Auto-Update: 2024-08-22T22:00:17.044146+00:00

This commit is contained in:
cad-safe-bot 2024-08-22 22:03:14 +00:00
parent 55de7e7bb8
commit 60d7a9429d
62 changed files with 2861 additions and 274 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3600",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-01-08T19:15:08.470",
"lastModified": "2024-01-11T18:40:05.340",
"lastModified": "2024-08-22T20:29:55.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,16 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14",
"versionStartIncluding": "4.14.115",
"versionEndExcluding": "4.14.308",
"matchCriteriaId": "7B01397E-F6D7-4353-BE25-4951FE26F18B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.206",
"matchCriteriaId": "FD710309-3897-495A-8AE3-4BD2EFA790E0"
"matchCriteriaId": "FA79A011-2A9D-48C5-B43E-0340D350528C"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46950",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.420",
"lastModified": "2024-04-10T20:13:16.993",
"lastModified": "2024-08-22T20:28:57.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -61,44 +61,51 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.0",
"versionStartIncluding": "4.14.147",
"versionEndExcluding": "4.14.233",
"matchCriteriaId": "86B2A77C-6C00-4E2C-9294-8E428795F340"
"matchCriteriaId": "06219DEF-0B7F-4D93-9878-9DC640945517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15.0",
"versionStartIncluding": "4.19.77",
"versionEndExcluding": "4.19.191",
"matchCriteriaId": "B7281E1E-A00B-49C0-A849-9CE1CE780227"
"matchCriteriaId": "3E80ED24-F781-449F-8035-CBA0FB5C6691"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.0",
"versionStartIncluding": "5.2.19",
"versionEndExcluding": "5.3",
"matchCriteriaId": "48875F15-B129-4684-8556-4EAD32A9586F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.4",
"versionEndExcluding": "5.4.118",
"matchCriteriaId": "5670AEA3-082C-42D6-A067-CD9ECED4B84B"
"matchCriteriaId": "9904B6DF-B2DB-4584-B17A-8EEC7C81258B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.36",
"matchCriteriaId": "C7148769-B830-4B8F-986F-E0C85A19FC7F"
"matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.20",
"matchCriteriaId": "EFB425F0-C28C-4B44-8B4C-AD512AA832DE"
"matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12.0",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.3",
"matchCriteriaId": "C3814FA3-8141-4313-A852-8C4212BE12AD"
"matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2585",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-01-08T18:15:44.383",
"lastModified": "2024-01-19T17:14:35.877",
"lastModified": "2024-08-22T20:28:23.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -92,8 +92,29 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "6.0",
"matchCriteriaId": "83F78277-6AE5-49BE-B412-E200DE9C0AB2"
"versionEndExcluding": "5.10.137",
"matchCriteriaId": "674AABE4-BC3E-4530-9717-5DFE7AB70A3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.61",
"matchCriteriaId": "51861563-7F40-460F-82CD-2D3FBDAD6618"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.18",
"matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "5.19.2",
"matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2588",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-01-08T18:15:44.840",
"lastModified": "2024-01-12T16:47:44.873",
"lastModified": "2024-08-22T20:28:03.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -91,8 +91,57 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.19.17",
"matchCriteriaId": "3369AE19-74F5-4B36-A1B4-3C7A6FC23C3B"
"versionEndExcluding": "4.9.326",
"matchCriteriaId": "5B4EA906-CFF9-4D4A-AFD7-43AC02C77E48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.291",
"matchCriteriaId": "3BBC7E43-6161-4F21-977C-5BB7792C6C94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.256",
"matchCriteriaId": "6C47CDE3-B039-4AE5-B8E4-1DC820E473FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.211",
"matchCriteriaId": "B1C63D19-C08C-4308-A848-B2523C9275BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.137",
"matchCriteriaId": "C2BF720F-C5EE-4DE2-9BDF-CE4CFBC767F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.61",
"matchCriteriaId": "51861563-7F40-460F-82CD-2D3FBDAD6618"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.18",
"matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "5.19.2",
"matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48425",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-19T03:15:11.633",
"lastModified": "2023-04-13T17:15:07.703",
"vulnStatus": "Modified",
"lastModified": "2024-08-22T20:27:26.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,8 +57,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.2.7",
"matchCriteriaId": "65EFC60C-1DC7-4346-96FE-E60D4F634F3B"
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.113",
"matchCriteriaId": "75B3BF61-F56C-4BD7-94AF-50E17A4AA732"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.33",
"matchCriteriaId": "B443970D-73AA-4C9A-9338-25D38130D285"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.3.4",
