Auto-Update: 2024-09-09T18:00:19.755140+00:00

This commit is contained in:
cad-safe-bot 2024-09-09 18:03:18 +00:00
parent 14c9cebfe0
commit 5eb078aae5
40 changed files with 1990 additions and 239 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-1546",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2018-07-06T14:29:01.443",
"lastModified": "2019-10-09T23:38:37.773",
"lastModified": "2024-09-09T17:15:12.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -36,9 +36,11 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
}
],
"cvssMetricV30": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@ -125,11 +127,8 @@
]
},
{
"url": "https://www-prd-trops.events.ibm.com/node/715299",
"source": "psirt@us.ibm.com",
"tags": [
"Permissions Required"
]
"url": "https://www.ibm.com/support/pages/node/715299",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5570",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-10-27T12:15:08.757",
"lastModified": "2023-11-07T21:34:59.460",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-09T16:35:01.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-1320"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1320"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5623",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-10-26T17:15:09.860",
"lastModified": "2023-11-07T13:49:33.017",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-09T16:35:03.113",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21524",
"sourceIdentifier": "report@snyk.io",
"published": "2024-07-10T05:15:11.340",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:36:33.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -51,18 +81,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magiclen:stringbuilder:*:*:*:*:*:node.js:*:*",
"versionEndIncluding": "2.2.7",
"matchCriteriaId": "8DE1612F-F4A0-4ED1-8229-FC7EF4167BE2"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21759",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:04.357",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T16:02:11.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.7",
"matchCriteriaId": "281311DE-FCED-4AB9-8D54-EBD0C8FE53B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7F7D4E-DE62-491A-9C00-EAD2595BF2D7"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-011",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23663",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:04.593",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T16:05:49.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,77 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.1",
"versionEndIncluding": "4.1.9",
"matchCriteriaId": "13C8C635-302D-4495-A0C0-069F08CA9CAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndIncluding": "4.2.6",
"matchCriteriaId": "BC6A9F11-62C8-4A04-B1FC-795BD0D80EE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.4",
"matchCriteriaId": "52A6C42E-B444-4E9D-8DDE-377FDF85FA68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.4",
"matchCriteriaId": "57CACD11-5B17-4540-87AF-1B8730C84984"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndIncluding": "7.4.2",
"matchCriteriaId": "D22C31E2-F928-4244-A5CD-CF7F018A17F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC2C9D3-01FD-4D5B-AE85-05B0CA6C99AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0617C1D-E321-409D-B54B-775E854A03C1"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-459",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26015",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:04.810",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T16:12:36.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-704"
}
]
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.4.3",
"matchCriteriaId": "662CC1BD-BA5A-4765-9D74-A887690F726F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.15",
"matchCriteriaId": "F75019A7-F58D-4863-AE73-B63E38C8D880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.8",
"matchCriteriaId": "5F669948-010A-4105-9E63-0D47CA92CA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndIncluding": "7.4.3",
"matchCriteriaId": "D89D2813-5224-4658-97B8-56CBD3E49ED6"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-446",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27784",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.470",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T16:16:47.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiaiops:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46735B4F-511E-4C02-A561-FCF029146F79"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-072",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27785",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.687",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T16:18:45.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiaiops:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46735B4F-511E-4C02-A561-FCF029146F79"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-073",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-2911",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T22:15:07.823",
"lastModified": "2024-06-26T20:15:15.360",
"lastModified": "2024-09-09T16:15:02.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257979. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
@ -16,6 +16,50 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-2935",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T01:15:47.360",
"lastModified": "2024-05-17T02:38:38.003",
"lastModified": "2024-09-09T16:15:02.587",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Todo List in Kanban Board 1.0. Affected by this issue is some unknown functionality of the component Add ToDo. The manipulation of the argument Todo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258014 is the identifier assigned to this vulnerability."
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Todo List in Kanban Board 1.0. Affected by this issue is some unknown functionality of the component Add ToDo. The manipulation of the argument Todo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
@ -16,6 +16,50 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
@ -92,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.304678",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33509",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.950",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:06:37.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndExcluding": "7.2.2",
"matchCriteriaId": "41F978BE-CB8B-4B00-AC72-1FE4ABD134DE"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-326",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38651",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:12.347",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T17:35:02.663",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39498",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:12.387",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:47:58.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/mst: corrige la desreferencia del puntero NULL en drm_dp_add_payload_part2 [Por qu\u00e9] Commit: - commit 5aa1dfcdf0a4 (\"drm/mst: refactorizar el flujo para la asignaci\u00f3n/eliminaci\u00f3n de carga\") sobrescribe accidentalmente el commit - commit 54d217406afe (\"drm: use mgr->dev en drm_dbg_kms en drm_dp_add_payload_part2\") que causa regresi\u00f3n. [C\u00f3mo] Recupere la correcci\u00f3n NULL original y elimine el par\u00e1metro de entrada innecesario 'estado' para drm_dp_add_payload_part2(). (cereza escogida del commit 4545614c1d8da603e57b60dd66224d81b6ffc305)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.6",
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5a507b7d2be15fddb95bf8dee01110b723e2bcd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e21de5f99b2368a5155037ce0aae8aaba3f5241",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39714",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:12.507",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T17:35:03.387",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39715",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:12.663",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T16:35:04.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40710",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:13.110",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T17:35:04.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40711",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:13.260",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T16:35:05.923",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40712",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:13.410",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T16:35:06.673",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40964",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.310",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:48:55.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,109 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: hda: cs35l41: Posible desreferencia del puntero nulo en cs35l41_hda_unbind() La funci\u00f3n cs35l41_hda_unbind() borra la entrada hda_component que coincide con su \u00edndice y luego desreferencia el puntero del c\u00f3dec contenido en el primer elemento de la matriz hda_component, esto es un problema cuando el \u00edndice del dispositivo era 0. En su lugar, utilice el puntero del c\u00f3dec escondido en la estructura cs35l41_hda, ya que seguir\u00e1 siendo v\u00e1lido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "7811AF31-E4C8-4CC1-8D27-717621D639B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/19be722369c347f3af1c5848e303980ed040b819",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6386682cdc8b41319c92fbbe421953e33a28840c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff27bd8e17884f7cdefecb3f3817caadd6813dc0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40965",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.370",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:57:18.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: i2c: lpi2c: evite llamar a clk_get_rate durante la transferencia. En lugar de llamar repetidamente a clk_get_rate para cada transferencia, bloquee la velocidad del reloj y almacene en cach\u00e9 el valor. Se ha observado un punto muerto al agregar el c\u00f3dec de audio tlv320aic32x4 al sistema. Cuando este proveedor de reloj agrega su reloj, el mutex clk ya est\u00e1 bloqueado, necesita acceder a i2c, que a cambio tambi\u00e9n necesita el mutex para clk_get_rate."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0C5DBBC3-3C7D-44D9-B480-A05A38B8AE77"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2b42e9587a7a9c7b824e0feb92958f258263963e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4268254a39484fc11ba991ae148bacbe75d9cc0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40967",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.480",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:58:49.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,116 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: imx: Introduce tiempo de espera cuando se espera que el transmisor est\u00e9 vac\u00edo. Esperando como m\u00e1ximo 1 segundo para que se establezca USR2_TXDC, evitamos un posible punto muerto. En caso de que se agote el tiempo de espera, no hay mucho que podamos hacer, por lo que simplemente ignoramos el estado del transmisor e intentamos continuar con optimismo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.162",
"matchCriteriaId": "DD1E49C8-DE20-4CCB-8715-3FB3FA95ABC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.96",
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/53b2c95547427c358f45515a9f144efee95e3701",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f2b9ab6d0b26f16cd38dd9fd91d51899635f7c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f9e70c68b7ace0141fe3bc94bf7b61296b71916",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/982ae3376c4c91590d38dc8a676c10f7df048a44",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e533e4c62e9993e62e947ae9bbec34e4c7ae81c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40969",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-12T13:15:18.627",
"lastModified": "2024-07-12T16:34:58.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:59:29.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: f2fs: no configure RO al apagar f2fs El apagado no verifica el error de thaw_super debido a solo lectura, lo que causa un punto muerto como el que se muestra a continuaci\u00f3n. f2fs_ioc_shutdown(F2FS_GOING_DOWN_FULLSYNC) issues_discard_thread - bdev_freeze - frozen_super - f2fs_stop_checkpoint() - f2fs_handle_critical_error - sb_start_write - establecer RO - esperando - bdev_thaw - thaw_super_locked - devolver -EINVAL, si sb_rdonly() - card_thread -> esperar kthread_stop(discard_thread);"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.36",
"matchCriteriaId": "97F8F699-7041-44A4-9087-0E1FFC0543C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.7",
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1036d3ea7a32cb7cee00885c73a1f2ba7fbc499a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3bdb7f161697e2d5123b89fe1778ef17a44858e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f47ed3b284b38f235355e281f57dfa8fffcc6563",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42019",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:13.980",
"lastModified": "2024-09-09T13:03:38.303",
"lastModified": "2024-09-09T17:35:05.247",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T17:15:13.120",
"lastModified": "2024-09-09T17:15:13.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by sending a carefully crafted malicious string to the CGI function responsible for handling usb_paswd.asp."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Swind1er/c8656b32058e28e64f92d100c92ca12c",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44720",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T16:15:02.780",
"lastModified": "2024-09-09T17:35:06.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS v13.1 was discovered to an arbitrary file read vulnerability via the component admin_safe.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/seacms-net/CMS/issues/22",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44721",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T16:15:02.853",
"lastModified": "2024-09-09T16:15:02.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS v13.1 was discovered to a Server-Side Request Forgery (SSRF) via the url parameter at /admin_reslib.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/seacms-net/CMS/issues/23",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45406",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T17:15:13.180",
"lastModified": "2024-09-09T17:15:13.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://github.com/craftcms/cms/commit/b7348942f8131b3868ec6f46d615baae50151bb8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-28h4-788g-rh42",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6274",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T02:15:53.827",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T16:15:27.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83"
}
]
}
]
}
],
"references": [
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-1-6b3c66351180485ea764561a47239907",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.269487",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.269487",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.362872",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T02:15:54.140",
"lastModified": "2024-06-25T16:15:25.923",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:20:46.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83"
}
]
}
]
}
],
"references": [
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-2-bd75eb9250214c2e95e57965d9ea392a",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.269488",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.269488",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.362876",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T02:15:54.410",
"lastModified": "2024-06-24T15:15:12.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:20:48.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83"
}
]
}
]
}
],
"references": [
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-3-52ce387faca74869b441eb1bf4cec27a",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.269489",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.269489",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.362877",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.027",
"lastModified": "2024-06-24T15:15:12.297",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:20:50.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83"
}
]
}
]
}
],
"references": [
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-4-a2545288ad9244009ff1097df19ee635",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.269490",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.269490",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.362882",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.290",
"lastModified": "2024-06-24T14:15:13.293",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:20:52.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83"
}
]
}
]
}
],
"references": [
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-5-f0e968979e3c47049ed5965ca3a7ed7e",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.269491",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.269491",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.362883",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.573",
"lastModified": "2024-06-26T20:15:17.003",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-09T17:20:45.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6223-13DB-4AAC-A206-6FBDFF848C83"
}
]
}
]
}
],
"references": [
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-6-cb069f55445545e19212a7b1ae489a72",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.269492",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.269492",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.362886",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8373",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2024-09-09T15:15:12.887",
"lastModified": "2024-09-09T15:15:12.887",
"lastModified": "2024-09-09T16:15:02.927",
"vulnStatus": "Received",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "Improper sanitization of the value of the '[srcset]' attribute in '<source>' HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
"value": "Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8517",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-09-06T16:15:03.793",
"lastModified": "2024-09-06T16:46:26.830",
"lastModified": "2024-09-09T16:15:03.053",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SPIP before 4.3.2, 4.2.16, and \n4.1.18 is vulnerable to a command injection issue. A \nremote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request."
