Auto-Update: 2024-08-21T22:00:17.601688+00:00

This commit is contained in:
cad-safe-bot 2024-08-21 22:03:14 +00:00
parent acc9a328aa
commit 534fdfba61
48 changed files with 1787 additions and 175 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29929",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:09.173",
"lastModified": "2024-08-21T18:15:09.173",
"lastModified": "2024-08-21T21:35:00.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Buffer Overflow vulnerability found in Kemptechnologies Loadmaster before v.7.2.60.0 allows a remote attacker to casue a denial of service via the libkemplink.so, isreverse library."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "http://kemptechnologies.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40107",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.197",
"lastModified": "2024-02-16T13:37:55.033",
"lastModified": "2024-08-21T21:35:01.720",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En ARTPWriter de ARTPWriter.cpp, existe un posible use after free debido a datos no inicializados. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/acb81624b4f50fed52cb1b3829809ee2f7377093",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44039",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T16:15:07.093",
"lastModified": "2024-04-03T17:24:18.150",
"lastModified": "2024-08-21T21:35:02.723",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En VeridiumID anterior a 3.5.0, la API WebAuthn permite que un atacante interno no autenticado (que puede pasar verificaciones de inscripci\u00f3n y puede registrar una clave FIDO) registre su autenticador FIDO en la cuenta de una v\u00edctima y, en consecuencia, se haga cargo de la cuenta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52892",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-27T22:15:10.277",
"lastModified": "2024-06-28T10:27:00.920",
"lastModified": "2024-08-21T20:35:00.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En phpseclib anterior a 1.0.22, 2.x anterior a 2.0.46 y 3.x anterior a 3.0.33, se permite incorrectamente que algunos caracteres en los campos Nombre alternativo del sujeto en los certificados TLS tengan un significado especial en expresiones regulares (como + comod\u00edn), lo que genera confusi\u00f3n de nombres en la verificaci\u00f3n del host de certificados X.509."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-436"
}
]
}
],
"references": [
{
"url": "https://github.com/phpseclib/phpseclib/commit/6cd6e8ceab9f2b55c8cd81d2192bf98cbeaf4627",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0023",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T20:15:47.767",
"lastModified": "2024-02-16T21:39:50.223",
"lastModified": "2024-08-21T20:35:01.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En ConvertRGBToPlanarYUV de Codec2BufferUtils.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0036",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.047",
"lastModified": "2024-02-16T13:37:51.433",
"lastModified": "2024-08-21T21:35:03.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En startNextMatchingActivity de ActivityTaskManagerService.java, existe una forma posible de evitar las restricciones para iniciar actividades desde segundo plano debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/3eaaa9687e90c65f51762deb343f18bef95d4e8e",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20417",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-21T20:15:08.533",
"lastModified": "2024-08-21T20:15:08.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the REST API of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct blind SQL injection attacks.\r\n\r\nThese vulnerabilities are due to insufficient validation of user-supplied input in REST API calls. An attacker could exploit these vulnerabilities by sending crafted input to an affected device. A successful exploit could allow the attacker to view or modify data on the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20466",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-21T20:15:08.737",
"lastModified": "2024-08-21T20:15:08.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device.\r\n\r\nThis vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-exp-vdF8Jbyk",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20486",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-21T20:15:08.933",
"lastModified": "2024-08-21T20:15:08.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-y4ZUz5Rj",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27138",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T16:15:45.983",
"lastModified": "2024-08-02T01:15:30.263",
"lastModified": "2024-08-21T21:35:04.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,30 @@
"value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Archiva. Apache Archiva tiene una configuraci\u00f3n para deshabilitar el registro de usuarios; sin embargo, esta restricci\u00f3n se puede evitar. Como Apache Archiva ha sido retirado, no esperamos lanzar una versi\u00f3n de Apache Archiva que solucione este problema. Se recomienda considerar la posibilidad de migrar a una soluci\u00f3n diferente o aislar su instancia de usuarios que no sean de confianza. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27474",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T15:16:04.867",
"lastModified": "2024-04-10T19:49:51.183",
"lastModified": "2024-08-21T21:35:05.010",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Leantime 3.0.6 es vulnerable a Cross-Site Request Forgery (CSRF). Esta vulnerabilidad permite a actores malintencionados realizar acciones no autorizadas en nombre de usuarios autenticados, espec\u00edficamente administradores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://drive.proton.me/urls/67VER05Z84#f0fXnmp8o6Y9",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28732",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T14:15:07.600",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-08-21T21:35:05.793",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en OFPMatch en parser.py en Faucet SDN Ryu versi\u00f3n 4.34, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) (bucle infinito)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30850",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T06:15:06.943",
"lastModified": "2024-04-12T12:43:46.210",
"lastModified": "2024-08-21T20:35:03.010",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en tiagorlampert CHAOS v5.0.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n BuildClient dentro de client_service.go"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32902",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-06-13T21:15:54.503",
"lastModified": "2024-07-16T14:57:42.527",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-21T21:35:06.743",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33227",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-22T16:15:10.403",
"lastModified": "2024-05-22T18:59:20.240",
"lastModified": "2024-08-21T21:35:06.933",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Un problema en el componente ddcdrv.sys de Nicomsoft WinI2C/DDC v3.7.4.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33227",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33673",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T02:15:06.790",
"lastModified": "2024-04-26T12:58:17.720",
"lastModified": "2024-08-21T21:35:07.123",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/support/en_US/security/VTS24-002#H2",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34502",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T19:15:07.197",
"lastModified": "2024-06-10T17:16:29.370",
"lastModified": "2024-08-21T20:35:03.920",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en WikibaseLexeme en MediaWiki antes de 1.39.6, 1.40.x antes de 1.40.2 y 1.41.x antes de 1.41.1. Cargando especial: MergeLexemes (intentar\u00e1) realizar una edici\u00f3n que combine el ID de origen con el ID de destino, incluso si la solicitud no fue una solicitud POST, e incluso si no contiene un token de edici\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3590",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-14T15:41:54.880",
"lastModified": "2024-05-14T16:11:39.510",
"lastModified": "2024-08-21T21:35:07.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento LetterPress WordPress hasta la versi\u00f3n 1.2.2 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF, como eliminar suscriptores arbitrarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40480",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.003",
"lastModified": "2024-08-15T13:47:50.450",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-21T21:35:08.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41630",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-31T19:15:12.390",
"lastModified": "2024-08-01T12:42:36.933",
