-42478,0,0,c45f4b766a17c049fa7f539e1f8f8bc32b69a7c8613b459d523974652a5255af,2024-08-12T18:57:29.247000
CVE-2024-42479,0,0,d3e65535755420e1ca917686e20a3c508950a99193115c9d799f72dbe453c8d1,2024-08-12T18:57:29.247000
CVE-2024-42477,0,1,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf37dd,2024-08-15T14:02:23.130000
CVE-2024-42478,0,1,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000
CVE-2024-42479,0,1,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000
CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34
CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c017c,2024-08-12T18:57:29.247000
CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000
@ -257448,7 +257448,12 @@ CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a32
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000
CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000
CVE-2024-42676,1,1,e9a5daa3dd8eccdd2f2a29dabe9972486a96dd991b5aee3e3e2779d5a44ae843,2024-08-15T14:15:10.683000
CVE-2024-42677,1,1,921bcc4c68a42e8030a468d3c0661dcdb643fbc8b518c216389c7e6a0f4b2840,2024-08-15T14:15:10.813000
CVE-2024-42678,1,1,a46e0301f5dde2b9b8e8931a7229a2fad19a83ec9b835894cd9980418af8c70d,2024-08-15T15:35:13.793000
CVE-2024-42679,1,1,da0c1490e731425e36401900a4ed9f9051b7dd800a91db162d52ad313ebd63f7,2024-08-15T14:15:11.003000
CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000
CVE-2024-42680,1,1,d1b04f5abc334e70c942b6c701a6201458f2d279b9d7d2762603a80d10cdfac9,2024-08-15T14:15:11.107000
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
@ -257463,7 +257468,7 @@ CVE-2024-42740,0,0,39569bd5167f0f47a44ebbe4ecc5aa9c5e8e01d7a3ccd0a81beaed4c0b73a
CVE-2024-42741,0,0,c3d54f2d55431f18f2fe2689eea0c75eda9e73bc676a6cdf4fda83be8048dd21,2024-08-13T17:35:02.867000
CVE-2024-42742,0,0,c6d47b1b37e493a627cc13143aae4e00b72c25b4505c3a339eb6ba0a1660d2da,2024-08-13T20:35:14.063000
CVE-2024-42743,0,0,d538c66af9d70f40192fc77d1cf4c1d752037b7e0e55925fdbf9bc80a15b551d,2024-08-13T19:35:12.963000
CVE-2024-42744,0,0,9d65b457ba80e3bacb8cbde537c1ae1de7fa2e5e5f601337f60d5c89a5a01599,2024-08-13T17:10:12.157000
CVE-2024-42744,0,1,b5fdf12fd1c18150140d8a7482237b3fe88e9f65b6d8de0140d30bbf81117cb5,2024-08-15T15:35:14.590000
CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02cafc7,2024-08-13T17:09:44.943000
CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000
CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000
@ -257566,7 +257571,7 @@ CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf6
CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000
CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000
CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763bfb,2024-05-17T02:40:22.673000
CVE-2024-43275,0,1,60012973451639aeede903a3fd93051c27ce3689ec19e72785c5fe853166efc8,2024-08-15T13:01:10.150000
CVE-2024-43275,0,0,60012973451639aeede903a3fd93051c27ce3689ec19e72785c5fe853166efc8,2024-08-15T13:01:10.150000
CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000
CVE-2024-4329,0,0,915fdd462793e35dddcb6a188ef6774a9ebc56a526b1b0698bddaf3c23ba3b77,2024-05-14T16:11:39.510000
CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000
@ -257579,8 +257584,9 @@ CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ff
CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
CVE-2024-43368,0,1,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000
CVE-2024-43368,0,0,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000
CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000
CVE-2024-43373,1,1,ed8a992aa058440c637b3dc2bbcf107e169a847d01fcfdc3684d410eea4545c0,2024-08-15T15:15:21.217000
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000
@ -259030,7 +259036,7 @@ CVE-2024-6073,0,0,e03ebd767ac590d74109e38897ba792c96f7f9dfee79b1fa5bd262c10ac25e
CVE-2024-6074,0,0,915dc1a478b1dc63b8eb0116a9c01d91f3bc138019e7c4a3ebc47481b04905bc,2024-08-01T14:00:10.323000
CVE-2024-6075,0,0,1cd7e5569456a26c7768214306daa7e1d9ce1093889f04b8131e5ae79338cd6f,2024-08-01T14:00:10.553000
CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f72e,2024-08-01T14:00:10.780000
CVE-2024-6078,0,1,ab5ff4b9880bb2c597cf25a64a3bcf823d1e7a4d5b8fdbad8abe275837e77a97,2024-08-15T13:01:10.150000
CVE-2024-6078,0,0,ab5ff4b9880bb2c597cf25a64a3bcf823d1e7a4d5b8fdbad8abe275837e77a97,2024-08-15T13:01:10.150000
CVE-2024-6079,0,0,ddff24cc98f45a02150b04530825a9b6e0cde9a4b6c677c473ea8a9f1baa2f50,2024-08-14T02:07:05.410000
CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000
@ -259243,6 +259249,7 @@ CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdca
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000
CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000
CVE-2024-6347,1,1,ac2682842f660bd3f09be4cdb04a773fadc44f3437bd090b7f3fadeae99f373b,2024-08-15T15:15:22.093000
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
@ -259274,7 +259281,7 @@ CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000
CVE-2024-6392,0,1,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000
CVE-2024-6395,0,0,1966cf71699330f1b667831d53a0cb914c964c7509fe8ae4316297f8fa4eb9b4,2024-07-17T13:34:20.520000
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
@ -259361,8 +259368,8 @@ CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bed
CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
CVE-2024-6532,0,0,21d26a8f00408d7c0c1c4ea0dfdffc81ca804ea427b5b751972725c0e03a2bc3,2024-08-14T13:00:37.107000
CVE-2024-6533,0,1,1fe3821a4fa82ece523eea342a341b31032ad8dc40900963216e4d33ee848dce,2024-08-15T13:01:10.150000
CVE-2024-6534,0,1,e155de078d07184e703430b5c5ab1829307a03b153b3dfcf3e36447afb88a4b8,2024-08-15T13:01:10.150000
CVE-2024-6533,0,0,1fe3821a4fa82ece523eea342a341b31032ad8dc40900963216e4d33ee848dce,2024-08-15T13:01:10.150000
CVE-2024-6534,0,0,e155de078d07184e703430b5c5ab1829307a03b153b3dfcf3e36447afb88a4b8,2024-08-15T13:01:10.150000
CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000
CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
@ -259665,8 +259672,8 @@ CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
CVE-2024-7061,0,0,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000
CVE-2024-7062,0,0,d6f409aeb13130ff6f4252d4a7aadcbcfc3eecb0d68f9e3338eff0add9df7d66,2024-07-26T12:38:41.683000