},
{
"lang": "es",
"value": "SPIP anterior a 4.3.2, 4.2.16 y 4.1.18 es vulnerable a un problema de inyecci\u00f3n de comandos. Un atacante remoto y no autenticado puede ejecutar comandos arbitrarios del sistema operativo enviando una solicitud HTTP de carga de archivo multiparte manipulada."
}
],
"metrics": {
@ -56,6 +60,10 @@
"url": "https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_2_a_big_upload/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vozec.fr/researchs/spip-preauth-rce-2024-big-upload/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/spip-upload-rce",
"source": "disclosure@vulncheck.com"

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8604",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-09T16:15:03.203",
"lastModified": "2024-09-09T16:15:03.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Online Food Ordering System 2.0. This affects an unknown part of the file index.php of the component Create an Account Page. The manipulation of the argument First Name/Last Name leads to cross site scripting. It is possible to initiate the attack remotely."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.276831",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276831",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.404660",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8605",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-09T16:15:03.570",
"lastModified": "2024-09-09T16:15:03.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in code-projects Inventory Management 1.0. This vulnerability affects unknown code of the file /view/registration.php of the component Registration Form. The manipulation with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ali0999109/Inventory-management",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276832",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276832",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.404711",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-09T16:00:18.916348+00:00
2024-09-09T18:00:19.755140+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-09T15:59:57.527000+00:00
2024-09-09T17:59:29.787000+00:00
```
### Last Data Feed Release
@ -33,51 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262211
262217
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `6`
- [CVE-2024-40643](CVE-2024/CVE-2024-406xx/CVE-2024-40643.json) (`2024-09-09T15:15:11.597`)
- [CVE-2024-44375](CVE-2024/CVE-2024-443xx/CVE-2024-44375.json) (`2024-09-09T14:15:14.290`)
- [CVE-2024-45041](CVE-2024/CVE-2024-450xx/CVE-2024-45041.json) (`2024-09-09T15:15:11.940`)
- [CVE-2024-7015](CVE-2024/CVE-2024-70xx/CVE-2024-7015.json) (`2024-09-09T14:15:14.430`)
- [CVE-2024-8042](CVE-2024/CVE-2024-80xx/CVE-2024-8042.json) (`2024-09-09T15:15:12.340`)
- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2024-09-09T15:15:12.560`)
- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T15:15:12.887`)
- [CVE-2024-44333](CVE-2024/CVE-2024-443xx/CVE-2024-44333.json) (`2024-09-09T17:15:13.120`)
- [CVE-2024-44720](CVE-2024/CVE-2024-447xx/CVE-2024-44720.json) (`2024-09-09T16:15:02.780`)
- [CVE-2024-44721](CVE-2024/CVE-2024-447xx/CVE-2024-44721.json) (`2024-09-09T16:15:02.853`)
- [CVE-2024-45406](CVE-2024/CVE-2024-454xx/CVE-2024-45406.json) (`2024-09-09T17:15:13.180`)
- [CVE-2024-8604](CVE-2024/CVE-2024-86xx/CVE-2024-8604.json) (`2024-09-09T16:15:03.203`)
- [CVE-2024-8605](CVE-2024/CVE-2024-86xx/CVE-2024-8605.json) (`2024-09-09T16:15:03.570`)
### CVEs modified in the last Commit
Recently modified CVEs: `43`
Recently modified CVEs: `32`
- [CVE-2024-39867](CVE-2024/CVE-2024-398xx/CVE-2024-39867.json) (`2024-09-09T15:19:17.710`)
- [CVE-2024-39868](CVE-2024/CVE-2024-398xx/CVE-2024-39868.json) (`2024-09-09T15:20:25.113`)
- [CVE-2024-39869](CVE-2024/CVE-2024-398xx/CVE-2024-39869.json) (`2024-09-09T15:20:59.443`)
- [CVE-2024-39870](CVE-2024/CVE-2024-398xx/CVE-2024-39870.json) (`2024-09-09T15:21:43.183`)
- [CVE-2024-39872](CVE-2024/CVE-2024-398xx/CVE-2024-39872.json) (`2024-09-09T15:24:26.130`)
- [CVE-2024-39873](CVE-2024/CVE-2024-398xx/CVE-2024-39873.json) (`2024-09-09T15:25:21.893`)
- [CVE-2024-39874](CVE-2024/CVE-2024-398xx/CVE-2024-39874.json) (`2024-09-09T15:25:33.577`)
- [CVE-2024-40709](CVE-2024/CVE-2024-407xx/CVE-2024-40709.json) (`2024-09-09T15:35:08.283`)
- [CVE-2024-40713](CVE-2024/CVE-2024-407xx/CVE-2024-40713.json) (`2024-09-09T15:35:08.970`)
- [CVE-2024-40714](CVE-2024/CVE-2024-407xx/CVE-2024-40714.json) (`2024-09-09T14:35:02.980`)
- [CVE-2024-40718](CVE-2024/CVE-2024-407xx/CVE-2024-40718.json) (`2024-09-09T14:35:03.723`)
- [CVE-2024-42021](CVE-2024/CVE-2024-420xx/CVE-2024-42021.json) (`2024-09-09T14:35:04.620`)
- [CVE-2024-42022](CVE-2024/CVE-2024-420xx/CVE-2024-42022.json) (`2024-09-09T15:35:09.917`)
- [CVE-2024-42023](CVE-2024/CVE-2024-420xx/CVE-2024-42023.json) (`2024-09-09T14:35:05.330`)
- [CVE-2024-42024](CVE-2024/CVE-2024-420xx/CVE-2024-42024.json) (`2024-09-09T14:35:06.053`)
- [CVE-2024-44838](CVE-2024/CVE-2024-448xx/CVE-2024-44838.json) (`2024-09-09T14:35:06.773`)
- [CVE-2024-44839](CVE-2024/CVE-2024-448xx/CVE-2024-44839.json) (`2024-09-09T15:35:10.797`)
- [CVE-2024-45034](CVE-2024/CVE-2024-450xx/CVE-2024-45034.json) (`2024-09-09T14:35:07.577`)
- [CVE-2024-45771](CVE-2024/CVE-2024-457xx/CVE-2024-45771.json) (`2024-09-09T15:35:11.567`)
- [CVE-2024-6910](CVE-2024/CVE-2024-69xx/CVE-2024-6910.json) (`2024-09-09T14:35:08.260`)
- [CVE-2024-7644](CVE-2024/CVE-2024-76xx/CVE-2024-7644.json) (`2024-09-09T15:15:12.197`)
- [CVE-2024-7687](CVE-2024/CVE-2024-76xx/CVE-2024-7687.json) (`2024-09-09T14:35:09.030`)
- [CVE-2024-7688](CVE-2024/CVE-2024-76xx/CVE-2024-7688.json) (`2024-09-09T14:35:09.803`)
- [CVE-2024-7689](CVE-2024/CVE-2024-76xx/CVE-2024-7689.json) (`2024-09-09T14:35:10.587`)
- [CVE-2024-7918](CVE-2024/CVE-2024-79xx/CVE-2024-7918.json) (`2024-09-09T14:35:10.777`)
- [CVE-2024-27784](CVE-2024/CVE-2024-277xx/CVE-2024-27784.json) (`2024-09-09T16:16:47.253`)
- [CVE-2024-27785](CVE-2024/CVE-2024-277xx/CVE-2024-27785.json) (`2024-09-09T16:18:45.420`)
- [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-09-09T16:15:02.413`)
- [CVE-2024-2935](CVE-2024/CVE-2024-29xx/CVE-2024-2935.json) (`2024-09-09T16:15:02.587`)
- [CVE-2024-33509](CVE-2024/CVE-2024-335xx/CVE-2024-33509.json) (`2024-09-09T17:06:37.737`)
- [CVE-2024-38651](CVE-2024/CVE-2024-386xx/CVE-2024-38651.json) (`2024-09-09T17:35:02.663`)
- [CVE-2024-39498](CVE-2024/CVE-2024-394xx/CVE-2024-39498.json) (`2024-09-09T17:47:58.640`)
- [CVE-2024-39714](CVE-2024/CVE-2024-397xx/CVE-2024-39714.json) (`2024-09-09T17:35:03.387`)
- [CVE-2024-39715](CVE-2024/CVE-2024-397xx/CVE-2024-39715.json) (`2024-09-09T16:35:04.780`)
- [CVE-2024-40710](CVE-2024/CVE-2024-407xx/CVE-2024-40710.json) (`2024-09-09T17:35:04.207`)
- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-09-09T16:35:05.923`)
- [CVE-2024-40712](CVE-2024/CVE-2024-407xx/CVE-2024-40712.json) (`2024-09-09T16:35:06.673`)
- [CVE-2024-40964](CVE-2024/CVE-2024-409xx/CVE-2024-40964.json) (`2024-09-09T17:48:55.847`)
- [CVE-2024-40965](CVE-2024/CVE-2024-409xx/CVE-2024-40965.json) (`2024-09-09T17:57:18.697`)
- [CVE-2024-40967](CVE-2024/CVE-2024-409xx/CVE-2024-40967.json) (`2024-09-09T17:58:49.700`)