"lastModified": "2024-08-21T21:35:09.060",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC18 V15.03.3.10_EN permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro ssid en ip/goform/fast_setting_wifi_set."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://palm-vertebra-fe9.notion.site/form_fast_setting_wifi_set-fd47294cf4bb460bb95f804d39e53f34",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42102",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:02.733",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-21T20:48:01.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,159 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"mm/writeback: corrige la posible divisi\u00f3n por cero en wb_dirty_limits(), nuevamente\" Patch series \"mm: evita posibles desbordamientos en la aceleraci\u00f3n sucia\". La l\u00f3gica de limitaci\u00f3n sucia supone que los l\u00edmites sucios en las unidades de p\u00e1ginas caben en 32 bits. Esta serie de parches garantiza que esto sea cierto (consulte el parche 2/2 para obtener m\u00e1s detalles). Este parche (de 2): esto revierte la confirmaci\u00f3n 9319b647902cbd5cc884ac08a8a6d54ce111fc78. El compromiso se rompe de varias maneras. En primer lugar, la conversi\u00f3n eliminada (u64) de la multiplicaci\u00f3n introducir\u00e1 un desbordamiento de multiplicaci\u00f3n en arcos de 32 bits si wb_thresh * bg_thresh >= 1<<32 (lo cual es realmente com\u00fan; la configuraci\u00f3n predeterminada con 4 GB de RAM activar\u00e1 esto). En segundo lugar, div64_u64() es innecesariamente caro en arcos de 32 bits. Tenemos div64_ul() en caso de que queramos ser seguros y econ\u00f3micos. En tercer lugar, si los umbrales sucios son mayores que 1<<32 p\u00e1ginas, entonces el equilibrio sucio explotar\u00e1 de muchas otras maneras espectaculares de todos modos, por lo que intentar solucionar un posible desbordamiento es discutible."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.307",
"versionEndExcluding": "4.19.318",
"matchCriteriaId": "AC87CBCC-3003-46A2-A52F-5CCE1E460E3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.269",
"versionEndExcluding": "5.4.280",
"matchCriteriaId": "293D6C3D-DC96-4828-BE63-8D51E25BE21C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.210",
"versionEndExcluding": "5.10.222",
"matchCriteriaId": "3D7FDA64-0DC4-4B41-B50A-574D2D1FA12D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.149",
"versionEndExcluding": "5.15.163",
"matchCriteriaId": "0720413E-F29A-4C0A-9B57-5158A778C4A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.79",
"versionEndExcluding": "6.1.98",
"matchCriteriaId": "56BF47BE-6357-4916-8FB6-5EB3BF21A96E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.18",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "B702CA29-94C0-4076-8DE7-5041233C96A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "5726EB4D-ED18-4DEC-B0C0-A525D33487E1"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42108",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:03.333",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-21T20:52:35.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: rswitch: Evite el use after free en rswitch_poll() El use after free est\u00e1 en realidad en rswitch_tx_free(), que est\u00e1 incluido en rswitch_poll(). Dado que `skb` y `gq->skbs[gq->dirty]` son de hecho el mismo puntero, el skb primero se libera usando dev_kfree_skb_any(), luego el valor en skb->len se usa para actualizar las estad\u00edsticas de la interfaz. Avancemos por las instrucciones para usar skb->len antes de liberar el skb. Este error es trivial de reproducir usando KFENCE. Activar\u00e1 un sonido cada pocos paquetes. Una simple solicitud ARP o una solicitud de eco ICMP es suficiente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "5726EB4D-ED18-4DEC-B0C0-A525D33487E1"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a0c28efeec6383ef22e97437616b920e7320b67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42604",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T15:15:21.940",
"lastModified": "2024-08-21T13:12:50.820",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-21T20:35:05.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42777",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:09.930",
"lastModified": "2024-08-21T18:15:09.930",
"lastModified": "2024-08-21T21:35:09.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An Unrestricted file upload vulnerability was found in \"/music/ajax.php?action=signup\" of Kashipara Music Management System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20SignUp.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42786",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:10.783",
"lastModified": "2024-08-21T18:15:10.783",
"lastModified": "2024-08-21T21:35:10.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A SQL injection vulnerability in \"/music/view_user.php\" in Kashipara Music Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"id\" parameter of View User Profile Page."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Profile.pdf",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-6386",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-21T21:15:08.577",
"lastModified": "2024-08-21T21:15:08.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/",
"source": "security@wordfence.com"
},
{
"url": "https://wpml.org/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7fc91cc-e529-4362-8269-bf7ee0766e1e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7964",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:08.850",
"lastModified": "2024-08-21T21:15:08.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Passwords in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/358296941",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7965",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:08.947",
"lastModified": "2024-08-21T21:15:08.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/356196918",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7966",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.000",
"lastModified": "2024-08-21T21:15:09.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/355465305",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7967",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.060",
"lastModified": "2024-08-21T21:15:09.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/355731798",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7968",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.133",
"lastModified": "2024-08-21T21:15:09.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/349253666",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7969",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.203",
"lastModified": "2024-08-21T21:15:09.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/351865302",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7971",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.277",
"lastModified": "2024-08-21T21:15:09.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/360700873",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7972",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.353",
"lastModified": "2024-08-21T21:15:09.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/345960102",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7973",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.407",
"lastModified": "2024-08-21T21:15:09.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. (Chromium security severity: Medium)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/345518608",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7974",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.480",
"lastModified": "2024-08-21T21:15:09.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/339141099",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7975",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.533",
"lastModified": "2024-08-21T21:15:09.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Permissions in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/347588491",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7976",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.583",
"lastModified": "2024-08-21T21:15:09.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in FedCM in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/339654392",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7977",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.630",
"lastModified": "2024-08-21T21:15:09.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/324770940",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7978",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.697",
"lastModified": "2024-08-21T21:15:09.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient policy enforcement in Data Transfer in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40060358",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7979",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.747",
"lastModified": "2024-08-21T21:15:09.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/356064205",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7980",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.793",