CVE-2024-7063,0,1,95ad8099aab95a9dde7fc37042b2cc7e5a2b9ad07519f93346e3b69c18acff02,2024-08-15T13:01:10.150000
CVE-2024-7064,0,1,e3a211bb9c50180254bebd2ee2b1ef5aa24a2d62eccbaf522e0ed9fe23e0e26d,2024-08-15T13:01:10.150000
CVE-2024-7063,0,0,95ad8099aab95a9dde7fc37042b2cc7e5a2b9ad07519f93346e3b69c18acff02,2024-08-15T13:01:10.150000
CVE-2024-7064,0,0,e3a211bb9c50180254bebd2ee2b1ef5aa24a2d62eccbaf522e0ed9fe23e0e26d,2024-08-15T13:01:10.150000
CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000
CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000
CVE-2024-7067,0,0,edbddb223a917ac8e1a9e4a55d4a5029d93724357fc61dc50ee8384e13f8f4e7,2024-07-26T13:14:31.417000
@ -259782,6 +259789,8 @@ CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d8
CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b95,2024-08-02T12:59:43.990000
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
CVE-2024-7262,1,1,868a4f896dec783318f2ee208cc5c7c3b5f461076ab76497b65d05b176a41ea9,2024-08-15T15:15:22.290000
CVE-2024-7263,1,1,bf4791f07300a049e277c5537894dd2593766db96c421b0c9d7bbf1b4065b2b3,2024-08-15T15:15:22.453000
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000
CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000
@ -259882,12 +259891,12 @@ CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861
CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000
CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000
CVE-2024-7410,0,0,247c090cb12333e31f3a0efea00d18747dfe5a3d5c256e6005fe0d4e1c4d1667,2024-08-12T13:41:36.517000
CVE-2024-7411,0,1,941e8becce5edb70d6342923f39c1a594a9a6c9bbd15bb37cc29f8ece3cbe3d3,2024-08-15T13:01:10.150000
CVE-2024-7411,0,0,941e8becce5edb70d6342923f39c1a594a9a6c9bbd15bb37cc29f8ece3cbe3d3,2024-08-15T13:01:10.150000
CVE-2024-7412,0,0,b2cec2bd274b261ef09607f2e770ed1c42b7cfc2487929d65308251b8ca5fb1a,2024-08-12T13:41:36.517000
CVE-2024-7413,0,0,1e2e6e629ae076e767a4ed710c2f32c76d2bd71396701e30749c7812afe7edb9,2024-08-12T13:41:36.517000
CVE-2024-7414,0,0,75779b8687375e2d55d3e2d954892bdff56935440cca361ae4c6a6a0a4f3bed5,2024-08-12T13:41:36.517000
CVE-2024-7416,0,0,9f5565f11e96fff207b91fc0825d45934365835075928991c71489e2cad44813,2024-08-12T13:41:36.517000
CVE-2024-7420,0,1,900b53573d93f498a815ef6b5a664e0852d0bc5883291fa6f9b7211ca7e3509a,2024-08-15T13:01:10.150000
CVE-2024-7420,0,0,900b53573d93f498a815ef6b5a664e0852d0bc5883291fa6f9b7211ca7e3509a,2024-08-15T13:01:10.150000
CVE-2024-7436,0,0,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000
CVE-2024-7437,0,0,6536d7f97d7ad58b67ec8c23497b1bab63383020d43415bc5b4c83af23e0fa6d,2024-08-12T13:38:43.060000
CVE-2024-7438,0,0,e0751aac5a1208089fd3136e155c05769dcef78130a2d9c6fdc04c87ca92fb9a,2024-08-12T13:38:43.203000
@ -259910,10 +259919,10 @@ CVE-2024-7458,0,0,2c9d4dd630ee9d646df3107c9eafd0e6cad217e61388b41410f8713d27f859
CVE-2024-7459,0,0,53c79cef732ccbff6adb36bb342854abc83915346c054d98b70903c7c6347372,2024-08-06T17:14:16.667000
CVE-2024-7460,0,0,d48d1421ea3ce9fda403f952725d01106181045f180d1b45462656996088205d,2024-08-06T17:19:25.597000