- [CVE-2024-40969](CVE-2024/CVE-2024-409xx/CVE-2024-40969.json) (`2024-09-09T17:59:29.787`)
- [CVE-2024-42019](CVE-2024/CVE-2024-420xx/CVE-2024-42019.json) (`2024-09-09T17:35:05.247`)
- [CVE-2024-6274](CVE-2024/CVE-2024-62xx/CVE-2024-6274.json) (`2024-09-09T16:15:27.780`)
- [CVE-2024-6275](CVE-2024/CVE-2024-62xx/CVE-2024-6275.json) (`2024-09-09T17:20:46.777`)
- [CVE-2024-6276](CVE-2024/CVE-2024-62xx/CVE-2024-6276.json) (`2024-09-09T17:20:48.280`)
- [CVE-2024-6277](CVE-2024/CVE-2024-62xx/CVE-2024-6277.json) (`2024-09-09T17:20:50.147`)
- [CVE-2024-6278](CVE-2024/CVE-2024-62xx/CVE-2024-6278.json) (`2024-09-09T17:20:52.050`)
- [CVE-2024-6279](CVE-2024/CVE-2024-62xx/CVE-2024-6279.json) (`2024-09-09T17:20:45.137`)
- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T16:15:02.927`)
- [CVE-2024-8517](CVE-2024/CVE-2024-85xx/CVE-2024-8517.json) (`2024-09-09T16:15:03.053`)
## Download and Usage

View File

@ -86975,7 +86975,7 @@ CVE-2016-3710,0,0,f9e59617883b323f95ff6f5a7a03da9d298f637e07e1bc0d7501f309b1a739
CVE-2016-3711,0,0,c83a67f72aa4c2861ef346c90cac54d305f88ed90f7be93aa656fb4e4c2c38f0,2023-02-12T23:19:22.177000
CVE-2016-3712,0,0,c7f8b4f08f7e1f6b1a1ea7bea5477b9261472b30b06cc0735ec9663f83a435d4,2023-02-12T23:19:25.750000
CVE-2016-3713,0,0,a0fd3a736659e40bc6953eb2ee96f88b830db73527d62c25a6b3e9fd4b3aae3c,2016-06-27T17:57:26.057000
CVE-2016-3714,0,1,12047890f358fc6cf683ff6af23d89825a9fc414a9509972590d644fdd8841d0,2024-09-09T15:35:01.367000
CVE-2016-3714,0,0,12047890f358fc6cf683ff6af23d89825a9fc414a9509972590d644fdd8841d0,2024-09-09T15:35:01.367000
CVE-2016-3715,0,0,41a429bb9cd4e58bec46c18da65f864fbf1003189981e9643c46c4b6d44f1441,2024-07-24T17:06:03.347000
CVE-2016-3716,0,0,2d621eca38580eb36b12da03d5052a9d202f297848297f9114ec53c77580c3f4,2023-02-12T23:20:02.797000
CVE-2016-3717,0,0,578985c683d019d0063f96d744b7323756592c56c56d5244a232b553f341441d,2023-02-12T23:20:04.043000
@ -115876,7 +115876,7 @@ CVE-2018-15456,0,0,2f5375f8b0f509603fd54b269e38b48a0e84eb432e0fcde4bdc157b3e7a84
CVE-2018-15457,0,0,cdfe8cdb910400a06d0e86e52da3f71533948b4b17b6875b4bad1a18bc50537e,2019-10-09T23:35:40.640000
CVE-2018-15458,0,0,4eb5b07daaa1a3f80fe57f2e45110d3b67ae8f6a4650f78feb2a0f6ffefe59ab,2019-10-09T23:35:40.797000
CVE-2018-15459,0,0,dae7ef94e050cebb33367e92f31c861188eddb57780a1409c0e04bdc73180bad,2019-10-09T23:35:40.953000
CVE-2018-1546,0,0,0f52c9cede5828a29aff0f3708a43e81f922dd1a36d945615816ef4c43fcedf9,2019-10-09T23:38:37.773000
CVE-2018-1546,0,1,3445ce9333d207bad13225edf4b9047dfb47f100802c6b2ac38b0a302e5dca2d,2024-09-09T17:15:12.590000
CVE-2018-15460,0,0,042368f743de9f2440d9b065fb6145817fac73be370a0d72fa5ee01a063e76b6,2020-09-16T14:14:08.843000
CVE-2018-15461,0,0,ae67f638beec243dec718374a8e6b1c09ecf1f3102af33850b52c3310bf7421b,2019-10-09T23:35:41.280000
CVE-2018-15462,0,0,bc1e46ac08a8d665be64afdd3c2427983783a6b60ca748eaa2e219b2bc09cf74,2019-10-03T00:03:26.223000
@ -177080,8 +177080,8 @@ CVE-2021-33631,0,0,4bb1a57fd3d7061179ee5c0b5fadd3e14fb67d29158d40a23ef4978e9cb74
CVE-2021-33632,0,0,43a59214a93b179dd702b6249acf41f30b42300f7e20046b4225555f242eea2a,2024-03-25T13:47:14.087000
CVE-2021-33633,0,0,1d3e7e2ce5a496d7680fb52d6ceddef03ab2b2de739c40081f467b0103db15d5,2024-03-25T01:51:01.223000
CVE-2021-33634,0,0,fc018a97b593180ebc66efc3271787e02d333437980e2e2373b53a0d32e0e1f0,2023-11-08T01:52:34.450000
CVE-2021-33635,0,1,1cc558d28dbd4d265a34db235a099e52303d822dc579ae2bed87e7d5e8a9962f,2024-09-09T15:35:02.913000
CVE-2021-33636,0,1,3e394c5e0743c35e5547dc0e89470c8c7f4c1a3f0291f97394c500ca58a9fd66,2024-09-09T15:35:03.650000
CVE-2021-33635,0,0,1cc558d28dbd4d265a34db235a099e52303d822dc579ae2bed87e7d5e8a9962f,2024-09-09T15:35:02.913000
CVE-2021-33636,0,0,3e394c5e0743c35e5547dc0e89470c8c7f4c1a3f0291f97394c500ca58a9fd66,2024-09-09T15:35:03.650000
CVE-2021-33637,0,0,b82226142afcda7a12981711fbe46dda28a7cfa9b79905e9871a619153029f73,2023-11-08T14:12:00.513000
CVE-2021-33638,0,0,773f59b2d260a28e8578abcb1600f2c2526fbce23df34714be75cf39335c79b7,2023-11-08T01:29:32.623000
CVE-2021-33639,0,0,61a013ecdf2663ac151a4005baef2377c4c167eb7255a50cace6e65de6850c97,2023-03-15T18:47:45.320000
@ -237357,10 +237357,10 @@ CVE-2023-50172,0,0,0e77f8672f5cf0fb47b8becab367b19a56d5395eded77044b2dad65f5dff6
CVE-2023-50174,0,0,5231481744a295e82b51c5724a4a3afbdad4616950b393d426cf684f8bc4019b,2024-02-14T18:15:46.640000
CVE-2023-50175,0,0,1f4c148f2ad49dc23cadeda416bba9717617a9eed1ffebc27bb2042d761f8318,2024-01-02T19:53:20.863000
CVE-2023-50178,0,0,c40c2e97ab2d69359ee8f0721fedb9558db9deb2c992769442dc418c37cba827,2024-07-09T18:18:38.713000
CVE-2023-50179,0,1,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000
CVE-2023-50179,0,0,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000
CVE-2023-5018,0,0,cae5f64430f83fdd33bf69324906a6cb5316c44f52a942103dd4a7b86daf8ff3,2024-05-17T02:32:46.463000
CVE-2023-50180,0,0,0e74c4dab87377ea6e7224cae654f4c96addd7d2706381ea322da69706e6caba,2024-05-23T15:55:49.800000
CVE-2023-50181,0,1,5a84e37d70919957272e5d51f6871b4bd827b2e1fb7c2fc900feed1e76dde981,2024-09-09T15:59:57.527000
CVE-2023-50181,0,0,5a84e37d70919957272e5d51f6871b4bd827b2e1fb7c2fc900feed1e76dde981,2024-09-09T15:59:57.527000
CVE-2023-50186,0,0,eb5626d3fb1619a798ac8945adada7c6114ee10c766b40e73be4348452ca454c,2024-05-03T12:48:41.067000
CVE-2023-50187,0,0,d757836b2069286c0c133b3329a947df1bcd8e94d1a052ae3d79300c5fc19441,2024-05-03T12:48:41.067000
CVE-2023-50188,0,0,fce1750eed0dbf59574ccb3c81b94063cdbe34b2bc61cb8e594ea188d866c555,2024-05-03T12:48:41.067000
@ -239629,7 +239629,7 @@ CVE-2023-5565,0,0,9e7b8f54cd6b3190a6c2dac08622e882b08cbd368e6fd157742d6c77ea5aee
CVE-2023-5566,0,0,12be08118b98fee554154ac5f8793e6b5b39c31b38e93f8ea1a17cb1449cc8ad,2023-11-07T04:24:08.480000
CVE-2023-5567,0,0,4a809f39fc79aea2b56a0f9381e47c90d1b0a4c5eac453c3a06cd429eeaab3fa,2023-11-14T19:11:40.360000
CVE-2023-5568,0,0,38d553e6bd63422157002920ac635048886ff5ffd8fe73a158c842ea275b4377,2023-11-24T09:15:09.767000
CVE-2023-5570,0,0,926a322c8b0a8b66350eb8ed02d05212760f38df202a1977a847bbd68d5f784b,2023-11-07T21:34:59.460000
CVE-2023-5570,0,1,87f206bc52392a520ad049babd3b47e2251ec78d9da7033b6ff5cee06408ea7f,2024-09-09T16:35:01.990000
CVE-2023-5571,0,0,517e76e2863d0b91d16cb5f62e8628dcdcd61d5f895ca680836613c4517f20b9,2023-10-17T16:04:47.640000
CVE-2023-5572,0,0,d3874e77765ea8dd8afcd46f43f04e8854b2bc29554e637a4973cc68fd58bd1c,2023-10-17T16:08:09.450000
CVE-2023-5573,0,0,4fe63b19ad0fa3138adc11217ff249aecc853df2598d2ca13577829e18cb73dd,2023-10-17T16:08:58.677000
@ -239677,7 +239677,7 @@ CVE-2023-5619,0,0,a19fb0d9c1ec2158ccf365d70c7c69e74f9a9e11e8a35b996d155c23740d5b
CVE-2023-5620,0,0,4199d350e2e4c731dd763714d3bb3dd23b36ac346f07188e030f30ff30c41160,2023-12-02T04:36:03.177000
CVE-2023-5621,0,0,c418664501b2f113540a10fbe54573420e49f52f46bc96886f617927fd44a4ff,2023-11-07T04:24:12.930000
CVE-2023-5622,0,0,f19fe82900e70a4450099d29884259279e7aeae442e6aa22b36ae355f702bc7b,2023-11-07T18:04:15.357000
CVE-2023-5623,0,0,60f1ad58d64cba8a36278b2a247125d7b5bacd0d8e604669415615e47be1fb7a,2023-11-07T13:49:33.017000
CVE-2023-5623,0,1,2f3b29c1eef030c9ad5a4ede8de04f56f932e285b9b218b7356d7e60e1761594,2024-09-09T16:35:03.113000
CVE-2023-5624,0,0,ba5097aba2a2a247854c1d9b4796e1185da31c5dd8141edfd0344a8f714da575,2023-11-06T18:20:25.737000