"matchCriteriaId": "26C54BF0-3EED-46D4-92A7-5F07F658B49B"
}
]
}
@ -82,7 +97,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230413-0006/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48934",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-22T04:15:16.357",
"lastModified": "2024-08-22T12:48:02.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T20:33:29.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfp: flower: corrige una fuga potencial en nfp_tunnel_add_shared_mac() ida_simple_get() devuelve una identificaci\u00f3n entre min (0) y max (NFP_MAX_MAC_INDEX) incluida. Entonces NFP_MAX_MAC_INDEX (0xff) es una identificaci\u00f3n v\u00e1lida. Para que la ruta de manejo de errores funcione correctamente, el valor 'no v\u00e1lido' para 'ida_idx' no debe estar en el rango 0..NFP_MAX_MAC_INDEX, incluida. As\u00ed que config\u00farelo en -1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.4.182",
"matchCriteriaId": "1CDEB4A7-1804-4926-A8B9-CD0849352FA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.103",
"matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.26",
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.12",
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3a14d0888eb4b0045884126acc69abfb7b87814d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4086d2433576baf85f0e538511df97c8101e0a10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ad5886f85b6bd893e3ed19013765fb0c243c069",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d8097caa73200710d52b9f4d9f430548f46a900",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af4bc921d39dffdb83076e0a7eed1321242b7d87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2176",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-20T21:15:08.937",
"lastModified": "2023-07-27T15:21:17.413",
"lastModified": "2024-08-22T20:26:17.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -68,8 +68,15 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1.81",
"matchCriteriaId": "89A51AC3-83B4-4F44-B496-385D10612456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.3",
"matchCriteriaId": "51ECE2D8-6904-404A-A11A-356BAD8B12F2"
"matchCriteriaId": "8682F89E-B23D-4D17-AE3E-E32BF630CCC6"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29929",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:09.173",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T21:15:15.840",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "http://loadmaster.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/YSaxon/CVE-2023-29929/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32257",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:11.680",
"lastModified": "2023-12-22T17:06:02.047",
"lastModified": "2024-08-22T20:30:50.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -92,8 +92,15 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.145",
"matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.29",
"matchCriteriaId": "7E233AD0-DABB-4668-93A7-DD0909B16CB9"
"matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32258",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:11.750",
"lastModified": "2023-11-17T18:29:58.827",
"lastModified": "2024-08-22T20:30:28.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -92,8 +92,15 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.145",
"matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.29",
"matchCriteriaId": "7E233AD0-DABB-4668-93A7-DD0909B16CB9"
"matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3611",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-07-21T21:15:11.897",
"lastModified": "2024-01-11T19:15:10.547",
"vulnStatus": "Modified",
"lastModified": "2024-08-22T20:25:34.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -88,8 +88,50 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8",
"versionEndExcluding": "6.5",
"matchCriteriaId": "CF31EEDA-1400-421A-BE85-493473C7CD70"
"versionEndExcluding": "4.14.322",
"matchCriteriaId": "F395B68F-3350-4D7E-A0F3-DBE2FC9A7E0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.291",
"matchCriteriaId": "D2D2CA9F-4CC4-4AF5-8C6D-E58415AB782E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.253",
"matchCriteriaId": "0707E9FF-8CDE-4AC1-98F3-5BB74EF88F8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.188",
"matchCriteriaId": "43CAE50A-4A6C-488E-813C-F8DB77C13C8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.121",
"matchCriteriaId": "EC77775B-EC31-4966-966C-1286C02B2A85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.40",
"matchCriteriaId": "69315BCC-36D2-45CD-84F8-381EDF8E38F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "923F6AEA-C2EF-4B08-B038-69A18F3D41F8"
},
{
"vulnerable": true,
@ -154,7 +196,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0002/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3776",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-07-21T21:15:11.973",
"lastModified": "2024-02-02T14:15:53.723",
"vulnStatus": "Modified",
"lastModified": "2024-08-22T20:24:45.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -87,9 +87,51 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6",