"lastModified": "2024-08-21T21:15:09.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/356328460",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-7981",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.843",
"lastModified": "2024-08-21T21:15:09.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Views in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40067456",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-8033",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.897",
"lastModified": "2024-08-21T21:15:09.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in WebApp Installs in Google Chrome on Windows prior to 128.0.6613.84 allowed an attacker who convinced a user to install a malicious application to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/350256139",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-8034",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.957",
"lastModified": "2024-08-21T21:15:09.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/353858776",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-8035",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:10.010",
"lastModified": "2024-08-21T21:15:10.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Extensions in Google Chrome on Windows prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40059470",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-21T20:00:17.982029+00:00
2024-08-21T22:00:17.601688+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-21T19:35:22.120000+00:00
2024-08-21T21:35:10.637000+00:00
```
### Last Data Feed Release
@ -33,57 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260836
260860
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `24`
- [CVE-2023-29929](CVE-2023/CVE-2023-299xx/CVE-2023-29929.json) (`2024-08-21T18:15:09.173`)
- [CVE-2024-20488](CVE-2024/CVE-2024-204xx/CVE-2024-20488.json) (`2024-08-21T19:15:13.163`)
- [CVE-2024-41572](CVE-2024/CVE-2024-415xx/CVE-2024-41572.json) (`2024-08-21T19:15:13.380`)
- [CVE-2024-42777](CVE-2024/CVE-2024-427xx/CVE-2024-42777.json) (`2024-08-21T18:15:09.930`)
- [CVE-2024-42778](CVE-2024/CVE-2024-427xx/CVE-2024-42778.json) (`2024-08-21T18:15:10.003`)
- [CVE-2024-42779](CVE-2024/CVE-2024-427xx/CVE-2024-42779.json) (`2024-08-21T18:15:10.073`)
- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-21T18:15:10.150`)
- [CVE-2024-42781](CVE-2024/CVE-2024-427xx/CVE-2024-42781.json) (`2024-08-21T18:15:10.227`)
- [CVE-2024-42782](CVE-2024/CVE-2024-427xx/CVE-2024-42782.json) (`2024-08-21T18:15:10.303`)
- [CVE-2024-42783](CVE-2024/CVE-2024-427xx/CVE-2024-42783.json) (`2024-08-21T18:15:10.453`)
- [CVE-2024-42784](CVE-2024/CVE-2024-427xx/CVE-2024-42784.json) (`2024-08-21T18:15:10.630`)
- [CVE-2024-42785](CVE-2024/CVE-2024-427xx/CVE-2024-42785.json) (`2024-08-21T18:15:10.707`)
- [CVE-2024-42786](CVE-2024/CVE-2024-427xx/CVE-2024-42786.json) (`2024-08-21T18:15:10.783`)
- [CVE-2024-20417](CVE-2024/CVE-2024-204xx/CVE-2024-20417.json) (`2024-08-21T20:15:08.533`)
- [CVE-2024-20466](CVE-2024/CVE-2024-204xx/CVE-2024-20466.json) (`2024-08-21T20:15:08.737`)
- [CVE-2024-20486](CVE-2024/CVE-2024-204xx/CVE-2024-20486.json) (`2024-08-21T20:15:08.933`)
- [CVE-2024-6386](CVE-2024/CVE-2024-63xx/CVE-2024-6386.json) (`2024-08-21T21:15:08.577`)
- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-21T21:15:08.850`)
- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-21T21:15:08.947`)
- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-21T21:15:09.000`)
- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-21T21:15:09.060`)
- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-21T21:15:09.133`)
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-21T21:15:09.203`)
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-21T21:15:09.277`)
- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-21T21:15:09.353`)
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-21T21:15:09.407`)
- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-21T21:15:09.480`)
- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-21T21:15:09.533`)
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-21T21:15:09.583`)
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-21T21:15:09.630`)
- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-21T21:15:09.697`)
- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-21T21:15:09.747`)
- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-21T21:15:09.793`)
- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-21T21:15:09.843`)
- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-21T21:15:09.897`)
- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-21T21:15:09.957`)
- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-21T21:15:10.010`)
### CVEs modified in the last Commit
Recently modified CVEs: `45`
Recently modified CVEs: `22`
- [CVE-2024-40129](CVE-2024/CVE-2024-401xx/CVE-2024-40129.json) (`2024-08-21T18:59:09.703`)
- [CVE-2024-40130](CVE-2024/CVE-2024-401xx/CVE-2024-40130.json) (`2024-08-21T19:00:56.183`)
- [CVE-2024-40393](CVE-2024/CVE-2024-403xx/CVE-2024-40393.json) (`2024-08-21T18:13:42.670`)
- [CVE-2024-40892](CVE-2024/CVE-2024-408xx/CVE-2024-40892.json) (`2024-08-21T18:15:09.710`)
- [CVE-2024-40893](CVE-2024/CVE-2024-408xx/CVE-2024-40893.json) (`2024-08-21T18:15:09.803`)
- [CVE-2024-41052](CVE-2024/CVE-2024-410xx/CVE-2024-41052.json) (`2024-08-21T19:27:26.227`)
- [CVE-2024-41053](CVE-2024/CVE-2024-410xx/CVE-2024-41053.json) (`2024-08-21T19:21:41.530`)
- [CVE-2024-41058](CVE-2024/CVE-2024-410xx/CVE-2024-41058.json) (`2024-08-21T19:35:22.120`)
- [CVE-2024-41061](CVE-2024/CVE-2024-410xx/CVE-2024-41061.json) (`2024-08-21T19:34:12.550`)
- [CVE-2024-41332](CVE-2024/CVE-2024-413xx/CVE-2024-41332.json) (`2024-08-21T18:53:15.927`)
- [CVE-2024-42579](CVE-2024/CVE-2024-425xx/CVE-2024-42579.json) (`2024-08-21T18:35:08.200`)
- [CVE-2024-42608](CVE-2024/CVE-2024-426xx/CVE-2024-42608.json) (`2024-08-21T18:35:08.967`)
- [CVE-2024-43022](CVE-2024/CVE-2024-430xx/CVE-2024-43022.json) (`2024-08-21T18:35:09.733`)
- [CVE-2024-6728](CVE-2024/CVE-2024-67xx/CVE-2024-6728.json) (`2024-08-21T18:08:50.630`)
- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-21T18:07:04.263`)
- [CVE-2024-6736](CVE-2024/CVE-2024-67xx/CVE-2024-6736.json) (`2024-08-21T18:14:15.270`)
- [CVE-2024-7613](CVE-2024/CVE-2024-76xx/CVE-2024-7613.json) (`2024-08-21T18:47:11.523`)
- [CVE-2024-7614](CVE-2024/CVE-2024-76xx/CVE-2024-7614.json) (`2024-08-21T18:48:47.273`)
- [CVE-2024-7615](CVE-2024/CVE-2024-76xx/CVE-2024-7615.json) (`2024-08-21T18:48:19.590`)
- [CVE-2024-7740](CVE-2024/CVE-2024-77xx/CVE-2024-7740.json) (`2024-08-21T19:06:30.707`)
- [CVE-2024-7741](CVE-2024/CVE-2024-77xx/CVE-2024-7741.json) (`2024-08-21T19:07:40.757`)
- [CVE-2024-7742](CVE-2024/CVE-2024-77xx/CVE-2024-7742.json) (`2024-08-21T19:08:47.707`)
- [CVE-2024-7743](CVE-2024/CVE-2024-77xx/CVE-2024-7743.json) (`2024-08-21T19:15:54.553`)
- [CVE-2024-7909](CVE-2024/CVE-2024-79xx/CVE-2024-7909.json) (`2024-08-21T19:15:13.487`)
- [CVE-2024-7949](CVE-2024/CVE-2024-79xx/CVE-2024-7949.json) (`2024-08-21T19:15:13.600`)
- [CVE-2023-29929](CVE-2023/CVE-2023-299xx/CVE-2023-29929.json) (`2024-08-21T21:35:00.720`)
- [CVE-2023-40107](CVE-2023/CVE-2023-401xx/CVE-2023-40107.json) (`2024-08-21T21:35:01.720`)
- [CVE-2023-44039](CVE-2023/CVE-2023-440xx/CVE-2023-44039.json) (`2024-08-21T21:35:02.723`)
- [CVE-2023-52892](CVE-2023/CVE-2023-528xx/CVE-2023-52892.json) (`2024-08-21T20:35:00.760`)
- [CVE-2024-0023](CVE-2024/CVE-2024-00xx/CVE-2024-0023.json) (`2024-08-21T20:35:01.700`)
- [CVE-2024-0036](CVE-2024/CVE-2024-00xx/CVE-2024-0036.json) (`2024-08-21T21:35:03.820`)
- [CVE-2024-27138](CVE-2024/CVE-2024-271xx/CVE-2024-27138.json) (`2024-08-21T21:35:04.820`)
- [CVE-2024-27474](CVE-2024/CVE-2024-274xx/CVE-2024-27474.json) (`2024-08-21T21:35:05.010`)
- [CVE-2024-28732](CVE-2024/CVE-2024-287xx/CVE-2024-28732.json) (`2024-08-21T21:35:05.793`)
- [CVE-2024-30850](CVE-2024/CVE-2024-308xx/CVE-2024-30850.json) (`2024-08-21T20:35:03.010`)
- [CVE-2024-32902](CVE-2024/CVE-2024-329xx/CVE-2024-32902.json) (`2024-08-21T21:35:06.743`)
- [CVE-2024-33227](CVE-2024/CVE-2024-332xx/CVE-2024-33227.json) (`2024-08-21T21:35:06.933`)
- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2024-08-21T21:35:07.123`)
- [CVE-2024-34502](CVE-2024/CVE-2024-345xx/CVE-2024-34502.json) (`2024-08-21T20:35:03.920`)
- [CVE-2024-3590](CVE-2024/CVE-2024-35xx/CVE-2024-3590.json) (`2024-08-21T21:35:07.913`)
- [CVE-2024-40480](CVE-2024/CVE-2024-404xx/CVE-2024-40480.json) (`2024-08-21T21:35:08.270`)
- [CVE-2024-41630](CVE-2024/CVE-2024-416xx/CVE-2024-41630.json) (`2024-08-21T21:35:09.060`)
- [CVE-2024-42102](CVE-2024/CVE-2024-421xx/CVE-2024-42102.json) (`2024-08-21T20:48:01.940`)
- [CVE-2024-42108](CVE-2024/CVE-2024-421xx/CVE-2024-42108.json) (`2024-08-21T20:52:35.470`)
- [CVE-2024-42604](CVE-2024/CVE-2024-426xx/CVE-2024-42604.json) (`2024-08-21T20:35:05.780`)
- [CVE-2024-42777](CVE-2024/CVE-2024-427xx/CVE-2024-42777.json) (`2024-08-21T21:35:09.833`)
- [CVE-2024-42786](CVE-2024/CVE-2024-427xx/CVE-2024-42786.json) (`2024-08-21T21:35:10.637`)
## Download and Usage

View File