CVE-2023-5625,0,0,ac0ecbb6ed7210743894554a366916e8815b219327e42d98b1f6277193a8851d,2024-08-01T13:45:44.543000
CVE-2023-5626,0,0,340b8c1c87a43fe8a63e58d41c520f026228ad8445e5d8be6ece89714d56eba5,2023-10-25T00:11:45.460000
@ -244034,7 +244034,7 @@ CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de
CVE-2024-21521,0,0,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000
CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000
CVE-2024-21523,0,0,2330ac0e4e609e6cb7b2d157ba739c957bd5fcf4369b9f17b9fa0a4336dfb21a,2024-08-01T13:46:46.460000
CVE-2024-21524,0,0,30925466b7c2ddad2000160b050b1c4541bdd9760a254b3635b5b7c9807a13b2,2024-07-11T13:05:54.930000
CVE-2024-21524,0,1,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d2a8,2024-09-09T17:36:33.447000
CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000
CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000
CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
@ -244187,7 +244187,7 @@ CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fc
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
CVE-2024-21757,0,0,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000
CVE-2024-21759,0,0,0b3a459fcd9e65a646c7b0d361c2007c663819313bd3704f44988f84e4752b86,2024-07-09T18:18:38.713000
CVE-2024-21759,0,1,d165ae3a9708367c28525bd41d7fe549357acc1e0023c89ebc6f25ff1ff9fe47,2024-09-09T16:02:11.507000
CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000
CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000
CVE-2024-21762,0,0,84db6239690371b7c5c10ef720dbcf2d622d5440e87b70d1c21a79a857f8ea72,2024-02-13T18:21:14.607000
@ -245474,7 +245474,7 @@ CVE-2024-23659,0,0,00fc339e96cf90505d259821db8c42ecca98975cfcf7d7475d9e6c3b75152
CVE-2024-2366,0,0,490db5028d325a3e3270a4bc51ed933daf1eb90560331895c813986c8416aa30,2024-05-16T13:03:05.353000
CVE-2024-23660,0,0,f59390a3bdd92fda69048aa3822f1db7f5498b44103925e2d96259b145eb2ed1,2024-02-15T16:01:29.370000
CVE-2024-23662,0,0,0bd2fe423ff125cd6b426da805efebc9c554fb6e799e24e8d56e6d24f2b3b973,2024-04-10T13:24:22.187000
CVE-2024-23663,0,0,9391b83e4af7878ac8b95d5c6f0b2b986d0d42f3f96f86431d3de5a58fc2249d,2024-07-09T18:18:38.713000
CVE-2024-23663,0,1,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000
CVE-2024-23664,0,0,d011c75099554e936d176a3c9a5468d2477ab8b77d1d9dbc825df199147abb3b,2024-06-03T14:46:24.250000
CVE-2024-23665,0,0,ccfa4de2b1b28a8c2ff6771f6bb08ec6cd2560932d59d5a7f456cced5fbbb5ed,2024-06-03T14:46:24.250000
CVE-2024-23667,0,0,08d118467751e068d01ea69371b6be0268151b83859ef5f994ee6bdd4d8baae1,2024-06-03T14:46:24.250000
@ -246971,7 +246971,7 @@ CVE-2024-26004,0,0,339e2df0f2a66d2f51de2b2daab023ea4699cfa93f488c0f3f4f084b719f3
CVE-2024-26005,0,0,d7747b5e2f088b172b1a4b499ddd44f15dbf75c021bae634b0baaa69faaf4efd,2024-03-12T12:40:13.500000
CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503286,2024-05-14T19:17:55.627000
CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000
CVE-2024-26015,0,0,b7ece22d92ef7c12f1e905349345059c13c985bf74aad53ed8c42090322cc9ee,2024-07-09T18:18:38.713000
CVE-2024-26015,0,1,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000
CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000
CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
@ -248409,8 +248409,8 @@ CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1e
CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000
CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000
CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
CVE-2024-27784,0,0,4285259f77612f91e3ff56e89aad50964b084ec9ce271a7355dbd22b66319895,2024-07-09T18:18:38.713000
CVE-2024-27785,0,0,e1a85dd3e9c85a3def82e7191a4ff0ecd3f87a5e732c0620db84c4915e55b0f8,2024-07-09T18:18:38.713000
CVE-2024-27784,0,1,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000
CVE-2024-27785,0,1,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000
CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000
CVE-2024-2779,0,0,2aa54c375187eea63fa6c956db70ce31dec68ec2b409a2e5d246e26b34790090,2024-05-17T02:38:30.057000
CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000
@ -249328,7 +249328,7 @@ CVE-2024-29106,0,0,38cde57fa08b3bfbd936ed7f30983e2c016824cae4d1dc840ddec9b4b278c
CVE-2024-29107,0,0,23005c58ce9ee2df1002def433e2cbd83b2e28f9c719a4edb30307d771834f1f,2024-03-19T16:33:58.680000
CVE-2024-29108,0,0,cdaabe4f2cb16eb242103f0f1468c544b782290af0779b39905eb340a946864b,2024-03-19T16:33:58.680000
CVE-2024-29109,0,0,3b2d209511aa0457f6921ee84bca59e5ee9cf59236c9fd65507b599ea52d49eb,2024-03-19T16:33:58.680000
CVE-2024-2911,0,0,ce533ee212202ed01ff393a2a3e6314b742c9af3ae67559b02320680a1860f15,2024-06-26T20:15:15.360000
CVE-2024-2911,0,1,69fb3f57d9488dce7efad5e476c0a9718f5c486cc1255f55d06df83b940f95be,2024-09-09T16:15:02.413000
CVE-2024-29110,0,0,fc265aa4deb4be9588bd77283ee4678d3bcd9ee2a8790d504bccff2ae254e584,2024-03-19T16:33:58.680000
CVE-2024-29111,0,0,01d648d6980d11229d1c2cd345c1d0fc4ef4bfb60c43f80653e2087ace4e5fef,2024-03-19T16:33:58.680000
CVE-2024-29112,0,0,0d0beca65e379f4bb6e4903985e3ae2f48dd68ffe582c66829971c90ab80ad5e,2024-03-19T16:33:58.680000
@ -249486,7 +249486,7 @@ CVE-2024-29320,0,0,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e
CVE-2024-2933,0,0,d37838d7f15a38d4ea11c8a25611399fe1881ebeb49155e9b10719125430e055,2024-06-03T14:46:24.250000
CVE-2024-29338,0,0,e217df75a675560f91a966c0f38d2dc94f5bdcd1b6f253203724d0904bfebb81,2024-08-26T14:35:04.427000
CVE-2024-2934,0,0,45a0042779c7d6f34e6fbc62fd386e8f0722656936a5982b81057995fcd91a4c,2024-05-17T02:38:37.907000
CVE-2024-2935,0,0,7d689f5767f4ecf1da00999595f1a425d48847fef9234facd7520ada78d3a34d,2024-05-17T02:38:38.003000
CVE-2024-2935,0,1,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa987310b,2024-09-09T16:15:02.587000
CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000
CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000
CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000
@ -252341,7 +252341,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f
CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000
CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000
CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000
CVE-2024-33509,0,0,942592bdaf69098a0108402855da0a06509d03aff50e0f11403c507193ff0d2c,2024-07-09T18:18:38.713000
CVE-2024-33509,0,1,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000
CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000
CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000
CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000
@ -252841,8 +252841,8 @@ CVE-2024-34138,0,0,20dbbb756cb87eb979ce1e52a36c7b626ace9ece92ed88fafef5235352591
CVE-2024-34139,0,0,ecfed81b989642faf7d6f5c1fba486f76641136619e29104c708ded3b536150c,2024-08-02T21:20:57.803000
CVE-2024-3414,0,0,85e73a02de53c5bccb3cd76452d1972fd78b5413987e018bf8d64db8ededd514,2024-05-17T02:39:54.160000
CVE-2024-34140,0,0,1269aab015181060e989f57b7ad7dc54b6e75ed6e5d455f61eea1d3b26960d6d,2024-08-02T21:23:27.143000
CVE-2024-34141,0,1,41c28cac5d448e311e1245de44feed12c0272ade58e5edbe6626eb5961a57335,2024-09-09T14:01:25.947000
CVE-2024-34142,0,1,5b7f1690cc8062791103d3bf1711a3c82045801adcb57f67228d8b9152fadb39,2024-09-09T14:01:51.820000