CVE-2024-7461,0,0,189ae990a8c2eef74fc9b600d565c2ec70cc463fa8cf230cacb55e0adada7e7a,2024-08-05T12:41:45.957000
CVE-2024-7462,0,1,2cac77ec17ae20c4dc4e5d7bf53769fdd387d45adec5f3f229688e30e8ff78fc,2024-08-15T13:16:26.113000
CVE-2024-7463,0,1,638cc4f7f70495dee2d171348ad4cef985451fd3918228f4f52868fcb07733ed,2024-08-15T13:15:55.170000
CVE-2024-7464,0,1,139bb5dec916abceb981b7aebc3328ff09288b94e952f0c1eb1a4e05e89a7bfa,2024-08-15T13:15:28.367000
CVE-2024-7465,0,1,e4a77acfac37d1d12f779d53367e4990aef64c3303266545f002bc3ed60f6dda,2024-08-15T13:11:59.413000
CVE-2024-7462,0,0,2cac77ec17ae20c4dc4e5d7bf53769fdd387d45adec5f3f229688e30e8ff78fc,2024-08-15T13:16:26.113000
CVE-2024-7463,0,0,638cc4f7f70495dee2d171348ad4cef985451fd3918228f4f52868fcb07733ed,2024-08-15T13:15:55.170000
CVE-2024-7464,0,0,139bb5dec916abceb981b7aebc3328ff09288b94e952f0c1eb1a4e05e89a7bfa,2024-08-15T13:15:28.367000
CVE-2024-7465,0,0,e4a77acfac37d1d12f779d53367e4990aef64c3303266545f002bc3ed60f6dda,2024-08-15T13:11:59.413000
CVE-2024-7466,0,0,4a7493679a7686875f96443bb29dcb52f0aca6db65eafd0ddf5cfb55fbb78713,2024-08-06T17:27:55.297000
CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b5639,2024-08-06T17:31:58.323000
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
@ -259937,10 +259946,10 @@ CVE-2024-7502,0,0,400715e8cd7f13a2a067bad8525237ee0b427d91f26288ec69911983b1e213
CVE-2024-7503,0,0,e784b3ab46a1e81c39e310fabae0c1eb2177c76661481ff0b29d2e5ba473397f,2024-08-12T13:41:36.517000
CVE-2024-7505,0,0,aecd8f77bf4729577cedcf26eddaf42651063906380e7519311f6a7e624532e3,2024-08-06T16:30:24.547000
CVE-2024-7506,0,0,83bf779e76b2f1cdbd01b68e2c6cb45ed4862a6d64f57c3f27fd8241cef70031,2024-08-06T16:30:24.547000
CVE-2024-7507,0,1,7516958446779a101827a9fd290cdb6c733b72b0427bb2888dd2b3a09e0ccfd2,2024-08-15T13:01:10.150000
CVE-2024-7507,0,0,7516958446779a101827a9fd290cdb6c733b72b0427bb2888dd2b3a09e0ccfd2,2024-08-15T13:01:10.150000
CVE-2024-7512,0,0,b63cf02b54f6a1c55700caf6b213a1220f80db8363689f29712535d27562382e,2024-08-12T13:41:36.517000
CVE-2024-7513,0,1,e7288ee9c1b72d0a4fe1140edf2cf41064546a13fddc0f9d6e58908f93e8b342,2024-08-15T13:01:10.150000
CVE-2024-7515,0,1,d2cf9fc86090e834de1b7a8b9924a3e4acb7ae490203dd64ba71e33843de016b,2024-08-15T13:01:10.150000
CVE-2024-7513,0,0,e7288ee9c1b72d0a4fe1140edf2cf41064546a13fddc0f9d6e58908f93e8b342,2024-08-15T13:01:10.150000
CVE-2024-7515,0,0,d2cf9fc86090e834de1b7a8b9924a3e4acb7ae490203dd64ba71e33843de016b,2024-08-15T13:01:10.150000
CVE-2024-7518,0,0,0273ca4eeb92697ec5dfc38e32e28b00efa9adf5d48621c9ed57564620a11777,2024-08-06T23:15:59.653000
CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20
CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000
@ -260003,9 +260012,9 @@ CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7
CVE-2024-7615,0,0,6c5a3d2b322898b551bada40c532b08076a3798009e747124e833bfdffe0bb9a,2024-08-12T13:41:36.517000
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
CVE-2024-7621,0,0,1acf6d4c2a821fce1e3f9264509576725bd5b71a2c3ef943afe6ab5d29351820,2024-08-12T13:41:36.517000
CVE-2024-7624,0,1,fe880bbf70f7d6e0e0d7959fc4667ae33cede9b405a9b87471b54fc1288842d6,2024-08-15T13:01:10.150000