@ -194326,7 +194326,7 @@ CVE-2022-25372,0,0,3afa1032089f61dab3ed154ec03c4c15430a85ef0fc2ac9ae598d4da295d4
CVE-2022-25373,0,0,f3e06aa4cff9c34576c6046792debbf2f880be30c925fe1331c49304d5fd986a,2022-10-07T14:32:48.513000
CVE-2022-25374,0,0,6361adb85d05647b7d10fddecc8e6abc57890f3c4e6fc867653c899551a3768c,2022-08-11T00:25:29.163000
CVE-2022-25375,0,0,f752fdbcccd8ef08cc85b01b5b98d61bc041d81886db14771b5b5984b1a22193,2023-08-08T14:22:24.967000
CVE-2022-25377,0,1,5a781ee5ee6569da0f6eb99b1ffe7b1c3b435e485786b08464508b20b3ae3679,2024-08-21T18:35:00.673000
CVE-2022-25377,0,0,5a781ee5ee6569da0f6eb99b1ffe7b1c3b435e485786b08464508b20b3ae3679,2024-08-21T18:35:00.673000
CVE-2022-2538,0,0,0c12e0f7f9e555340f2f1680d793cf15cc2ee18610a68b91e429f7afca6d5cc6,2022-09-01T06:46:34.243000
CVE-2022-25389,0,0,d42a88a505fd5a7f62a0db54409eb4f5239b80d1324b54d52ca5d77173b51b75,2022-03-26T03:53:33.087000
CVE-2022-2539,0,0,b629d5a5a8c182ad3c6108ecb09d08a47ec4b1ba159188994bd9b96ee182df9c,2023-08-08T14:22:24.967000
@ -211638,7 +211638,7 @@ CVE-2022-47937,0,0,636176527665617f3facff8634e8954d2158730f82a85997de2b9511eefce
CVE-2022-47938,0,0,442c25e602433938a9921e75f8e951b83ddd7027b36d46a901abb14bb5ea6d5b,2023-01-23T18:55:50.117000
CVE-2022-47939,0,0,9ba60aa5756ff0c30fab8973f90a56883f8c984d8e5f8b0a23e7965824254a07,2023-05-16T11:03:04.080000
CVE-2022-4794,0,0,a3ec06697be5e9ca32fca3c53d1678a7b25f03dbc9d92c6511a0fa363fa8a372,2023-11-07T03:58:57.833000
CVE-2022-47940,0,1,229b78739a766eecb17608ddcb4dc360032312abbc5dc36114ca260a76aba0fd,2024-08-21T18:19:29.143000
CVE-2022-47940,0,0,229b78739a766eecb17608ddcb4dc360032312abbc5dc36114ca260a76aba0fd,2024-08-21T18:19:29.143000
CVE-2022-47941,0,0,a960c5c6b7478a38352797f8671155edce8fe893cef852bd8ab843d248171789,2023-05-16T11:03:07.537000
CVE-2022-47942,0,0,29eecf09da3516358fd7280399596a1d1954d9a61b850522c2552abd8ebaaa2c,2023-05-16T11:03:10.667000
CVE-2022-47943,0,0,4e1e7ead652d3a42100c80f087bde274ea4b62e5ad6d277d6672d96ed7d8563e,2023-05-16T11:03:14.360000
@ -212275,12 +212275,12 @@ CVE-2022-48775,0,0,2acb46b961b5a6a98400ee899a0271b90d0006fde257656a51a219503be9e
CVE-2022-48776,0,0,893198e6ce5b87d6fcbfe9bc4c8bb366e00f9c75f1eab9b7f2694e999d3ee514,2024-07-16T13:43:58.773000
CVE-2022-48777,0,0,830cdb53c9b73e969d2dc50a8fae272c4cde81d156eacd00732a3b9bd6316f81,2024-08-21T17:52:44.367000
CVE-2022-48778,0,0,cf80129bac53c697067af006cd31eeb61d796e99bba997a50ccafd500fb3fa60,2024-08-21T17:59:05.793000
CVE-2022-48779,0,1,12c7c14756703808df47072b1211231bfd942ce7126ba4f8493f4852c1585db9,2024-08-21T18:00:53.417000
CVE-2022-48779,0,0,12c7c14756703808df47072b1211231bfd942ce7126ba4f8493f4852c1585db9,2024-08-21T18:00:53.417000
CVE-2022-4878,0,0,fb05127321f1dbc90cfbd12f64590320f5f815bf94532155a8a99445e7198622,2024-05-17T02:17:00.683000
CVE-2022-48780,0,0,b117f40454daee066e1fc26a32af7cc957d4703e741175087709e91e884ce0cf,2024-07-16T13:43:58.773000
CVE-2022-48781,0,1,73b1a0e4e12eaa999501e6fe9340fcf850bd0f95f1f33b67bb67fb3428e49c9b,2024-08-21T18:01:51.267000
CVE-2022-48782,0,1,83e23cc6024fc3aa2a6c1e6bc030287e0e4a269359df30c12b90d0e0f29d0b01,2024-08-21T18:02:33.843000
CVE-2022-48783,0,1,98b96c894064ae5b14616312ff7bad26f9c609e777ddd1d154850db58db33bbd,2024-08-21T18:03:24.540000
CVE-2022-48781,0,0,73b1a0e4e12eaa999501e6fe9340fcf850bd0f95f1f33b67bb67fb3428e49c9b,2024-08-21T18:01:51.267000
CVE-2022-48782,0,0,83e23cc6024fc3aa2a6c1e6bc030287e0e4a269359df30c12b90d0e0f29d0b01,2024-08-21T18:02:33.843000
CVE-2022-48783,0,0,98b96c894064ae5b14616312ff7bad26f9c609e777ddd1d154850db58db33bbd,2024-08-21T18:03:24.540000
CVE-2022-48784,0,0,5258aaafda307edeed3c9a3b307ec01e840379f7f29969631856afc65e4f5dbc,2024-07-16T13:43:58.773000
CVE-2022-48785,0,0,0adcbd4fa3a41d134b7ab19221818594e5ed82b16ebc039c296bffa582d73508,2024-07-16T13:43:58.773000
CVE-2022-48786,0,0,7d7c573b97f8855425dfbc3317804fd84cd7695d623ea48985f5896e1607970b,2024-07-16T13:43:58.773000
@ -212299,7 +212299,7 @@ CVE-2022-48797,0,0,fcc023da4e4ebc8d61e2d441a12dbd9491041100b065e9fa0f2767a71d864
CVE-2022-48798,0,0,d1152ada4c21c5b163c0d3e9731d5a9f61bf5130232a6f0fb85b6a8d67afc41b,2024-07-16T13:43:58.773000
CVE-2022-48799,0,0,ca82b2a4ed9342b37b95b87fe963d9358abb6b9b25c6c909bb1a6783d9900299,2024-07-16T13:43:58.773000
CVE-2022-4880,0,0,4ba00f45fa60e84e17646df0b31022c326d2de77554d7c7bed348aaf66eba2e8,2024-05-17T02:17:00.927000
CVE-2022-48800,0,1,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764443,2024-08-21T18:04:42.103000
CVE-2022-48800,0,0,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764443,2024-08-21T18:04:42.103000
CVE-2022-48801,0,0,6653f1f5cf0e260b8c6a7c11277b02305adc16a1936040a89c4ab1b97527a852,2024-07-16T13:43:58.773000
CVE-2022-48802,0,0,9a5cfaff9acf94bf883296dd5ba65bc3c4b5cb5bacd82a666569b25935f67533,2024-07-16T13:43:58.773000
CVE-2022-48803,0,0,b4abff8be2e0f42801670ccff819cb36f420c74818031cf95a4f7137a7cf8225,2024-07-16T13:43:58.773000
@ -213625,7 +213625,7 @@ CVE-2023-1190,0,0,e31de81f7acd3a9a3daf93bd4e7617fb352f13f737cbfe3f936e1529f250e8
CVE-2023-1191,0,0,63ef8c869750311a99b3704a8c3cdcb68365330502998f1f566afcf1e31d7b4d,2024-05-17T02:17:53.347000
CVE-2023-1192,0,0,dc0548ad6de408a7d5be2fffbdbcf4aebb63044fe81a7e86f3034a7170d73ac2,2024-03-07T17:15:09.620000
CVE-2023-1193,0,0,7bd37bcdebf587c410b4cda3afd616c7e6d50171d9d012d1f3bffb9b8827db09,2023-11-09T15:13:51.737000
CVE-2023-1194,0,1,0e0deb4c27aa6a24aa17cf117ca9e4e1f4848b1203b782ca35f1deb2e3ae9cb3,2024-08-21T18:20:30.137000
CVE-2023-1194,0,0,0e0deb4c27aa6a24aa17cf117ca9e4e1f4848b1203b782ca35f1deb2e3ae9cb3,2024-08-21T18:20:30.137000
CVE-2023-1195,0,0,a6e9afb70b2b4637ca87741d57b4478bb172b65a3d019182df690af84bac9529,2023-05-26T18:27:29.387000
CVE-2023-1196,0,0,3b78ce5b21fe15fac3a0849f302e5d9d359e6cc2fff7986ef1f5d62bd790bd32,2023-11-07T04:02:50.747000
CVE-2023-1197,0,0,95adf7f63914afb96db7936aec3afe63bb42aee3fe13d0ab63112aa1aad7da8b,2023-03-11T03:30:53.137000
@ -222525,7 +222525,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db
CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000
CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000
CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000
CVE-2023-29929,1,1,ba752222632cdb8d13b351c9bce670a2fd57c75847ff6c6144d5c674fdf31bfb,2024-08-21T18:15:09.173000
CVE-2023-29929,0,1,f70a215d27bea3d12f26bb11ed5a9d139a1bdaa94206399b5049f7eb74d20b38,2024-08-21T21:35:00.720000
CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000
CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000
CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000
@ -224156,9 +224156,9 @@ CVE-2023-32245,0,0,b006dcad499643997f59b967ed8620eb8689245fc3a80c90f10d9e156aee4
CVE-2023-32247,0,0,6ed61dedd90284bab675cfd007656c22e76a5281d18c8e0b6ae0d0c320230d6f,2023-12-04T14:55:19.007000
CVE-2023-32248,0,0,a5d678c7b7103547aa2939c989f1036addae6cfeaed1fc01872c0756f6eccb2d,2023-12-04T14:54:50.907000
CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ece2,2023-11-07T04:18:15.240000
CVE-2023-32250,0,1,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000
CVE-2023-32250,0,0,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000
CVE-2023-32252,0,0,d58cdd6d41b61e01636cbce96c5c95617a1fb413e4534a05ad59e2763a4df396,2023-12-04T14:53:38.480000
CVE-2023-32254,0,1,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000
CVE-2023-32254,0,0,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000
CVE-2023-32257,0,0,e863f95271bbd102a1dbc5990b29c3c9bedfb59faca99d10f3fe80d80959dfb3,2023-12-22T17:06:02.047000
CVE-2023-32258,0,0,1b7d9e9ed9a24d4763f3dd34c86ff525f58eabf344847aa293dd4e794e241b4a,2023-11-17T18:29:58.827000
CVE-2023-32259,0,0,63d94242b8b0d4e358593674a90324955b50adf4e3d50cf943b4320e76d2c808,2024-03-19T16:33:58.680000
@ -229444,7 +229444,7 @@ CVE-2023-39187,0,0,1e2f733c364a0a935eea976f809c932a5620ee577865f260905a21785deeb
CVE-2023-39188,0,0,1dbe43eb2ae9b7e031bfedfe5eabb7f022b67670006ce52b6150a1df4bea9a6e,2023-08-10T15:29:47.423000
CVE-2023-39189,0,0,49d56177e5708f7f33ecf8ec1adabceb1b19cbdf48fe7ad376718f05cd14641a,2024-05-22T17:16:03.030000
CVE-2023-39190,0,0,873a8a713e33526ba780ab65f9b512961ce53d2b57a22906d0fe6e897429416f,2023-11-07T04:17:27.090000
CVE-2023-39191,0,1,6a4baa34024e89c4461316ec374ac75a258ce9aa13502df00389ca7d217f014e,2024-08-21T18:16:34.433000
CVE-2023-39191,0,0,6a4baa34024e89c4461316ec374ac75a258ce9aa13502df00389ca7d217f014e,2024-08-21T18:16:34.433000
CVE-2023-39192,0,0,a6fe9cdcd9d48f80b49bf3c89938353607cdae62056604114c8179f6c266befe,2024-05-22T17:16:03.250000
CVE-2023-39193,0,0,3ad8b95389e83b92a344cb4402538f60b8731f4ce39ac2e8734cb37a8afd18cb,2024-05-22T17:16:03.400000
CVE-2023-39194,0,0,2030f9410aac6066f150fa3941eec569327600cbe4908600bc63b6e2de0988f7,2024-05-22T17:16:03.547000
@ -230149,7 +230149,7 @@ CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000
CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000
CVE-2023-40107,0,0,66f62207d9e25b242ec6da7f35b2ef9ecf0f1e96681d1510eaef351f3c32142f,2024-02-16T13:37:55.033000
CVE-2023-40107,0,1,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000
CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000
CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000
@ -233023,7 +233023,7 @@ CVE-2023-44025,0,0,3828a36a55dc18732bf3aa8fafcd2642ac7e9e5d7d7309e7e47431663f218