CVE-2024-34141,0,0,41c28cac5d448e311e1245de44feed12c0272ade58e5edbe6626eb5961a57335,2024-09-09T14:01:25.947000
CVE-2024-34142,0,0,5b7f1690cc8062791103d3bf1711a3c82045801adcb57f67228d8b9152fadb39,2024-09-09T14:01:51.820000
CVE-2024-34144,0,0,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000
CVE-2024-34145,0,0,38c44993a1dc70421d8e9284263c594effe0d087a5df7c7a4b3ac5e8c821ff86,2024-07-03T01:59:26.520000
CVE-2024-34146,0,0,787b7a8aac402effb291b025d8f2aec84609a236cac974fe09cd7845739a936f,2024-07-03T01:59:27.270000
@ -252852,8 +252852,8 @@ CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d2530
CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000
CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000
CVE-2024-34155,0,0,64e37c460754676e7cbab8f7ec11f790f32eeb0f21648d98691b68ee9a0deda9,2024-09-09T13:03:38.303000
CVE-2024-34156,0,1,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295f7d,2024-09-09T15:35:07.573000
CVE-2024-34158,0,1,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000
CVE-2024-34156,0,0,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295f7d,2024-09-09T15:35:07.573000
CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000
CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000
CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000
CVE-2024-34163,0,0,0359aa2bf9352c87fe65864c9b7813550ee369295a4e0ccc20c368017d1c80c6,2024-08-14T17:49:14.177000
@ -253236,11 +253236,11 @@ CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9
CVE-2024-34686,0,0,e9bb1b88f368d1635fab463778c0099fa75235c21c0d77c253e89ea0001f99e2,2024-08-16T17:54:46.250000
CVE-2024-34687,0,0,2d1fb3e427c306d9f3a4e574ef26ad04ac3746abee3e170bed2385765a3ef230,2024-05-14T19:17:55.627000
CVE-2024-34688,0,0,f7195c0aa4b21b145d71d8ca8f2dd3d8f80451302ff7a5fec7e22b7dba8274ce,2024-08-09T19:45:52.623000
CVE-2024-34689,0,1,f990d838313fa5ecb665b5d1a380a983a39ba5877a89002c8b735a954c3fb119,2024-09-09T15:31:15.670000
CVE-2024-34689,0,0,f990d838313fa5ecb665b5d1a380a983a39ba5877a89002c8b735a954c3fb119,2024-09-09T15:31:15.670000
CVE-2024-3469,0,0,cb7a58a01dcf9e5cd221e36a17138ff3dd47e8ff2900440904514d412daa843f,2024-06-13T19:36:21.350000
CVE-2024-34690,0,0,4ea79694f7343e6dc1a88ef361ec5aab6397a7fbe3528c348fa1124a1042b2a1,2024-08-09T19:25:15.680000
CVE-2024-34691,0,0,ff3e70160c2e7eaf3e33811c3b548ab97dcede1edc55d0bb050fc2dad140445e,2024-08-16T18:08:48.763000
CVE-2024-34692,0,1,a1031b201774e9dbcc1b7cfabf635fa7accc688002d1618f5206395a87a71f07,2024-09-09T15:33:55.200000
CVE-2024-34692,0,0,a1031b201774e9dbcc1b7cfabf635fa7accc688002d1618f5206395a87a71f07,2024-09-09T15:33:55.200000
CVE-2024-34693,0,0,0aaa9ba78d50edebdcd2053a5f69520a0132977a44461876bfc235b9965b7cd7,2024-06-20T12:43:25.663000
CVE-2024-34694,0,0,379682f7a43e392f519649f9bebfbde90c0aee7ee0fd96bf9efedf4736084c4e,2024-06-17T12:42:04.623000
CVE-2024-34695,0,0,36bf138bd01d1a9e805dc782757743f04a6dc6cc49c353e8806ae2bd6354a5a4,2024-05-14T16:12:23.490000
@ -254931,11 +254931,11 @@ CVE-2024-37167,0,0,8b403a23612bc52b0d647aa1a06bd5528e2a732152e9aa0e5b9c233c3dcf7
CVE-2024-37168,0,0,4b5ee69f1037f34364508ac66ea01fddc39d9641828e345c9db6ff8090485c51,2024-06-11T13:54:12.057000
CVE-2024-37169,0,0,d844eebd15b54c580e056676933f1b1a922628cb13269d7f2fd8205e27ffe212,2024-06-11T13:54:12.057000
CVE-2024-3717,0,0,6a53c3003cbd5c2c12dfecaf8fdee3a15999ce81e96eb3bfe3a5d5735223233b,2024-05-02T18:00:37.360000
CVE-2024-37171,0,1,e67fb8228f0d7521b64a3e879cec19a1be865b0dffead40cccf4e51e0386777c,2024-09-09T15:36:45.637000
CVE-2024-37172,0,1,8f138ca449582a67b3b5952f431cf921455929bf791f77b476255297995e895c,2024-09-09T15:41:06.010000
CVE-2024-37171,0,0,e67fb8228f0d7521b64a3e879cec19a1be865b0dffead40cccf4e51e0386777c,2024-09-09T15:36:45.637000
CVE-2024-37172,0,0,8f138ca449582a67b3b5952f431cf921455929bf791f77b476255297995e895c,2024-09-09T15:41:06.010000
CVE-2024-37173,0,0,5344666c1e0cddb531af6a9bc57b42f671061bfa956e11656cee997fc61edceb,2024-08-29T19:27:03.960000
CVE-2024-37174,0,0,9ee7b7b93c56662daddb97d3adf9e6471bc95a49234a325b3638d373b2a3c03d,2024-08-29T19:26:37.490000
CVE-2024-37175,0,1,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95669,2024-09-09T15:48:46.087000
CVE-2024-37175,0,0,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95669,2024-09-09T15:48:46.087000
CVE-2024-37176,0,0,3275b09004f17b6b89b755a43fa7e2802a78dd80261334da823124655666d26e,2024-08-09T18:42:31.847000
CVE-2024-37177,0,0,5c668d6fc8f89d275dab68dfc9c6e6aa2dda5828c4c067dd13278268042a6c87,2024-06-11T13:54:12.057000
CVE-2024-37178,0,0,ec0623af63b542a59bee4b0b0dc964702dff4ddb4fa5e9957a0a4c2999ed0559,2024-06-11T13:54:12.057000
@ -255937,8 +255937,8 @@ CVE-2024-38640,0,0,e1c17685524771685f37bb6e25615d0a15108cb7e69838b158e9077bf0a27
CVE-2024-38641,0,0,df92dc238d16f057f03f190a2a0bd50146ddee0163d1cf466c523734cfde7196,2024-09-09T13:03:38.303000
CVE-2024-38642,0,0,3d8e7fc3ed981740e72aa339618d54c8baab28ebc8e7f9af1bb8a029676a3e30,2024-09-09T13:03:38.303000
CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
CVE-2024-38650,0,1,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000
CVE-2024-38651,0,0,7e5c7bdde4f0e68aae62b3f7e8ff086b824de9feeace0ba5676ac48a23cb51a5,2024-09-09T13:03:38.303000
CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000
CVE-2024-38651,0,1,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
@ -256129,7 +256129,7 @@ CVE-2024-38993,0,0,fc2d7e57e39ddfcc6af2dbe204e666e6951361034badd73a54ed967e6430c
CVE-2024-38994,0,0,52e74c8e49acf40312bab2cc0a5b12a01f19b079b47741262e8027889427648c,2024-07-03T02:05:31.113000
CVE-2024-38996,0,0,a1527cd446e6396d926036d720f3d18c64e1e77ef3f93ca65d73a82bceb3de02,2024-07-03T02:05:31.903000
CVE-2024-38997,0,0,67cc6ee46b0f88f15a47d916defc512f0d73a6fe097801b2dbae8c76c5acc9e0,2024-07-03T02:05:32.753000
CVE-2024-38998,0,1,3b0925ddacd365a588c626b1c2ddee59a9c7fce10e672e6d248d6d30d9368792,2024-09-09T14:30:53.297000
CVE-2024-38998,0,0,3b0925ddacd365a588c626b1c2ddee59a9c7fce10e672e6d248d6d30d9368792,2024-09-09T14:30:53.297000
CVE-2024-38999,0,0,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd240d,2024-07-09T16:22:46.603000
CVE-2024-3900,0,0,0dae3ee77b7737dd7dc98eac4a82d471604ab0211f1ae6f2407cfeb20b2f5f33,2024-04-17T20:08:21.887000
CVE-2024-39000,0,0,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000
@ -256404,7 +256404,7 @@ CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210
CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000
CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000
CVE-2024-39497,0,0,2d6d1942d32951f62bed9c7f2b517cbb03d4fdefc867fdac7e0afd61c8c01f96,2024-07-12T16:34:58.687000
CVE-2024-39498,0,0,8499d4fca2fef01d5519bc11ef3f5949181fc3bd80858291ae745fb8f1cf4bc0,2024-07-12T16:34:58.687000
CVE-2024-39498,0,1,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000
CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000
CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
@ -256584,8 +256584,8 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000
CVE-2024-39714,0,0,2cc1987cc7b38530ba63f46b78e02ac09f93110d9b20471444f97bf1ebab6092,2024-09-09T13:03:38.303000
CVE-2024-39715,0,0,4d90b51c3423f76c71ae7b1b6a11258d1ae371404fb88dbbe4edf2e38b141715,2024-09-09T13:03:38.303000
CVE-2024-39714,0,1,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000