"versionEndExcluding": "6.5",
"matchCriteriaId": "6CC235BB-2BE9-4F58-993C-D5A1C422818E"
"versionStartIncluding": "2.6.12",
"versionEndExcluding": "4.14.322",
"matchCriteriaId": "E7A8308C-F4B2-4261-B590-BCD968EF650E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.291",
"matchCriteriaId": "D2D2CA9F-4CC4-4AF5-8C6D-E58415AB782E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.251",
"matchCriteriaId": "7FA663C4-CA72-4B5A-8592-7354D978F58E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.188",
"matchCriteriaId": "43CAE50A-4A6C-488E-813C-F8DB77C13C8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.121",
"matchCriteriaId": "EC77775B-EC31-4966-966C-1286C02B2A85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.40",
"matchCriteriaId": "69315BCC-36D2-45CD-84F8-381EDF8E38F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "923F6AEA-C2EF-4B08-B038-69A18F3D41F8"
},
{
"vulnerable": true,
@ -137,7 +179,11 @@
},
{
"url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f",
@ -166,11 +212,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240202-0003/",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43844",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-28T19:15:09.333",
"lastModified": "2024-05-29T13:02:09.280",
"lastModified": "2024-08-22T20:35:01.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Aten PE6208 2.3.228 y 2.4.232 tienen credenciales predeterminadas para la cuenta de interfaz web privilegiada. No se solicita al usuario que cambie las credenciales despu\u00e9s de iniciar sesi\u00f3n por primera vez. Si no se modifica, los atacantes pueden iniciar sesi\u00f3n en la interfaz web y obtener privilegios de administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1392"
}
]
}
],
"references": [
{
"url": "https://github.com/setersora/pe6208",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51518",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-27T09:15:36.983",
"lastModified": "2024-02-27T14:20:06.637",
"lastModified": "2024-08-22T21:35:00.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Apache James anterior a las versiones 3.7.5 y 3.8.0 expone un endpoint JMX en localhost sujeto a deserializaci\u00f3n previa a la autenticaci\u00f3n de datos que no son de confianza. Dado un dispositivo de deserializaci\u00f3n, esto podr\u00eda aprovecharse como parte de una cadena de explotaci\u00f3n que podr\u00eda resultar en una escalada de privilegios. Tenga en cuenta que, de forma predeterminada, el endpoint JMX solo est\u00e1 vinculado localmente. Recomendamos a los usuarios: - Actualizar a una versi\u00f3n de Apache James no vulnerable - Ejecutar Apache James aislado de otros procesos (docker - m\u00e1quina virtual dedicada) - Si es posible, desactive JMX"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51931",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T09:15:08.247",
"lastModified": "2024-02-16T13:37:51.433",
"lastModified": "2024-08-22T21:35:01.133",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en alanclarke URLite v.3.1.0 permite a un atacante provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un payload manipulado para la funci\u00f3n de an\u00e1lisis."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2023-7260",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-22T21:15:16.107",
"lastModified": "2024-08-22T21:15:16.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal vulnerability discovered in OpenText\u2122 CX-E Voice, \n\naffecting all version through 22.4. The vulnerability could allow\u00a0arbitrarily access files on the system."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Amber",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NEGLIGIBLE",
"automatable": "YES",
"recovery": "AUTOMATIC",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "AMBER",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0823114",
"source": "security@opentext.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22014",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T18:15:10.143",
"lastModified": "2024-04-15T19:12:25.887",
"lastModified": "2024-08-22T21:35:02.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema descubierto en 360 Total Security Antivirus hasta la versi\u00f3n 11.0.0.1061 para Windows permite a los atacantes obtener privilegios aumentados a trav\u00e9s de Symbolic Link Follow hasta la eliminaci\u00f3n arbitraria de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://github.com/mansk1es/CVE_360TS",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22590",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-28T16:15:12.573",
"lastModified": "2024-05-28T17:11:55.903",
"lastModified": "2024-08-22T20:35:03.440",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El motor TLS en Kwik commit 745fd4e2 no rastrea el estado actual de la conexi\u00f3n. Esta vulnerabilidad puede permitir que los mensajes de saludo del cliente se sobrescriban en cualquier momento, incluso despu\u00e9s de que se haya establecido una conexi\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-372"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/QUICTester/ea3eb2ac736bb63e47c654e14e3ec556",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24938",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:10.303",