CVE-2023-44031,0,0,bbca3cb963fcc5a93d66669e3242ef0586a8aa94486fc6b302474de164e4c665,2024-02-13T00:57:11.897000
CVE-2023-44037,0,0,bb097c15786910ef054939c26d8760affedd479bc34d93408cef6bf30ca0e248,2023-10-19T17:41:28.530000
CVE-2023-44038,0,0,0d2a697aa6bc99f909dfbf81fa90d2283e93bbc1d49c1a74925567d1b1527ce6,2024-04-03T17:24:18.150000
CVE-2023-44039,0,0,f1a449f6e0a516168f601cdef321ba87aa0a7bfc0d9f1434c032e838ae343c8c,2024-04-03T17:24:18.150000
CVE-2023-44039,0,1,590991cce8499111971bee245da4448afb145205c08f7a5aabba8a3a351fa0da,2024-08-21T21:35:02.723000
CVE-2023-4404,0,0,9c13e997f8a0e200af0b7a4b5f083873718159a7818d27bb1b8c22e6294445f8,2023-11-07T04:22:31.870000
CVE-2023-44040,0,0,d8d6d700e1c01853dafe1c8d53a5c4388e0d545913e2bedde199d66a7d141cba,2024-04-03T17:24:18.150000
CVE-2023-44042,0,0,1dbfafd11cb24b979a12e87249829a85f1f497a13885e6ef23047c64ad0a4240,2023-09-28T15:48:44.617000
@ -239244,7 +239244,7 @@ CVE-2023-52889,0,0,ad1cde02a64052b28564d8e8a7e2af925007327c5229809929326bf9b8081
CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000
CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000
CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000
CVE-2023-52892,0,0,32d862a219e297bef87d6af26c1c79f877a4570bd3376c8ef713855d979da993,2024-06-28T10:27:00.920000
CVE-2023-52892,0,1,e76a088ce4e19742d870b8476c614d46bee6f2abd88542d335617b1f2fbef53f,2024-08-21T20:35:00.760000
CVE-2023-52893,0,0,f90ef0c635dc5e96ae72022334213ea95dcab5dbd307cb21411266f0404ac61c,2024-08-21T12:30:33.697000
CVE-2023-52894,0,0,2e1a1b33551b46a32f161e1e0895eb9b4109ca7bc25f7f829bb0be0a183d33af,2024-08-21T12:30:33.697000
CVE-2023-52895,0,0,cdfca4de01d01d96f66c1e396dc4f20d4c8ed5ab2a7bd7e0c026a8f8a9b624e7,2024-08-21T12:30:33.697000
@ -241048,7 +241048,7 @@ CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10
CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000
CVE-2024-0021,0,0,48878e30e65ca9b7752f91ec634b409988ea482f472219ebf9713d370864d726,2024-02-16T21:39:50.223000
CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000
CVE-2024-0023,0,0,91670c2de393b4df4a82610047e68fa9b86a2aa6f6cccd122d84d8ca2ad9f4e0,2024-02-16T21:39:50.223000
CVE-2024-0023,0,1,0ae19107c0f009088c14cc9607c2fcb734bab1e5ea02d37a78e27ee1213b97f1,2024-08-21T20:35:01.700000
CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000
CVE-2024-0025,0,0,d28de8c9f19ab5ba79d0474f043c936cf414f4247e50396a672a60bd3b9be766,2024-08-01T20:35:09.143000
CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000
@ -241060,7 +241060,7 @@ CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf8
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000
CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000
CVE-2024-0036,0,0,d9c0b6734c282a6d9728365410b8e629548c8409828f413d80063f93ca75f370,2024-02-16T13:37:51.433000
CVE-2024-0036,0,1,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
CVE-2024-0038,0,0,ea347078d5115696feec8ec271b749eacff96a2d3bca9777e248043aee98fcbc,2024-02-16T13:37:51.433000
CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000
@ -242923,7 +242923,7 @@ CVE-2024-2008,0,0,9a3dfffdf84cbaecec5e4ac83fc5a2438eae99d0d114b1045bad131ec57012
CVE-2024-20080,0,0,90f248eed6a75fce7971996f28983ff9968e454d013e84d03f8b65c25bdd5601,2024-08-01T13:46:18.790000
CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000
CVE-2024-20082,0,0,56503a8297b29c06a4779b6ce0cb09b68c0c4128ced5292c021ec15204e93c22,2024-08-14T15:35:04.003000
CVE-2024-20083,0,1,d9b832ff5357fbfb0bb330afe0c52fd472ba2f26e66518e0a2caf3dcf4f28daf,2024-08-21T18:35:02.057000
CVE-2024-20083,0,0,d9b832ff5357fbfb0bb330afe0c52fd472ba2f26e66518e0a2caf3dcf4f28daf,2024-08-21T18:35:02.057000
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
@ -243057,6 +243057,7 @@ CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,1,1,ba169affbe1bdc00af793894dff8ba9b795f436c902800d99a04a917c6c411f0,2024-08-21T20:15:08.533000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
@ -243069,10 +243070,12 @@ CVE-2024-20450,0,0,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35
CVE-2024-20451,0,0,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000
CVE-2024-20454,0,0,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6ed1,2024-08-07T19:09:46.290000
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
CVE-2024-20466,1,1,d3065529fa1e4984466291d549a3655bef083d9f50fb7a2f9dae3b83194028a0,2024-08-21T20:15:08.737000
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
CVE-2024-20479,0,0,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
CVE-2024-20488,1,1,191a528b2731fcf6221ed8ee98d54e34833f14ec3a1b6a134d9d25daacb35ac0,2024-08-21T19:15:13.163000
CVE-2024-20486,1,1,20653804a6b54c970eb135ea2d1dc617dfa52ca1163291c5a6fc4b0a09ac00ca,2024-08-21T20:15:08.933000
CVE-2024-20488,0,0,191a528b2731fcf6221ed8ee98d54e34833f14ec3a1b6a134d9d25daacb35ac0,2024-08-21T19:15:13.163000
CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
@ -245678,7 +245681,7 @@ CVE-2024-24199,0,0,7ba43404c5022da254878ea129b205d46b0f249a8f3526c8415be3cc2a20e
CVE-2024-2420,0,0,13b83832dbf3c227f1bb0a786d7224f8bb2d919ddb4e3730a2d048cbbb3f3674,2024-05-30T18:18:58.870000
CVE-2024-24202,0,0,668325610a66240d6d1186abf034222333d655c33a74fab67ccef821464427c8,2024-08-19T20:35:04.473000
CVE-2024-2421,0,0,d6a9f4a7ca738e43373fd351f7d51d46e3ad2798d84cdbebb07a7724c675a343,2024-05-30T18:18:58.870000
CVE-2024-24213,0,1,287278b021309aa035f3a4bd904869bf5f79125ed1840b3f7786eee9a7e710d4,2024-08-21T18:06:24.633000
CVE-2024-24213,0,0,287278b021309aa035f3a4bd904869bf5f79125ed1840b3f7786eee9a7e710d4,2024-08-21T18:06:24.633000
CVE-2024-24215,0,0,85b457ffd0214deceb92715f93f3b98e9ac0926a8e517f205498cdcd7f026571,2024-02-15T18:08:47.813000
CVE-2024-24216,0,0,cc96bdba0be53e21ec4f72b549cd1780854565b7b4a6c5081be7a211ccd03725,2024-02-08T13:44:21.670000
CVE-2024-2422,0,0,3cd5f28c31482f281d8aa1c4c5b76e9420ca9d6bd73cdb7ceb049f2a4aab7203,2024-05-30T18:18:58.870000
@ -247792,7 +247795,7 @@ CVE-2024-27132,0,0,c5cfdc93a4a30eb4ada1b68dc89dd72224529d7dc99c692ce9a1a016e1ab5
CVE-2024-27133,0,0,6574fdde089b4683da8bd06069d4a01e27d182b9361898f9a2a8686337a251e3,2024-02-26T13:42:22.567000
CVE-2024-27135,0,0,8f681cbd0423d5edcf1af419653a19c055e013668588c5e21fc1acd9f7af97d0,2024-05-01T17:15:30.087000
CVE-2024-27136,0,0,95371c097b782a9c3eb2e668bc7e52a3add3a0ca964de3d4fb22468a7d6fe516,2024-06-24T12:57:36.513000
CVE-2024-27138,0,0,e480229f5f3f97ad39b85546ab08384a6eb2e8b6119adfe2872a8053ae1f5d28,2024-08-02T01:15:30.263000
CVE-2024-27138,0,1,1f057fc4a86e32fdd3cbe80da63722cbc73089ddadbb43b1562d5d847b0f5599,2024-08-21T21:35:04.820000
CVE-2024-27139,0,0,5ffd1b44abbd3dc84ccc8dc40302ee472c30e7eda7536bd71d562f3fb40cf709,2024-08-02T01:15:30.347000
CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000
CVE-2024-27140,0,0,792f5350d961d2c57a4d83059389a2799aafa0cb7b0a5d870e522f2e29bff45e,2024-08-05T21:15:38.120000
@ -248105,7 +248108,7 @@ CVE-2024-27460,0,0,8683af8a542feb170a538bcba55c469e083f9924ef0c1691a92718c202474
CVE-2024-27461,0,0,aa8cd584bdc5b8b3d078d3166544e96e10118040c10a5b885de911ca69058c38,2024-08-14T17:49:14.177000
CVE-2024-27462,0,0,2177b080bf16597b1d3af90d404590cae7bb441b9367c276a25f840d3e6c7f9f,2024-04-14T23:15:45.830000
CVE-2024-2747,0,0,5387110be360e1fd36f0342bcd8dd7e83bfa4eabd929725feec9963b35cc169c,2024-06-13T18:36:09.010000
CVE-2024-27474,0,0,3f0932161a77385f85ec7fc0004a8008398981e7f75c919376f930b5622a4131,2024-04-10T19:49:51.183000
CVE-2024-27474,0,1,4a390a0a495b528719cdfad3c5cdbeeb4b25b7052e56b9b2bf54d8bb9762dcc1,2024-08-21T21:35:05.010000
CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
@ -248854,13 +248857,13 @@ CVE-2024-2872,0,0,e60d6692ffdbbc7dca47dd221e29fe124966b59c3165de45eca31ca595a9df
CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000
CVE-2024-28725,0,0,76f38f123d93dc5a87b1081a9a46cc5a546425e009751f0bb38d077b83255a95,2024-08-01T13:49:14.173000
CVE-2024-2873,0,0,ed9040959ed5f40d916defffcff03f64da72505082c3b91fe33a6506c19636e1,2024-03-26T12:55:05.010000
CVE-2024-28732,0,0,9851816f66d45de8afdad8c9816c7a6b7919c6a4b7292add9b2b3b84fff0f7f0,2024-04-08T18:48:40.217000
CVE-2024-28732,0,1,4d9b8e2fd2ba72cc6df49c8f091f8b99ef2fc40022314c635b2f93676e7b2d75,2024-08-21T21:35:05.793000
CVE-2024-28734,0,0,1c14934084e1e00ba63d896d0125baa20ca223930e97186ab2fc273c15799ec8,2024-07-03T01:51:48.533000
CVE-2024-28735,0,0,004afab27d51efc6ac1b999df3e4f3751a9bc81de88a92938e218f69e07ed59d,2024-08-01T13:49:15.007000
CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000
CVE-2024-28739,0,0,36caa1134a8a7b2783edbb7df33b4da4cf1e215d5eea570ae15bc02fd363246e,2024-08-12T18:18:17.717000
CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000
CVE-2024-28740,0,1,5f70f267e5a95ad5a027628a10c98f8169f84e918b27fa20ab04ed5ecaa1e182,2024-08-21T18:35:02.877000
CVE-2024-28740,0,0,5f70f267e5a95ad5a027628a10c98f8169f84e918b27fa20ab04ed5ecaa1e182,2024-08-21T18:35:02.877000
CVE-2024-28741,0,0,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000
CVE-2024-28744,0,0,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000
CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000
@ -250391,7 +250394,7 @@ CVE-2024-30845,0,0,bd254f7d322b717fb5f477bd2a6072b935bc9b8c30db157f273a719062c17