CVE-2024-39715,0,1,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
@ -256659,17 +256659,17 @@ CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998
CVE-2024-3986,0,0,f831ed7921be7c8dd7c23fd078f7bb708ba961923f567ec2fde6e41a687370b3,2024-07-30T13:32:45.943000
CVE-2024-39863,0,0,c951398f9fd72a9dfacd7010e5dd70d2523f65e226c113ed4d14cefbbdbc7a2c,2024-08-01T13:55:59.780000
CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000
CVE-2024-39865,0,1,2c7e8bebc57f85d46c59ac0674616508fa14610c3ed1fc7f548593921bc83a1a,2024-09-09T15:12:08.177000
CVE-2024-39866,0,1,0bddfcc7166db633e0a49dd296f68c67d479c22344839cf47c4ff170603ef05d,2024-09-09T15:18:08.287000
CVE-2024-39867,0,1,e0b523c69bf41895d3df037f6b822ca9285a09b8d9cfe0acfc9c28f6f1b409a8,2024-09-09T15:19:17.710000
CVE-2024-39868,0,1,78ccb1e363b02e6a5457d10d342090c91e1ddd9c3baeb364919e295c1513db63,2024-09-09T15:20:25.113000
CVE-2024-39869,0,1,2a98a7966dea8b84e0420990ca6ca60d60610e5bb2ffa0b0ee856d0ac6bd32db,2024-09-09T15:20:59.443000
CVE-2024-39865,0,0,2c7e8bebc57f85d46c59ac0674616508fa14610c3ed1fc7f548593921bc83a1a,2024-09-09T15:12:08.177000
CVE-2024-39866,0,0,0bddfcc7166db633e0a49dd296f68c67d479c22344839cf47c4ff170603ef05d,2024-09-09T15:18:08.287000
CVE-2024-39867,0,0,e0b523c69bf41895d3df037f6b822ca9285a09b8d9cfe0acfc9c28f6f1b409a8,2024-09-09T15:19:17.710000
CVE-2024-39868,0,0,78ccb1e363b02e6a5457d10d342090c91e1ddd9c3baeb364919e295c1513db63,2024-09-09T15:20:25.113000
CVE-2024-39869,0,0,2a98a7966dea8b84e0420990ca6ca60d60610e5bb2ffa0b0ee856d0ac6bd32db,2024-09-09T15:20:59.443000
CVE-2024-3987,0,0,561d9a131ce362c85fc0fb8dcbece381148b635d585315cae7f10b34598b7939,2024-06-07T14:56:05.647000
CVE-2024-39870,0,1,f4f5a1b62a4e2b774cca66ba202d2df839e4383c1fab2dd1630fb0ec5e81e380,2024-09-09T15:21:43.183000
CVE-2024-39870,0,0,f4f5a1b62a4e2b774cca66ba202d2df839e4383c1fab2dd1630fb0ec5e81e380,2024-09-09T15:21:43.183000
CVE-2024-39871,0,0,e3e081733d59550559abd98a1a1d3b568ae09bad776342114b1a824ad3292212,2024-09-06T18:32:01.667000
CVE-2024-39872,0,1,574f41ececf7bb009ac85776aa8f840f96c77ee6418907d60f3992a2c5c0d4e8,2024-09-09T15:24:26.130000
CVE-2024-39873,0,1,4e99f53e98f7fe49b46305004213cea2cc1b90b84c121b510ca16fb04ab6c4f6,2024-09-09T15:25:21.893000
CVE-2024-39874,0,1,1b0fc2539c0ac6bc22bd18d777d736e1cbea19ccdbf3d54727dde78f13e6ebf7,2024-09-09T15:25:33.577000
CVE-2024-39872,0,0,574f41ececf7bb009ac85776aa8f840f96c77ee6418907d60f3992a2c5c0d4e8,2024-09-09T15:24:26.130000
CVE-2024-39873,0,0,4e99f53e98f7fe49b46305004213cea2cc1b90b84c121b510ca16fb04ab6c4f6,2024-09-09T15:25:21.893000
CVE-2024-39874,0,0,1b0fc2539c0ac6bc22bd18d777d736e1cbea19ccdbf3d54727dde78f13e6ebf7,2024-09-09T15:25:33.577000
CVE-2024-39875,0,0,b76f0c8a29ed6ff66b830768611b71994a8f96bbc79bbe2616adacce32860808,2024-08-07T19:23:39.247000
CVE-2024-39876,0,0,c10d95a00655ea784974456837401b1167b43b9873d48be8c6f0ce574516dd40,2024-08-07T19:26:42.817000
CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624ace,2024-08-01T13:56:00.307000
@ -256927,7 +256927,7 @@ CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d31
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000
CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
CVE-2024-40643,1,1,a04c312db9b1f932101b834bf66d135196bcfee6846cd0548b3469f7ce4f4ae6,2024-09-09T15:15:11.597000
CVE-2024-40643,0,0,a04c312db9b1f932101b834bf66d135196bcfee6846cd0548b3469f7ce4f4ae6,2024-09-09T15:15:11.597000
CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
@ -256945,14 +256945,14 @@ CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb6919
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067bb31,2024-08-15T20:03:13.530000
CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000
CVE-2024-40709,0,1,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000
CVE-2024-40709,0,0,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
CVE-2024-40710,0,0,8e4daacbd40fd3e015531e2790ded75a312056419a79fa90fc58c6daae8b7018,2024-09-09T13:03:38.303000
CVE-2024-40711,0,0,e0dd2119a7b899af316c4bfed9f8450c17f1bc5c6e25b53e070b02a4df3c339b,2024-09-09T13:03:38.303000
CVE-2024-40712,0,0,cb27617c19c458de42a0ecbf854d1ef4747a1c91790e61cb1ee4f15c0f48e20f,2024-09-09T13:03:38.303000
CVE-2024-40713,0,1,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000
CVE-2024-40714,0,1,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000
CVE-2024-40718,0,1,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000
CVE-2024-40710,0,1,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000
CVE-2024-40711,0,1,361f1b538b9f657bc9f073bf0b7ae2c8e87e59189fa7af212f088252efa9b3ee,2024-09-09T16:35:05.923000
CVE-2024-40712,0,1,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000
CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000
CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000
CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
CVE-2024-40720,0,0,e3c4e07a5ade01e9d26666cc5005a1336c172439685cd3e2319312a77895564d,2024-08-09T14:36:35.047000
@ -257131,12 +257131,12 @@ CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
CVE-2024-40962,0,0,3d1366142cae87f99bee1d01922e9c3346fad92689b81dead457f2b7f460d17c,2024-07-12T16:34:58.687000
CVE-2024-40963,0,0,2a96578cd7c6af1c34baa4ac9a95077df49820df6548101e36fdd738e266e9e1,2024-07-12T16:34:58.687000
CVE-2024-40964,0,0,8bff4d41a46ac9d6829f19fd33bf0e02f0b0ad8b80ccef4bbeb277fd43635f0c,2024-07-12T16:34:58.687000
CVE-2024-40965,0,0,352cc308207e32882304c7073c28caa832dc56e8e28009cb7548f4ac2c04adde,2024-07-12T16:34:58.687000
CVE-2024-40964,0,1,bd4dac04992501f9fd0e201796f1ee0c4d72c42426ef223857d38e1de010ee1d,2024-09-09T17:48:55.847000
CVE-2024-40965,0,1,92f237bf538901b9ac55ac9b949dff9be047f3e7c43dbb137cb33205a52f1db1,2024-09-09T17:57:18.697000
CVE-2024-40966,0,0,4ce1565a3462904d8a95236c2afe6caa74a4190b9d43f1c02099c2813b4515f5,2024-07-12T16:34:58.687000
CVE-2024-40967,0,0,78c9dc643b84c87834ced9e7f107ee113d380f1bfd9e6d254ca2d7db3d2f8f8b,2024-07-12T16:34:58.687000
CVE-2024-40967,0,1,5718545438538db86b5a682b261aed717a2ae65dfaddd38bc85d5d6dfd9462f7,2024-09-09T17:58:49.700000
CVE-2024-40968,0,0,58b9d422fff97fcd02e7db46722391c97023d99d4c5142a1da4df7b00c917750,2024-07-12T16:34:58.687000
CVE-2024-40969,0,0,1bfcf25708256f5d6b8c0904795150b0cc613140a89c50ec7cf4a3ac71e586a1,2024-07-12T16:34:58.687000
CVE-2024-40969,0,1,bd76f22baee998edd0eecd2dc4390c859ca101f12b7c1b85df829c6cdeb35103,2024-09-09T17:59:29.787000
CVE-2024-4097,0,0,66ffa92526301cf6212a4835a680920c0ae3100deab31b53b6ec7270ebab3252,2024-05-02T18:00:37.360000
CVE-2024-40970,0,0,d88eb9e98b544c6dabc96abad6de0495364e0a940487d036ee8839c00f74ddcc,2024-07-12T16:34:58.687000
CVE-2024-40971,0,0,3a1ab5847a8c301b704d8bdd427dc329bf7ad68865a6fa0d6bfff5bf33c1b1e6,2024-07-12T16:34:58.687000
@ -257728,13 +257728,13 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e
CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
CVE-2024-42019,0,0,fc63ec3b5cc837684bb1c5b283ec5c555ca44a9775f1f47d31a6429008fd66aa,2024-09-09T13:03:38.303000
CVE-2024-42019,0,1,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000
CVE-2024-42021,0,1,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000
CVE-2024-42022,0,1,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000
CVE-2024-42023,0,1,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000