"lastModified": "2024-02-09T01:05:13.527",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T20:35:04.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -56,6 +56,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25657",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T20:15:09.013",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-08-22T20:35:04.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una redirecci\u00f3n abierta en la funcionalidad de inicio de sesi\u00f3n/cierre de sesi\u00f3n de la administraci\u00f3n web en AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS podr\u00eda permitir a atacantes redirigir a usuarios autenticados a sitios web maliciosos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25657",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25738",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-22T19:15:08.807",
"lastModified": "2024-05-24T01:15:30.977",
"lastModified": "2024-08-22T20:35:05.737",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /Upgrade/FixConfig en Open Library Foundation VuFind 2.0 hasta 9.1 anterior a 9.1.1 permite a un atacante remoto sobrescribir archivos de configuraci\u00f3n locales para obtener acceso al panel de administrador y lograr la ejecuci\u00f3n remota de c\u00f3digo. Un factor atenuante es que requiere que est\u00e9 activada la configuraci\u00f3n de tiempo de ejecuci\u00f3n de PHP enable_url_include, que est\u00e1 desactivada en las instalaciones predeterminadas. Tambi\u00e9n requiere que se exponga la ruta /Upgrade, que se expone de forma predeterminada despu\u00e9s de instalar VuFind, y se recomienda deshabilitarla configurando autoConfigure en false en config.ini."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://vufind.org/wiki/security:cve-2024-25738",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27209",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:48.160",
"lastModified": "2024-03-15T20:15:08.860",
"lastModified": "2024-08-22T20:35:06.747",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En TBD de TBD, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28213",
"sourceIdentifier": "cve@navercorp.com",
"published": "2024-03-07T05:15:54.710",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-08-22T20:35:07.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "nGrinder anterior a 3.5.9 permite aceptar objetos Java serializados de usuarios no autenticados, lo que podr\u00eda permitir a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la deserializaci\u00f3n de objetos Java no seguros."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@navercorp.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28390",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T04:15:09.640",
"lastModified": "2024-03-14T12:52:09.877",
"lastModified": "2024-08-22T21:35:03.607",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en el m\u00f3dulo de complementos avanzados ultimateimagetool para PrestaShop anterior a v.2.2.01 permite a un atacante remoto escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un control de acceso inadecuado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2024/03/12/ultimateimagetool.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30187",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T08:15:36.587",
"lastModified": "2024-03-25T13:47:14.087",
"lastModified": "2024-08-22T21:35:04.480",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Anope anterior a 2.0.15 no impide restablecer la contrase\u00f1a de una cuenta suspendida."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [
{
"url": "https://github.com/anope/anope/commit/2b7872139c40ea5b0ca96c1d6595b7d5f9fa60a5",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3219",
"sourceIdentifier": "cna@python.org",
"published": "2024-07-29T22:15:04.970",
"lastModified": "2024-08-05T15:15:53.960",
"lastModified": "2024-08-22T20:15:09.143",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,52 @@
"value": "Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. El m\u00f3dulo \"socket\" proporciona un respaldo de Python puro a la funci\u00f3n socket.socketpair() para plataformas que no admiten AF_UNIX, como Windows. Esta implementaci\u00f3n pura de Python utiliza AF_INET o AF_INET6 para crear un par de sockets conectados localmente. La conexi\u00f3n entre los dos sockets no se verific\u00f3 antes de devolverlos al usuario, lo que deja al socket del servidor vulnerable a una ejecuci\u00f3n de conexi\u00f3n de un par local malicioso. Las plataformas que admiten AF_UNIX, como Linux y macOS, no se ven afectadas por esta vulnerabilidad. Las versiones anteriores a CPython 3.5 no se ven afectadas debido a que no se incluye la API vulnerable."