CVE-2024-30848,0,0,e520fc03d7d120883158934b80667a2b4d6398e475b39bea0f39a4affc9e9f6e,2024-08-01T13:50:28.210000
CVE-2024-30849,0,0,4b2a4ccd593d26ef45288147032dbc711b9bbef7de8ea7827855efca75655daa,2024-08-01T13:50:28.983000
CVE-2024-3085,0,0,509209dfddf53f9b46075ed419de44cbb1f67edbb1a1b964fb67c8391adf6753,2024-05-17T02:39:42.607000
CVE-2024-30850,0,0,38a1756acc49f668f5841f513a1e63d34dbb4cec7b0eff4d2738aec5335923b1,2024-04-12T12:43:46.210000
CVE-2024-30850,0,1,c1ef257dd5e33e880b36cd35ccee098b89832c161bbe3dd2489cb767eeacade1,2024-08-21T20:35:03.010000
CVE-2024-30851,0,0,50f4be60cfd340e55ad1701da02739f1151719e7af37a9957f274744dd91c34b,2024-05-06T12:44:56.377000
CVE-2024-30858,0,0,93e0a53927efd0637571ec0f8079f664a09ad42dbc1f395dcf941f97a4b21575,2024-08-01T13:50:29.850000
CVE-2024-30859,0,0,cb3a05b13bb3d557f99196539489ef40266ca1d1884c327caec647dd84413ea6,2024-08-16T19:35:10.010000
@ -251835,7 +251838,7 @@ CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6
CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000
CVE-2024-32900,0,0,f4a32c220f617bf5506c14a7483b88c719a703371f248ae870ea7d83b0dd7ef8,2024-08-19T14:35:07.680000
CVE-2024-32901,0,0,0396668e4055b6cf30063754945d8be1d532a6ec0e47e38129ed67921f73e173,2024-08-15T15:35:09.947000
CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a2bf,2024-07-16T14:57:42.527000
CVE-2024-32902,0,1,1db1dac10406af96e5c81e43197c12ae1faf99567fcddfd4acdc8793b6ac4309,2024-08-21T21:35:06.743000
CVE-2024-32903,0,0,3ad2528ab2612529b9c0754d4af9e267ab72c067c205eb196588acd915ae500e,2024-08-20T18:35:03.550000
CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000
CVE-2024-32905,0,0,4460b80af340c6f668b7232b3aebc59e6f35de40c0e49ba7c976380d5f0f46f5,2024-08-01T13:51:38.530000
@ -252016,7 +252019,7 @@ CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4
CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000
CVE-2024-33227,0,0,28dd1771db477989c0572e57f26fd3346bd032b5331c9baa2149840f310b32df,2024-05-22T18:59:20.240000
CVE-2024-33227,0,1,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000
@ -252293,7 +252296,7 @@ CVE-2024-3367,0,0,31f1b96caacdf32cb07b44d556d68ab31ddfc6550ca25d8ad2ff89de82dc4e
CVE-2024-33670,0,0,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000
CVE-2024-33671,0,0,5feca8f352d561cdd0e0c6bac5759d95e299a4747d95bc22a8db29940e7c5bd1,2024-04-26T12:58:17.720000
CVE-2024-33672,0,0,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000
CVE-2024-33673,0,0,c202ae3644283126f759ef95c90b7314f4bf4bd803caec90e15330e8a963b545,2024-04-26T12:58:17.720000
CVE-2024-33673,0,1,2e121fa93cd95e243645b6330a6810a785d78928d9f086479dd41d632f236bd8,2024-08-21T21:35:07.123000
CVE-2024-33677,0,0,c3a699c048bec4cee3b4b765cde86a17d71ee190ed8c41ad782a7d14e4a12a52,2024-04-26T12:58:17.720000
CVE-2024-33678,0,0,b380961e2903f7d33552d9997a2a3576aac4c1bd21221a008232a5149dc12f5f,2024-04-26T12:58:17.720000
CVE-2024-33679,0,0,2119127df34c1b1778920d4e6065d4ed740b3c90a6263470bb3216974f628ba9,2024-06-05T17:15:13.407000
@ -252853,7 +252856,7 @@ CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16a
CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000
CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000
CVE-2024-34473,0,0,43374aed676f28dde9bbbef2a52ca305b9ed3cc132864c1fcb62c3381af2a62a,2024-05-06T12:44:56.377000
CVE-2024-34474,0,1,6e1deb46e9a08c506cb3ac842207bea635d1ff5b91cd6c8644c3d105a2f41019,2024-08-21T18:35:04
CVE-2024-34474,0,0,6e1deb46e9a08c506cb3ac842207bea635d1ff5b91cd6c8644c3d105a2f41019,2024-08-21T18:35:04
CVE-2024-34475,0,0,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522386,2024-07-03T02:00:14.950000
CVE-2024-34476,0,0,0e840da90ac72a5275cc1cab81863ba6c9d8f821141193be8bf66abb3acfdeaf,2024-08-01T13:52:23.687000
CVE-2024-34477,0,0,5d1de91fef7cafecd3b029f0bcee8de7cabdae801a9f3bc40e1b3eaf6a48cb39,2024-06-07T14:15:10.293000
@ -252870,7 +252873,7 @@ CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e5
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
CVE-2024-34500,0,0,ac0f11e606e3a2f4fa3a35277b66fd154ed807cd910549607f9e78f6d7afdfa3,2024-06-10T17:16:29.303000
CVE-2024-34502,0,0,f647808a1829f668ec011d91757a55b92eb3b1e32252e5bb388ffa596c83b5c3,2024-06-10T17:16:29.370000
CVE-2024-34502,0,1,ff8021fe77a80f8fce883984eb2b34368073d3f3b28ee0c6d7be9cabaf01d43f,2024-08-21T20:35:03.920000
CVE-2024-34506,0,0,91884f62e0a07e36490be7a849db3addb4a9338b84975e418e0914a4f89aa554,2024-07-03T02:00:21.367000
CVE-2024-34507,0,0,218d2664de9ad27dc44233beca69cace0ca437014bd07ff163e57c33e50085bd,2024-07-03T02:00:22.533000
CVE-2024-34508,0,0,5e2673a670e4b77b4a9c2499c88b60b0bcbf7731c3422764416c91ccda5ee532,2024-06-28T19:15:05.557000
@ -253426,7 +253429,7 @@ CVE-2024-35429,0,0,330b233a9d961e5ab60bb84ab073545ccf41085088e749b133fee4692c3b4
CVE-2024-3543,0,0,14aebe52440b6c29accdfa7acf400fe951e7d7441b56210ed47a5a2c1e52128f,2024-05-02T18:00:37.360000
CVE-2024-35430,0,0,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9db6,2024-07-03T02:01:45.150000
CVE-2024-35431,0,0,0a35dffe7e6c93066fa509053c839d3a8bc16edf2b77120799090f4882a8d3ea,2024-08-01T13:52:41.087000
CVE-2024-35432,0,1,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000
CVE-2024-35432,0,0,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000
CVE-2024-35433,0,0,0b3687e6d05fd0aabce2f6753ab48622a6daecb670483272307382dbb941306d,2024-05-30T18:18:58.870000
CVE-2024-35434,0,0,55e035c2a162134710b80f5640b923747de7468a0790da753e41ecb6e33217f6,2024-05-29T19:50:25.303000
CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000
@ -253785,7 +253788,7 @@ CVE-2024-35896,0,0,38740fa9e0e28c1998375bca10b45aa3bea5349d16d5bb779072be0a08a5e
CVE-2024-35897,0,0,93dd335f3c661b184a9126ceda6682793e22f6e45c2ebebcb998960eb0c68b3e,2024-06-25T22:15:32.503000
CVE-2024-35898,0,0,f2046edcf7a6f808589e35b06e7686f88f49d32de2ed71667b4d90ced64d89c8,2024-06-27T12:15:26.020000
CVE-2024-35899,0,0,4dbe75b47a1246880346d207e2caf3bd12899b72a9fbfa1f3838858346681f0f,2024-07-03T02:02:23.870000
CVE-2024-3590,0,0,0b94fa675ea98f8403de77b9a76eee251df4aab7724ab3840b246b050afcd80f,2024-05-14T16:11:39.510000
CVE-2024-3590,0,1,ecd599d2024811d7e4dba1970704a54055fa584cc9df087a6b1053a3f8a6a0dd,2024-08-21T21:35:07.913000
CVE-2024-35900,0,0,209f03e2c7f8a26f9615592392c404b536c539af27e1d45bce559140a2f91b57,2024-06-25T22:15:32.823000
CVE-2024-35901,0,0,46a8946b537056fbdf89b6c0c01774a7932e4c39290c8079b2a807551fced0eb,2024-05-20T13:00:04.957000
CVE-2024-35902,0,0,a500266164e7c77ccc8a48349779198ba10d1f10a0a7ef418ed4a8f27509ee82,2024-06-27T12:15:26.087000
@ -254000,7 +254003,7 @@ CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5
CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000
CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000
CVE-2024-36130,0,0,4671d62b05ac637a601468320fbde1254b9e1ab2c793e3e63f9ae03e57d902ad,2024-08-12T18:52:50.947000
CVE-2024-36131,0,1,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000
CVE-2024-36131,0,0,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000
CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000
CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000
CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000
@ -255850,8 +255853,8 @@ CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758
CVE-2024-39010,0,0,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000
CVE-2024-39011,0,0,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000
CVE-2024-39012,0,0,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000
CVE-2024-39013,0,1,88397ac64721f404ef835e429cd6b6ea19d04c3211d855c608a964fcc32dacb0,2024-08-21T18:35:06.380000
CVE-2024-39014,0,1,e328d9a926890a5b4f53069f32eed15f888241e4388cf64d2236a02398c4c2dc,2024-08-21T18:35:07.170000
CVE-2024-39013,0,0,88397ac64721f404ef835e429cd6b6ea19d04c3211d855c608a964fcc32dacb0,2024-08-21T18:35:06.380000
CVE-2024-39014,0,0,e328d9a926890a5b4f53069f32eed15f888241e4388cf64d2236a02398c4c2dc,2024-08-21T18:35:07.170000
CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000
CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000
CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000
@ -255865,7 +255868,7 @@ CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59de
CVE-2024-39028,0,0,9687db509e67ca899b7283535a6c24eebf7f6784e1a1f28baae3172078bffed5,2024-08-01T13:55:19.873000
CVE-2024-3903,0,0,1173acb865ab00a4b856055c98dd70060d7f57d01c944a25db26e0ac92cb735f,2024-08-01T13:56:45.143000
CVE-2024-39031,0,0,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000
CVE-2024-39036,0,1,1815c46fdce9cf5d7067d9b211491bb0c920c7748005faa34854c855193cbfe8,2024-08-21T18:57:12.603000
CVE-2024-39036,0,0,1815c46fdce9cf5d7067d9b211491bb0c920c7748005faa34854c855193cbfe8,2024-08-21T18:57:12.603000
CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000
CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000
CVE-2024-3906,0,0,a3b427119bdbbda357983f8fdd52a145484ad89b344f08b8387b1c5f33e2d6f6,2024-06-04T19:20:26.463000
@ -256439,9 +256442,9 @@ CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
CVE-2024-40129,0,1,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
CVE-2024-40130,0,1,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