CVE-2024-42024,0,1,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000
CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000
CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000
CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000
CVE-2024-42024,0,0,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000
CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000
CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000
CVE-2024-42030,0,0,59fa56f47f76e92b6c6c6a3fdcb37d68b092a6ac90822c136b288bb49e8250df,2024-08-20T16:55:16.100000
@ -258859,6 +258859,7 @@ CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c7109
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000
CVE-2024-44333,1,1,a217e37b46b027f8dd7a13c3184f55fdcbee3b3214e03688ea541390163afd0a,2024-09-09T17:15:13.120000
CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000
CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000
CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000
@ -258866,7 +258867,7 @@ CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb7
CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000
CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000
CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000
CVE-2024-44375,1,1,c2ae69cbc723aea7579455f6ebc15cdc81a4940d69f5da87c1c2bddc9c15de6e,2024-09-09T14:15:14.290000
CVE-2024-44375,0,0,c2ae69cbc723aea7579455f6ebc15cdc81a4940d69f5da87c1c2bddc9c15de6e,2024-09-09T14:15:14.290000
CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000
CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000
CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000
@ -258925,6 +258926,8 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037
CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000
CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000
CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000
CVE-2024-44720,1,1,315d4d2a0bd3c25c50b9c634960d467a7635424632644997a922df1d0e7e35ef,2024-09-09T17:35:06.057000
CVE-2024-44721,1,1,b7a3f0061045e2f9816c8d1362a21479689750c2938d1c13b4ea274c91b49d8b,2024-09-09T16:15:02.853000
CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000
CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
@ -258957,8 +258960,8 @@ CVE-2024-44820,0,0,23715176f3bb998fe09881aa49c8309f9c9998e3ed78bd103540e1e827823
CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
CVE-2024-44837,0,0,af289e308b7ef679646ea84b321f67c69f09e8e064f0783e312580da955007a4,2024-09-06T16:46:26.830000
CVE-2024-44838,0,1,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000
CVE-2024-44839,0,1,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b73e1,2024-09-09T15:35:10.797000
CVE-2024-44838,0,0,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000
CVE-2024-44839,0,0,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b73e1,2024-09-09T15:35:10.797000
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
CVE-2024-44844,0,0,d7edb2946c54286eb06291f1bb0ae1e0cb5e3a83126388a72075b84fdd746e33,2024-09-09T13:03:38.303000
CVE-2024-44845,0,0,84e2ecc1fd17f5d60179e3847f33ab1653ec969cd3a24d664be1cdba966a3b62,2024-09-09T13:03:38.303000
@ -259069,14 +259072,14 @@ CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36
CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b2205353433a,2024-06-04T19:20:39.640000
CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000
CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000
CVE-2024-45034,0,1,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000
CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000
CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000
CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
CVE-2024-45039,0,0,73f90f9455839525425d48713bfe0ff12a525d69b4089ad55a03f7d130bbe254,2024-09-06T16:46:26.830000
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45040,0,0,66fa952a980adfe3c28c0b6707b447d68c76ae01c0168cd5a5130d4c4798d20c,2024-09-06T16:46:26.830000
CVE-2024-45041,1,1,76e90f035276fcf866db491ee4611b3feb28ed2e3671a49528af002652301a08,2024-09-09T15:15:11.940000
CVE-2024-45041,0,0,76e90f035276fcf866db491ee4611b3feb28ed2e3671a49528af002652301a08,2024-09-09T15:15:11.940000
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000
@ -259211,6 +259214,7 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91
CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000
CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000
CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000
CVE-2024-45406,1,1,bcbca4ccebf0fc90e19317fc2128c582fbe2f397d8d5fee9fa03c673c61e6676,2024-09-09T17:15:13.180000
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000
@ -259290,7 +259294,7 @@ CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46
CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
CVE-2024-45771,0,1,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000
CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000
CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000
@ -260741,12 +260745,12 @@ CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa6443
CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000
CVE-2024-6272,0,0,f7daf3f4a3aace9a87ac703b7515196ea33a67e89fc732d0dfedb60e5408f0c9,2024-08-01T15:35:19.753000
CVE-2024-6273,0,0,d046e8009aa5553aa5bf1fd3a64a9eb55ab80ff6184fba9c23626c1afd5e8440,2024-09-06T16:54:20.973000
CVE-2024-6274,0,0,94c6587c1855551141a3e7938b9219cf4669665fd98c0aaa76cdad50f25d0491,2024-06-24T12:57:36.513000
CVE-2024-6275,0,0,f2d5974530bc456b631957816b5a13c0afcae0737fc51045646d8855f7d13ef3,2024-06-25T16:15:25.923000
CVE-2024-6276,0,0,953eb5cf72f1a18fd0a7cd9b55bd985bd1378bad5499931c2fa5b21cdcbd168c,2024-06-24T15:15:12.200000
CVE-2024-6277,0,0,896f8a9030cb3d0e10b19f0d1686f1a0541d7b712108f3958905e9063da1ba76,2024-06-24T15:15:12.297000
CVE-2024-6278,0,0,32b451e1b397e0b46c6c8a83366e2193de9e2a2b3edaadfee59f60e6342ae183,2024-06-24T14:15:13.293000
CVE-2024-6279,0,0,34fa8ecf4323d69d73350c0ff99d9253bc189a156b750996ccd29f3da26f84ab,2024-06-26T20:15:17.003000
CVE-2024-6274,0,1,db8bfacbab3e41e186c76ac517f910a1d0628ea50e93784530b08ac7956bf39d,2024-09-09T16:15:27.780000
CVE-2024-6275,0,1,7cbccc39bde4a795cde54afdb3fc1b8b532ed328b618c2b10a8f716c6775006e,2024-09-09T17:20:46.777000
CVE-2024-6276,0,1,a54e62a78dc8ca63b29b87fd05364fc7b8a2f230b48b77f2d716d5640107aff7,2024-09-09T17:20:48.280000
CVE-2024-6277,0,1,cdc407f78f971611f7a162adf54a64c93a9cb94e3239cd776401700e75ae18bc,2024-09-09T17:20:50.147000
CVE-2024-6278,0,1,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e36230,2024-09-09T17:20:52.050000
CVE-2024-6279,0,1,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000
CVE-2024-6280,0,0,53e9097fb099dd3ec6185a9b8b59575874e3b050c48e208cc0f20896ca10b944,2024-09-06T16:52:22.133000
CVE-2024-6281,0,0,709a859f49498e3e71bff09d88107556f15663d7c1ae6811fce3a162e288bb4f,2024-07-22T13:00:53.287000
CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000
@ -261204,7 +261208,7 @@ CVE-2024-6905,0,0,d2866e0a7d3747dac026ea98f4db9a35d905d0462b1cfb352305554736cc69
CVE-2024-6906,0,0,443e7519587f09813d3604bd2f060eb5fd20e9ad214121b65d696b6b4cd41fa5,2024-07-30T16:29:47.097000
CVE-2024-6907,0,0,9c6270ce9f9c570726d59d5bb26a5447e18c4636767aab7051423d31252e8bfe,2024-07-30T16:29:32.840000