CVE-2024-7625,0,1,f8c051bee159f37ecabf1edf8939b9aaaa1199377d2392fdca002a4a5223d380,2024-08-15T13:01:10.150000
CVE-2024-7628,0,1,3ea535a326d0197b5259672683acf97672f398fa364ea0c9846f4657432fb454,2024-08-15T13:01:10.150000
CVE-2024-7624,0,0,fe880bbf70f7d6e0e0d7959fc4667ae33cede9b405a9b87471b54fc1288842d6,2024-08-15T13:01:10.150000
CVE-2024-7625,0,0,f8c051bee159f37ecabf1edf8939b9aaaa1199377d2392fdca002a4a5223d380,2024-08-15T13:01:10.150000
CVE-2024-7628,0,0,3ea535a326d0197b5259672683acf97672f398fa364ea0c9846f4657432fb454,2024-08-15T13:01:10.150000
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
CVE-2024-7635,0,0,330e4c31af06e1fa39a084a042067cc2714cfc9a1302a27b2cb8b725b37ba5f4,2024-08-12T13:41:36.517000
CVE-2024-7636,0,0,c4f4b71cbb74b70101cbb74c711b9665ce07671c635fe9367b91f52e05f765d3,2024-08-12T13:41:36.517000
@ -260052,7 +260061,7 @@ CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b5
CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000
CVE-2024-7715,0,0,8fd48723a372436c32560fa2c7f60e4a655a01d974d6761ea5587918aaffe0b1,2024-08-14T21:15:17.320000
CVE-2024-7715,0,1,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000
CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000
CVE-2024-7731,0,0,cc7ade0dcc3d2cb1ff1cf78974d45c78ed00c279543f0c65387d34f0cb1eab8c,2024-08-14T13:00:37.107000
@ -260073,22 +260082,24 @@ CVE-2024-7752,0,0,73e4b629405febd909a20d2bdf05bd801ba948b04dee94f179170b3e935ffe
CVE-2024-7753,0,0,b0db6f3a14d1f7e0243db2086cbbc3f8d47517418efcb595a5b9d08613529d8e,2024-08-14T02:07:05.410000
CVE-2024-7754,0,0,cfa4970703cb089ea87b128d9ab797dcab545ca14743c8dcbadbff8f256ecc1b,2024-08-14T02:07:05.410000
CVE-2024-7790,0,0,995e22accad9ea677c3614d140f7dba69e4478a2921b11a76ef2d56b76f294d0,2024-08-14T17:49:14.177000
CVE-2024-7792,0,1,4a8c00c31db08f09baf6ed34c1b3ad3dae493e58a839f1a0126bae9e368c13ea,2024-08-15T13:01:10.150000
CVE-2024-7793,0,1,1f0938f35d4e1e27e7025be92cc91d543f53c450db227a4ef64d84646bb99c4b,2024-08-15T13:01:10.150000
CVE-2024-7794,0,1,6f3a8a08e9f61a0e7ffc01db42f62c87c58b44d0ab4239aff4c85f93a0e1b319,2024-08-15T13:01:10.150000
CVE-2024-7797,0,1,e81db4ef7da18ef45d1b5cd227ea6ed7c8a1cfc90bba7050edabf442fc2ddafc,2024-08-15T13:01:10.150000
CVE-2024-7798,0,1,b523ccda91c54e13c0e3719a111f6d5c1668d7248a513bee770cb78cfce439d2,2024-08-15T13:01:10.150000
CVE-2024-7799,0,1,bb0f3e65fc22e7956fa07aa27cb5f6fa6cc6cee4cec465ec9d0a0fcbce3d269b,2024-08-15T13:01:10.150000
CVE-2024-7800,0,1,d625b4d58fe73772a07815131cb3fbf3e97bffd1ca27993579233c951fb4dcfb,2024-08-15T13:01:10.150000
CVE-2024-7808,0,1,fa0a480985c4934803737fc40c57e849076368131bfbff09ddc334a37efcda92,2024-08-15T13:01:10.150000
CVE-2024-7809,0,1,ff36b17915dd1631b65674fd0e00724b10b0894fec6c62c95281d1c5d75264e9,2024-08-15T13:01:10.150000
CVE-2024-7810,0,1,392e668e89d495b6bdf6597a4d362c469e13069cb0d78e1957c34dceeb745bad,2024-08-15T13:01:10.150000
CVE-2024-7811,0,1,eb904307eba2fc1102d9324cefc63fe631672e44b86c85338b8d95e8fbd5faa0,2024-08-15T13:01:10.150000
CVE-2024-7812,0,1,a3986f3d0ea729b27440d86fddb3a732a73f5c5198d35b4f4bacbca1bacca3ee,2024-08-15T13:01:10.150000