CVE-2024-40137,0,0,4158bade34f096859f58d84cfe190a8d5559ddcf08eebfd1ce97260b054d79c0,2024-08-01T13:57:00.547000
CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000
CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000
@ -256476,7 +256479,7 @@ CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489f
CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000
CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000
CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000
CVE-2024-40393,0,1,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000
@ -256510,7 +256513,7 @@ CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244
CVE-2024-40477,0,0,6cb0cc10c37b24482c4bb193827b5d7d3a2113c4464b073473336af2956aa387,2024-08-13T01:13:46.877000
CVE-2024-40478,0,0,17b98c2a8ea50e8a90d83e222f7ae8a097b82de7508a46519094d9be0f6fe775,2024-08-12T13:41:36.517000
CVE-2024-40479,0,0,c5bec1df57db16e609d1623e6517bb40c5b937de6b2390aae79ad47c0b80430a,2024-08-13T01:13:47.860000
CVE-2024-40480,0,0,8a5587d0c52b3e2bab6e37cd2c4376f46191977b095b6fb4b6027fa3bdca9dcc,2024-08-15T13:47:50.450000
CVE-2024-40480,0,1,e7a951452f0ffeb9495f3973bc193ff807eb0f9c1dd8fd2ead8c62923fcd7549,2024-08-21T21:35:08.270000
CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000
CVE-2024-40482,0,0,77b0e0d738c085be01901fe452456d9f6f2c227935acf82b80697b6be23d963f,2024-08-13T01:13:50.130000
CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000
@ -256711,8 +256714,8 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
CVE-2024-40892,0,1,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
CVE-2024-40893,0,1,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
@ -256882,17 +256885,17 @@ CVE-2024-41049,0,0,92c1bb7b998a305af611ea0fb8cec280acf0ca6290c6083ab04ddb40be141
CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000
CVE-2024-41050,0,0,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1681,2024-07-29T16:21:52.517000
CVE-2024-41051,0,0,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000
CVE-2024-41052,0,1,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000
CVE-2024-41053,0,1,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000
CVE-2024-41052,0,0,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000
CVE-2024-41053,0,0,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000
CVE-2024-41054,0,0,54d000610420765de59a42fcd6b0218f3e2dc53e9697b03d4c5cf83c4402e430,2024-07-29T16:21:52.517000
CVE-2024-41055,0,0,499100fd75a0a01af0a661e5f3f470cfc510510f055a9070bfb5cea9bafe2b0b,2024-07-29T16:21:52.517000
CVE-2024-41056,0,0,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000
CVE-2024-41057,0,0,99f60754c1ef6e2aef87de980618623143e6219cad98680847261d6cd9f33181,2024-07-29T16:21:52.517000
CVE-2024-41058,0,1,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000
CVE-2024-41058,0,0,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000
CVE-2024-41059,0,0,a3e848e0f22cf6429fd584bc8b1d0becbc43af3e8de05f6d70f42a052cdb4353,2024-07-29T16:21:52.517000
CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000
CVE-2024-41060,0,0,ec0fe6e11350c37a45a30d3a61b44ae7110f7091e533c89a2e06068486abe2d7,2024-07-29T16:21:52.517000
CVE-2024-41061,0,1,36d616e9bc36920a3c33a3b1c2ebff74d68391a8728cb87e68a5c76d7b4ef06e,2024-08-21T19:34:12.550000
CVE-2024-41061,0,0,36d616e9bc36920a3c33a3b1c2ebff74d68391a8728cb87e68a5c76d7b4ef06e,2024-08-21T19:34:12.550000
CVE-2024-41062,0,0,fbf24b9fd211a6aa96a9c57e6e5ee51eed4d30e0f0990ba1f54a615f2caf60dd,2024-07-29T16:21:52.517000
CVE-2024-41063,0,0,e4ddf8fb0026c8f28f6d7d93c6ba6f6b51f6cf05a4df4cf405d518f420d57bca,2024-07-29T16:21:52.517000
CVE-2024-41064,0,0,38bd2f5b07078a53c43ab68cf08b88abdd1fbf1876fcfc6333b8f4086de00926,2024-07-29T16:21:52.517000
@ -257030,7 +257033,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9
CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000
CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
CVE-2024-41332,0,1,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000
@ -257090,7 +257093,7 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
CVE-2024-41572,1,1,f415a06f9331f0092b607416c405edebe23a7ef92516bc8339bdf48ae35e5ad4,2024-08-21T19:15:13.380000
CVE-2024-41572,0,0,f415a06f9331f0092b607416c405edebe23a7ef92516bc8339bdf48ae35e5ad4,2024-08-21T19:15:13.380000
CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
@ -257112,7 +257115,7 @@ CVE-2024-41623,0,0,a9ebe8f50cad28f049bc48127c9cd7648861ed6c75cbd2c9dddecb0df4275
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
CVE-2024-41630,0,0,1f68238b8090ad7d80fcdde7844c7b581ff0ac481c35df52ee6c6fce21a269d8,2024-08-01T12:42:36.933000
CVE-2024-41630,0,1,e548dfebacddac9001ef8ea716c134ba37f5b617a7452dc32ae593b8c4a0bcf0,2024-08-21T21:35:09.060000
CVE-2024-41631,0,0,64089e0a0fdbef62a9df919d7f8440afb5a1d3b3a0dc3fcc6c457b7b45e40639,2024-08-01T13:59:00.513000
CVE-2024-41637,0,0,55c2ebf6d4e1b5a52e76380fb54fc17a20ca604f4f925dc181c059611f7f9e00,2024-08-01T13:59:00.710000
CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000
@ -257395,13 +257398,13 @@ CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b0
CVE-2024-4210,0,0,3de0526bc7ee4d2ee3e85387e784b47b575c14d9043bdb29c130980f21c212c3,2024-08-08T13:04:18.753000
CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000
CVE-2024-42101,0,0,a43b8a223f1ffc3fdbab7ceec1d85321f13ef67abc72e8df2d3881226ed3c5c7,2024-07-30T13:32:45.943000
CVE-2024-42102,0,0,c0abd8510596319502db15bc3b069d82cca2de50b634d2f59f6ce82e03010599,2024-07-30T13:32:45.943000
CVE-2024-42102,0,1,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000
CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000
CVE-2024-42104,0,0,afcbe4f1517f0991a2f8be927dec0a5aee82a58d76a6b63d0d1ad5734deb68fb,2024-07-30T13:32:45.943000
CVE-2024-42105,0,0,602b7eceacc9e23748db5c2c201abe70f13508a1dc06a4238bfa6a02e44d1d34,2024-07-30T13:32:45.943000
CVE-2024-42106,0,0,d1be86d3a499fcbbd48fa48666a765f712be1dd5a6b971ade33744c711a65cf7,2024-07-30T13:32:45.943000
CVE-2024-42107,0,0,6491957e69d9efbbc6993b086ea49c99500b6fccef3248643b058f90720776c1,2024-07-30T13:32:45.943000
CVE-2024-42108,0,0,31b235bd396c4d2f15a3ef348c75f98d88384bfab92490615536848031e2452c,2024-07-30T13:32:45.943000
CVE-2024-42108,0,1,07a55e64558b7f3e959e84e219b350a11c328136e4e4f1bc5343262d1bc114f5,2024-08-21T20:52:35.470000
CVE-2024-42109,0,0,73f90676ff123a528c581779716841725a0b8ad686ebe44e00d09c690aa44455,2024-07-30T13:32:45.943000
CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d076657e7,2024-07-30T13:32:45.943000
CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000
@ -257717,7 +257720,7 @@ CVE-2024-42575,0,0,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e71
CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000
CVE-2024-42577,0,0,90aae1e6030150c8a860d623cdf957a84ff52b3a936bb9734a4fd516a3527414,2024-08-21T14:35:12.110000
CVE-2024-42578,0,0,e49e6d1eec15d8971d4646a9d9f4fa585ff2792aff3d9892d55116d7caa208d1,2024-08-20T15:44:20.567000
CVE-2024-42579,0,1,c99a5f9acecd1dfba8e26c5185f2a559c0ce5eb71a2cce527f62a9e51b0ebb06,2024-08-21T18:35:08.200000
CVE-2024-42579,0,0,c99a5f9acecd1dfba8e26c5185f2a559c0ce5eb71a2cce527f62a9e51b0ebb06,2024-08-21T18:35:08.200000
CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000
CVE-2024-42580,0,0,2990563b67d4dc92b3ce407afe260e1a67fac4a4f00be92eeacf912a244c329a,2024-08-21T13:39:07.857000
CVE-2024-42581,0,0,c905d276d2309271a54559459476e6aa55a4022f51585f282439786c09ceb2ed,2024-08-21T13:38:50.380000
@ -257729,11 +257732,11 @@ CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd4
CVE-2024-42598,0,0,f84068afa431dac666314c81a0e0ae65b2644ef29efa564d1b4da4b712849c95,2024-08-21T12:30:33.697000
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
CVE-2024-42604,0,0,c728aa7d1997da2891fdaf68c4e186010a0ab578e913f3d19b193328f99c33c2,2024-08-21T13:12:50.820000
CVE-2024-42604,0,1,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
CVE-2024-42605,0,0,3d7b70705f0c340fd9e9ac2feaeb7c16213ffec0f6a7c6374438550a8c1d62c6,2024-08-21T13:12:40.957000
CVE-2024-42606,0,0,e46323a2b9a85aad3954a3b27bc1e8c958b659372d991d6df8f73aab5c26bf01,2024-08-21T13:12:27.070000
CVE-2024-42607,0,0,b5b5d184fb29386f840a66de2587a7be0c2df56835ad775e585769a324e9820a,2024-08-21T13:12:16.913000
CVE-2024-42608,0,1,2812a36dacc1d1d37dd871ef3cf52b053de223536dfa32113940a363ab5fab6d,2024-08-21T18:35:08.967000
CVE-2024-42608,0,0,2812a36dacc1d1d37dd871ef3cf52b053de223536dfa32113940a363ab5fab6d,2024-08-21T18:35:08.967000
CVE-2024-42609,0,0,f63b45fca798ad24817857f390287beb793195563f037ecfcae8997c9ecfddec,2024-08-21T13:12:03.427000
CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000
CVE-2024-42610,0,0,9ff653a6a99494fed368590a85a46ec66dee52a770d3e028c312550d378eb0f9,2024-08-21T13:11:37.863000
@ -257799,16 +257802,16 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
CVE-2024-42777,1,1,f19d6b5356800377bd1539cbfc14b31e97ff797f3033dec3f5badbe693daa64b,2024-08-21T18:15:09.930000
CVE-2024-42778,1,1,7dcf72b1dfb9bfe76b9d141481aefdee385b5bba55e20eb1891204c415ab8ed8,2024-08-21T18:15:10.003000
CVE-2024-42779,1,1,c0b1fae1eef405e09938d56473acce09c74e979e86c711ae564c2b9c6f4326a9,2024-08-21T18:15:10.073000
CVE-2024-42780,1,1,ffa79341d136a2fe32f61e2177f7968cc6085bf9af8cfac4879351d5892dcdc5,2024-08-21T18:15:10.150000