CVE-2024-6908,0,0,39238ceecec75ca0113efef9ebf9de02325a2ecd066a43e78f16c4451849b776,2024-07-22T13:00:53.287000
CVE-2024-6910,0,1,f2ed544b366d5f927a78e194a0d7c1a8783c058f2e24ef5344fdc371d00f4827,2024-09-09T14:35:08.260000
CVE-2024-6910,0,0,f2ed544b366d5f927a78e194a0d7c1a8783c058f2e24ef5344fdc371d00f4827,2024-09-09T14:35:08.260000
CVE-2024-6911,0,0,d1b9d39eb3bb8ebb3934fda1e3b9f404c596e1cca0d98b484bc5bed837f5d646,2024-07-24T12:55:13.223000
CVE-2024-6912,0,0,3c65faab1f258fca4a54b1dfa1909614385f3b9406f126d28351856c324b7a3b,2024-07-24T12:55:13.223000
CVE-2024-6913,0,0,a1e0a3537af4550f8eea980e4a1a05a6857aad018f9d3be30c6504fe1f19569f,2024-07-24T12:55:13.223000
@ -261293,7 +261297,7 @@ CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400
CVE-2024-7012,0,0,f0e0d2f8670ad7a792afb91a6b1a381690a310d17396ef501ada2605889c18fa,2024-09-05T21:39:20.950000
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
CVE-2024-7015,1,1,a37549cf37e709a8db2d5e78b8cfa589e277c584ce2636170c10712178ad247b,2024-09-09T14:15:14.430000
CVE-2024-7015,0,0,a37549cf37e709a8db2d5e78b8cfa589e277c584ce2636170c10712178ad247b,2024-09-09T14:15:14.430000
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
CVE-2024-7029,0,0,771467b06f5734847da574d5da21068e3e7ec9c8571a268614524f88178f1827,2024-08-30T21:15:14.420000
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
@ -261728,7 +261732,7 @@ CVE-2024-7640,0,0,a904ac98281d1ae12fa6cf830538035c8287c0eff0403b9351fbe43bd7af15
CVE-2024-7641,0,0,31531d7ba6c4790873e3e2cbb5e0f029b43c16ba80a6eb72b0be87c407522388,2024-08-15T18:17:06.590000
CVE-2024-7642,0,0,7529ae7f3e258c0bacf9321b53a5a8cb22d41a7a410253e46b217922db56c34d,2024-08-15T18:17:34.597000
CVE-2024-7643,0,0,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c1a,2024-08-15T18:18:22.827000
CVE-2024-7644,0,1,e63d0a9dda91ba6db40f6f1d421591ac281d9566d29d32a71e7615a7e1c58496,2024-09-09T15:15:12.197000
CVE-2024-7644,0,0,e63d0a9dda91ba6db40f6f1d421591ac281d9566d29d32a71e7615a7e1c58496,2024-09-09T15:15:12.197000
CVE-2024-7645,0,0,96cf494c675c38f631be8ab24881ec75b542e3b7a70aa5d3b002279709a08889,2024-08-19T17:48:06.303000
CVE-2024-7646,0,0,0e47e4757200b360ac0ac2cd875beb2809de05dd15d4a2274662b759af795194,2024-08-19T13:00:23.117000
CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1e6,2024-08-21T12:30:33.697000
@ -261761,9 +261765,9 @@ CVE-2024-7683,0,0,0e60e4af191d77a965d4296d84a49c07e8af0f778b10dae064ea9d4491f47a
CVE-2024-7684,0,0,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb7719f,2024-08-20T13:53:24.447000
CVE-2024-7685,0,0,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000
CVE-2024-7686,0,0,f064743866c554c4f2e90ed0b10058d3ac9c7fa057a74b3ddc10388a40d22334,2024-08-20T14:03:12.533000
CVE-2024-7687,0,1,ff01fbd87f46ca31e8f3d10833f95f2a29331d146df59252c62ef841397872f4,2024-09-09T14:35:09.030000
CVE-2024-7688,0,1,3e3048b4d79bdc6082a04ce55b0c1ccdfd0443d9392853878d08b0a9441df216,2024-09-09T14:35:09.803000
CVE-2024-7689,0,1,7656509204534709decd1cab2d065f8ad876c473db0288eeff091af7c4fac844,2024-09-09T14:35:10.587000
CVE-2024-7687,0,0,ff01fbd87f46ca31e8f3d10833f95f2a29331d146df59252c62ef841397872f4,2024-09-09T14:35:09.030000
CVE-2024-7688,0,0,3e3048b4d79bdc6082a04ce55b0c1ccdfd0443d9392853878d08b0a9441df216,2024-09-09T14:35:09.803000
CVE-2024-7689,0,0,7656509204534709decd1cab2d065f8ad876c473db0288eeff091af7c4fac844,2024-09-09T14:35:10.587000
CVE-2024-7690,0,0,d641c397b389582990875041f83e3f7cf4b821780cef851109280aeeabb26909,2024-09-03T14:35:08.507000
CVE-2024-7691,0,0,be3e7969d66daef31c8f4d2ca08f6fc545d3ce4a9f5e0f354c807322de787fd3,2024-09-03T16:35:11.383000
CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b483,2024-09-03T16:35:12.363000
@ -261891,7 +261895,7 @@ CVE-2024-7913,0,0,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f228
CVE-2024-7914,0,0,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000
CVE-2024-7916,0,0,2890180016b54dc9da9d7caa383969ad75f3180954e602dd9178d25d09afddce,2024-08-20T19:38:11.163000
CVE-2024-7917,0,0,1232374447889b44f95a3651db2b7e919b58eb5c9a0d77c398ae62eee2338564,2024-08-21T12:30:34.283000
CVE-2024-7918,0,1,b27817e14af75484fa42e05d953de78e8f6ce99b51521eb7ec7ca526a426118b,2024-09-09T14:35:10.777000
CVE-2024-7918,0,0,b27817e14af75484fa42e05d953de78e8f6ce99b51521eb7ec7ca526a426118b,2024-09-09T14:35:10.777000
CVE-2024-7919,0,0,1863f3ded361827cbb07eac1eea3f3ab9748bf8576157da3db06c534b87a214c,2024-08-21T12:30:01.187000
CVE-2024-7920,0,0,03604c94082c1da3fc5c107dc3e686ed281b4a09d67a2a74662346c68cad27ae,2024-08-21T12:31:20.663000
CVE-2024-7921,0,0,0f227aa56af57464e66f96a1f8f7af9df81009de406656147353a8e23b801955,2024-08-21T12:34:04.490000
@ -261963,7 +261967,7 @@ CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fc
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
CVE-2024-8041,0,0,6cc075dd4dd503d7a64ec1eb36d717de84b169042dbabd262ae9b25dfe6faf7c,2024-08-23T16:18:28.547000
CVE-2024-8042,1,1,fff5d3a74bcd7a118083cddbd0cfac12e08a7843571e00308c3cc8aa8f2b757f,2024-09-09T15:15:12.340000
CVE-2024-8042,0,0,fff5d3a74bcd7a118083cddbd0cfac12e08a7843571e00308c3cc8aa8f2b757f,2024-09-09T15:15:12.340000
CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000
CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000
CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000
@ -262125,8 +262129,8 @@ CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927b
CVE-2024-8368,0,0,e041f44a528823075791907fb829fe4e23ee08e4bad517d1712c799858033925,2024-09-03T12:59:02.453000
CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
CVE-2024-8372,1,1,2792f9d8fc26192f2671e203534099dfcbde4d0179752e976e32f88cec413d35,2024-09-09T15:15:12.560000
CVE-2024-8373,1,1,1722d285f33756679044e475509012f93960f00a816512e5e1c7ffc95f14c6c1,2024-09-09T15:15:12.887000
CVE-2024-8372,0,0,2792f9d8fc26192f2671e203534099dfcbde4d0179752e976e32f88cec413d35,2024-09-09T15:15:12.560000
CVE-2024-8373,0,1,ca541a80f0aad718210fd95191cc74ae91005590cfc887f71e4ebdc821b651ae,2024-09-09T16:15:02.927000
CVE-2024-8374,0,0,9f8f53baf1bfbc489185aa032a32ccc1ef270e4caf925e0db81beb808ee10da0,2024-09-03T12:59:02.453000
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
@ -262174,7 +262178,7 @@ CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918c
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
CVE-2024-8509,0,0,607386a7561a0cf76a75ba79c4a5e02f31641d78da4de1b4e77855ea4dab4759,2024-09-06T16:46:26.830000
CVE-2024-8517,0,0,dd54451250ef733f34d101e59543ab502b0f838be96aeb1d29d2d441533a5eed,2024-09-06T16:46:26.830000
CVE-2024-8517,0,1,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000
CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
@ -262210,3 +262214,5 @@ CVE-2024-8584,0,0,7c7ad2063aa233a836e9a59682cb05dfcb95a707aa850cd9ec5b817e03f5e1
CVE-2024-8585,0,0,9988d1ca177f24ec925e5066ed58d9d8a162814f82b8247fbc323ff8f14711cf,2024-09-09T13:03:38.303000
CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000
CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000
CVE-2024-8604,1,1,f8b7b7c3ac8ec659db72b62715d729cc6c8fc244da32bec2a2343fe3141c4500,2024-09-09T16:15:03.203000
CVE-2024-8605,1,1,9804f309cecb16f6ee9b2ecaaae8931160ed1bde4e8a34dda2a863907695a175,2024-09-09T16:15:03.570000

Can't render this file because it is too large.