CVE-2024-7813,0,1,953a25de285d44c4a971712737f1cc4009963bd327015e45e35f975addbe57d2,2024-08-15T13:01:10.150000
CVE-2024-7814,0,1,ff83e4fbbf4c876ed888c2f2666e7e83313eae76aaf20a7131ca66c74ac76422,2024-08-15T13:01:10.150000
CVE-2024-7815,0,1,13c82cc57f404c9d32b7bb30767131d4be6771d137706dc927f3ce9c3db1b281,2024-08-15T13:01:10.150000
CVE-2024-7828,1,1,c9aa1fe820074c1de5a697818041dda7c44348235ee25472acec728572bfee55,2024-08-15T13:33:37.047000
CVE-2024-7829,1,1,878c7f6f66b26b66b174d63cbe8def0e767862f24e6fcb8c92a836c6b091a2e8,2024-08-15T13:33:37.047000
CVE-2024-7830,1,1,f5b300e117f60478f18e2ba725c948108cebaa8d52844b24cad00a52caf896ae,2024-08-15T13:33:37.047000
CVE-2024-7831,1,1,e1c6ca38b2b70b83ba4044d3a6e779562a550061ac52551db9fc03b3da51afe2,2024-08-15T13:33:37.047000
CVE-2024-7792,0,0,4a8c00c31db08f09baf6ed34c1b3ad3dae493e58a839f1a0126bae9e368c13ea,2024-08-15T13:01:10.150000
CVE-2024-7793,0,0,1f0938f35d4e1e27e7025be92cc91d543f53c450db227a4ef64d84646bb99c4b,2024-08-15T13:01:10.150000
CVE-2024-7794,0,0,6f3a8a08e9f61a0e7ffc01db42f62c87c58b44d0ab4239aff4c85f93a0e1b319,2024-08-15T13:01:10.150000
CVE-2024-7797,0,0,e81db4ef7da18ef45d1b5cd227ea6ed7c8a1cfc90bba7050edabf442fc2ddafc,2024-08-15T13:01:10.150000
CVE-2024-7798,0,0,b523ccda91c54e13c0e3719a111f6d5c1668d7248a513bee770cb78cfce439d2,2024-08-15T13:01:10.150000
CVE-2024-7799,0,0,bb0f3e65fc22e7956fa07aa27cb5f6fa6cc6cee4cec465ec9d0a0fcbce3d269b,2024-08-15T13:01:10.150000
CVE-2024-7800,0,0,d625b4d58fe73772a07815131cb3fbf3e97bffd1ca27993579233c951fb4dcfb,2024-08-15T13:01:10.150000
CVE-2024-7808,0,0,fa0a480985c4934803737fc40c57e849076368131bfbff09ddc334a37efcda92,2024-08-15T13:01:10.150000
CVE-2024-7809,0,0,ff36b17915dd1631b65674fd0e00724b10b0894fec6c62c95281d1c5d75264e9,2024-08-15T13:01:10.150000
CVE-2024-7810,0,0,392e668e89d495b6bdf6597a4d362c469e13069cb0d78e1957c34dceeb745bad,2024-08-15T13:01:10.150000
CVE-2024-7811,0,0,eb904307eba2fc1102d9324cefc63fe631672e44b86c85338b8d95e8fbd5faa0,2024-08-15T13:01:10.150000
CVE-2024-7812,0,0,a3986f3d0ea729b27440d86fddb3a732a73f5c5198d35b4f4bacbca1bacca3ee,2024-08-15T13:01:10.150000
CVE-2024-7813,0,0,953a25de285d44c4a971712737f1cc4009963bd327015e45e35f975addbe57d2,2024-08-15T13:01:10.150000
CVE-2024-7814,0,0,ff83e4fbbf4c876ed888c2f2666e7e83313eae76aaf20a7131ca66c74ac76422,2024-08-15T13:01:10.150000
CVE-2024-7815,0,0,13c82cc57f404c9d32b7bb30767131d4be6771d137706dc927f3ce9c3db1b281,2024-08-15T13:01:10.150000
CVE-2024-7828,0,0,c9aa1fe820074c1de5a697818041dda7c44348235ee25472acec728572bfee55,2024-08-15T13:33:37.047000
CVE-2024-7829,0,1,5770f365a076f0accdd49fc395aceacc3d7e37f29f31a33c88a490ae2215ff45,2024-08-15T14:15:13.560000
CVE-2024-7830,0,1,09bf2efa57c08deecac5c8f70d836daf289b589bae48bb7e9a20c84698e5fffa,2024-08-15T15:15:25.340000
CVE-2024-7831,0,1,17b0b6c3d57879abf71f38d44669866ee80a59178d7b071aa3edd65998b13828,2024-08-15T15:15:25.947000
CVE-2024-7832,1,1,e5b3e136a62ba0d72936cf11873f8e282a81203098d2a4f7c5def63fbeb240a3,2024-08-15T14:15:14.210000
CVE-2024-7833,1,1,1328273c7443c3d89c66c2ced7ab889fa0872b017ee58c09b6bca7e3cc6c267a,2024-08-15T14:15:14.720000

Can't render this file because it is too large.