CVE-2024-42781,1,1,1ac0c9af5612cbf5d1260f940e4e4e708d6e06d10e1d2878a91835e815cfc7a5,2024-08-21T18:15:10.227000
CVE-2024-42782,1,1,ba055618f34155af28e55c7c75210e6ecb3f8ef361bccfbb9e575dcc4777a07e,2024-08-21T18:15:10.303000
CVE-2024-42783,1,1,acd091b1f1c030b017eaf01a7cbf618eca139ba4341ff9f3ecab6d10eba3f509,2024-08-21T18:15:10.453000
CVE-2024-42784,1,1,044452a33f637cb7d87ad5995060fe9ceade24692dbdf884a0a102e4b5d407f2,2024-08-21T18:15:10.630000
CVE-2024-42785,1,1,552938865a02839d30ef320418a9071e80c7ca9bef81bef108e7cfdd75a7de36,2024-08-21T18:15:10.707000
CVE-2024-42786,1,1,67be097c4312e65e740419ccf899e94bbb8bf27af0aa8beb26b760fd35d4a25f,2024-08-21T18:15:10.783000
CVE-2024-42777,0,1,601937d41df30c05fa0d87ca76aaaf5c2da7d99d475dc58fa1c53bc531c413b2,2024-08-21T21:35:09.833000
CVE-2024-42778,0,0,7dcf72b1dfb9bfe76b9d141481aefdee385b5bba55e20eb1891204c415ab8ed8,2024-08-21T18:15:10.003000
CVE-2024-42779,0,0,c0b1fae1eef405e09938d56473acce09c74e979e86c711ae564c2b9c6f4326a9,2024-08-21T18:15:10.073000
CVE-2024-42780,0,0,ffa79341d136a2fe32f61e2177f7968cc6085bf9af8cfac4879351d5892dcdc5,2024-08-21T18:15:10.150000
CVE-2024-42781,0,0,1ac0c9af5612cbf5d1260f940e4e4e708d6e06d10e1d2878a91835e815cfc7a5,2024-08-21T18:15:10.227000
CVE-2024-42782,0,0,ba055618f34155af28e55c7c75210e6ecb3f8ef361bccfbb9e575dcc4777a07e,2024-08-21T18:15:10.303000
CVE-2024-42783,0,0,acd091b1f1c030b017eaf01a7cbf618eca139ba4341ff9f3ecab6d10eba3f509,2024-08-21T18:15:10.453000
CVE-2024-42784,0,0,044452a33f637cb7d87ad5995060fe9ceade24692dbdf884a0a102e4b5d407f2,2024-08-21T18:15:10.630000
CVE-2024-42785,0,0,552938865a02839d30ef320418a9071e80c7ca9bef81bef108e7cfdd75a7de36,2024-08-21T18:15:10.707000
CVE-2024-42786,0,1,348f38439c7eccea8f4c8f85e3cc1b1a41f79120150e99336aba447190a494f7,2024-08-21T21:35:10.637000
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
@ -257878,7 +257881,7 @@ CVE-2024-43009,0,0,468db8caeabef579a226d8a65490e413d586c09d4e7e764fb4b818b81835a
CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000
CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe1759157a,2024-08-19T14:35:10.893000
CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000
CVE-2024-43022,0,1,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
@ -259876,6 +259879,7 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
CVE-2024-6386,1,1,560a15d3e4b6bd546e22b46d37a950f994931af46e63848e3eb4ce3e463ac328,2024-08-21T21:15:08.577000
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
@ -260099,15 +260103,15 @@ CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f2
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
CVE-2024-6728,0,1,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000
CVE-2024-6729,0,1,3c39f156d8f05be16bae3b2d5d19dbd9e5e58833dbb3cc98b9943490250aa643,2024-08-21T18:07:04.263000
CVE-2024-6728,0,0,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000
CVE-2024-6729,0,0,3c39f156d8f05be16bae3b2d5d19dbd9e5e58833dbb3cc98b9943490250aa643,2024-08-21T18:07:04.263000
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
CVE-2024-6731,0,0,c1f0bd3c11a2c8c6e666a080ff8caef145c9222128333d693bdc36ce4aafa4b2,2024-08-19T13:27:46.773000
CVE-2024-6732,0,0,4b564e3077773ce9465e3e7f1c3de207d911b9bdb780e0e7ab4cd3d37dda245b,2024-08-19T13:30:45.700000
CVE-2024-6733,0,0,2c6af872f9b8e7fd5b566f1882ba0aab1c7fe087e89241fd4a5514342919d09e,2024-08-21T17:00:32.243000
CVE-2024-6734,0,0,99b6c404dde349127fbc4e3a9bddf4648a2734ed6897dbd445a2358ddaf7af89,2024-08-21T17:00:52.007000
CVE-2024-6735,0,0,9ef87cfa7be3ed557a324eb8235c9371d645f72e1b23bc285d329ecd8e5d2258,2024-08-21T17:01:02.657000
CVE-2024-6736,0,1,2d663f35896bd1420a8935dfae2be163d45d490f852b5406a36a1a062262f9a2,2024-08-21T18:14:15.270000
CVE-2024-6736,0,0,2d663f35896bd1420a8935dfae2be163d45d490f852b5406a36a1a062262f9a2,2024-08-21T18:14:15.270000
CVE-2024-6737,0,0,8702e57b452a150308d6299787708abc780fef0e416c70970908b3d0d87bc73f,2024-07-16T14:06:09.530000
CVE-2024-6738,0,0,3a61a9d0dff57bd9a24abf3ccb065f63726018d20fe8e9197bc7bc11863de922,2024-07-16T14:06:27.810000
CVE-2024-6739,0,0,ff130f606a3e8a51263eb79c0c10405a59fd6ec00a9a26fc959f88e93b41ffd0,2024-07-16T18:02:40.327000
@ -260648,9 +260652,9 @@ CVE-2024-7602,0,0,681670da0d5ea368276c458bfd335dc84142a379f35cd9d1072e79c0c0968d
CVE-2024-7603,0,0,ee75ca73d9ff000a521d60dd2bd96d940a61dcfaa024b75a8d0f0f33bb52d71c,2024-08-21T17:25:08.560000
CVE-2024-7604,0,0,58eb9c041603c3622120dc34dbfc5b0275d32c68e3480a84279fede21b10ec78,2024-08-21T17:24:59.627000
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
CVE-2024-7613,0,1,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
CVE-2024-7614,0,1,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
CVE-2024-7615,0,1,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000
@ -260722,10 +260726,10 @@ CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d
CVE-2024-7733,0,0,bb60f9c1721a7d7267312f0897dbc581707f825a01d4c52185c190045c2c2268,2024-08-14T02:07:05.410000
CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000
CVE-2024-7739,0,0,48d24e6c734bdd0aabede58961a2ddba8bd9566478ef049fa21ee7be6d7677d2,2024-08-14T02:07:05.410000
CVE-2024-7740,0,1,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
CVE-2024-7741,0,1,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
CVE-2024-7742,0,1,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
CVE-2024-7743,0,1,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
CVE-2024-7746,0,0,57c293bd84bcc81db971f993e54710083e23fbaa2d9a714afae737b9c1e2cedc,2024-08-13T17:11:53.553000
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
@ -260795,7 +260799,7 @@ CVE-2024-7905,0,0,21f9c7e0a38dacbbd12a6dfd1c594b7e02a0285538c8d01b6b02b4c01004d2
CVE-2024-7906,0,0,5925ebd1a52432bd63b3f19ac1ead0d4887664fec659899d48bbaa77d66a321d,2024-08-19T12:59:59.177000
CVE-2024-7907,0,0,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000
CVE-2024-7908,0,0,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000
CVE-2024-7909,0,1,40f7aff5d4e7669f2f16671b680f3fd5a01c5b2e923d87f6df868e1cdd6fdef1,2024-08-21T19:15:13.487000
CVE-2024-7909,0,0,40f7aff5d4e7669f2f16671b680f3fd5a01c5b2e923d87f6df868e1cdd6fdef1,2024-08-21T19:15:13.487000
CVE-2024-7910,0,0,dddecbe9efccf1f397282c79f0ba4716c91b37bb24bbae91fa6ba76ac0a217be,2024-08-19T18:49:49.110000
CVE-2024-7911,0,0,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24e4,2024-08-19T18:48:06.527000
CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000
@ -260827,11 +260831,31 @@ CVE-2024-7945,0,0,d2428ee2dcd967452089d140ce94a2be4092f314afe3e103f6f27860690dc8
CVE-2024-7946,0,0,55b44492c55caac843a1ad836ee11f9cccc3723d88087e17cb61194f5c694743,2024-08-21T13:55:24.780000
CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193e5,2024-08-21T13:53:38.750000
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
CVE-2024-7949,0,1,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
CVE-2024-7964,1,1,9014295bfa737365db03c76140b85acea72a0088e8ad3fabe43cc715bfac85c2,2024-08-21T21:15:08.850000
CVE-2024-7965,1,1,df363051cdf71462e7b27d2de6c8715fb709398b47670690e50ceac5d2dcff0f,2024-08-21T21:15:08.947000
CVE-2024-7966,1,1,1d4d143509e03a295d1ded12de008e968aedee0675838c46b063c3b83a98384b,2024-08-21T21:15:09
CVE-2024-7967,1,1,b38b537ec961e442e115e4635187a1ea00b8a925de9396be0eba1b6f9775734a,2024-08-21T21:15:09.060000
CVE-2024-7968,1,1,46b1bd903ff6a3f2725cc5936995eea33ccda0a825f39fe616abb2a9a3640732,2024-08-21T21:15:09.133000
CVE-2024-7969,1,1,85f45cdb050f1db59b146eee74944739f360e35d21cb4a7d27b5551e24ab7cae,2024-08-21T21:15:09.203000
CVE-2024-7971,1,1,94b4ea0d2e8cfdf1328cdfa0fb3549d37e85aadf235db419a3d3dfde073aa944,2024-08-21T21:15:09.277000
CVE-2024-7972,1,1,757d12ce9d884d45dbc40f5bb22d028bda6011f93037db0945b662ece6a14451,2024-08-21T21:15:09.353000
CVE-2024-7973,1,1,7bbfedcd4a7d1d83329b497ab1f5b6ccf2d7831c7718786de198ec9a742d3dcc,2024-08-21T21:15:09.407000
CVE-2024-7974,1,1,24cae8bf4c54d5222499be0e66843f2c59e61d076c00bcc309f864b6615fecbe,2024-08-21T21:15:09.480000
CVE-2024-7975,1,1,cae32fa42668d1b0b0aae07539aa477dc9899deee4ebec57be1192e9236ea386,2024-08-21T21:15:09.533000
CVE-2024-7976,1,1,9025ff5fc9a54ee7291fd41a06bbae491b88fd29a7edf66b167242b28536ea14,2024-08-21T21:15:09.583000
CVE-2024-7977,1,1,5f25d332e28e2bc714c75f784b41c8da7428c693b68b7f9b76cedc2e8c467bc1,2024-08-21T21:15:09.630000
CVE-2024-7978,1,1,f315d5e0f2085ec15ff1b778e7288fc00cb59ac54109e65c8c2a3de44032f92c,2024-08-21T21:15:09.697000
CVE-2024-7979,1,1,6ad4018d30c05da7c71962208723a13aab1fc847ad71a5511d9645aaab228adc,2024-08-21T21:15:09.747000
CVE-2024-7980,1,1,d16778e8145a5adbe6047e6e1fc9db078966060b653e5b609a27fad5b1b8ac9f,2024-08-21T21:15:09.793000
CVE-2024-7981,1,1,39c79a9cd553be141c9f213efb8cac2f10198a869d0a9669579c3b630dd4be2b,2024-08-21T21:15:09.843000
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
CVE-2024-8033,1,1,474ca8870cf9b670510d19eed5c14882ceb4bd6ad7995e7e63bce94de964db02,2024-08-21T21:15:09.897000
CVE-2024-8034,1,1,c526cc05681ad2481b0574f11b49e00d365c3d4553e9a0575b545dc17a3804a9,2024-08-21T21:15:09.957000
CVE-2024-8035,1,1,38022f95d3472be828d03744ae35827b794523de6d3705a1f92311c7c8b00c33,2024-08-21T21:15:10.010000

Can't render this file because it is too large.