}
],
"metrics": {},
"metrics": {
"cvssMetricV40": [
{
"source": "cna@python.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 2.1,
"baseSeverity": "LOW"
}
}
]
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/29/3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33904",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T06:15:17.320",
"lastModified": "2024-04-29T12:42:03.667",
"lastModified": "2024-08-22T20:35:09.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En plugins/HookSystem.cpp en Hyprland hasta 0.39.1 (antes de 28c8561), a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n, un atacante local puede provocar la ejecuci\u00f3n de c\u00f3digo ensamblador arbitrario escribiendo en un archivo temporal predecible."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://github.com/hyprwm/Hyprland/commit/28c85619243e6320e75d7abcfe8244fa99d054dd",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34832",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-06T15:15:44.873",
"lastModified": "2024-08-02T17:02:44.753",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T20:35:10.197",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35434",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-29T19:15:48.200",
"lastModified": "2024-05-29T19:50:25.303",
"lastModified": "2024-08-22T20:35:11.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Irontec Sngrep v1.8.1 conten\u00eda un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico mediante la funci\u00f3n rtp_check_packet en /sngrep/src/rtp.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete SIP manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/inputzero/Security-Advisories/blob/main/CVE-XXXX-XXXX.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35512",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-29T17:16:20.540",
"lastModified": "2024-05-29T19:50:25.303",
"lastModified": "2024-08-22T21:35:05.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Un problema en hmq v1.5.5 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante solicitudes manipuladas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://gist.github.com/pengwGit/6ccca73a5acf91f31ff0d4185b15a3ea",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36268",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-02T10:16:00.367",
"lastModified": "2024-08-02T12:59:43.990",
"lastModified": "2024-08-22T20:35:12.037",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.10.0 hasta la 1.12.0, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.13.0 de Apache InLong o seleccionen la que m\u00e1s les convenga [1] para resolverlo. [1] https://github.com/apache/inlong/pull/10251"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -26,6 +49,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36440",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:15.977",
"lastModified": "2024-08-22T15:15:15.977",
"lastModified": "2024-08-22T20:35:13.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,50 @@
"value": "An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1393"
},
{
"lang": "en",
"value": "CWE-327"
},
{
"lang": "en",
"value": "CWE-759"
}
]
}
],
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:16.187",
"lastModified": "2024-08-22T15:15:16.187",
"lastModified": "2024-08-22T20:35:14.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36740",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-06T19:15:58.217",
"lastModified": "2024-06-07T14:56:05.647",
"lastModified": "2024-08-22T20:35:15.900",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) cuando el \u00edndice como n\u00famero negativo excede el rango de tama\u00f1o."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Redmept1on/070f5b8b752079c6b761f00f3cab7103",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36800",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T13:15:52.740",
"lastModified": "2024-06-04T16:57:41.053",
"lastModified": "2024-08-22T20:35:16.867",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en SEMCMS v.4.8 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID en Download.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md",

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-39776",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-22T20:15:08.750",
"lastModified": "2024-08-22T20:15:08.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Avtec Outpost stores sensitive information in an insecure location without proper access controls in place."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-219"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-235-04",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40096",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T10:15:33.197",
"lastModified": "2024-08-05T12:41:45.957",
"lastModified": "2024-08-22T20:15:09.340",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://www.quokka.io/blog/critical-pii-exposure-in-who-caller-id-spam-block-app",
"source": "cve@mitre.org"
},
{
"url": "https://www.quokka.io/critical-vulnerabilities-exploits-cve",
"source": "cve@mitre.org"

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41572",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T19:15:13.380",
"lastModified": "2024-08-22T12:48:02.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T21:15:16.797",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Learning with Texts (LWT) 2.0.3 is vulnerable to Cross Site Scripting (XSS). The application has a specific function that does not filter special characters in URL parameters. Remote attackers can inject JavaScript code without authorization."
"value": "Learning with Texts (LWT) 2.0.3 is vulnerable to Cross Site Scripting (XSS). The application has a specific function that does not filter special characters in URL parameters. Remote attackers can inject JavaScript code without authorization. Exploiting this vulnerability, attackers can steal user credentials or execute actions such as injecting malicious scripts or redirecting users to malicious sites."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41703",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-22T05:15:03.450",
"lastModified": "2024-08-01T13:59:05.890",
"lastModified": "2024-08-22T21:15:16.903",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreChat through 0.7.4-rc1 has incorrect access control for message updates. (Work on a fixed version release has started in PR 3363.)"
"value": "LibreChat through 0.7.4-rc1 has incorrect access control for message updates."
},
{
"lang": "es",
@ -118,6 +118,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://github.com/realestate-com-au/vulnerability-disclosures/blob/main/LibreChat/CVE-2024-41703.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41704",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-22T05:15:03.537",
"lastModified": "2024-08-01T13:59:06.900",
"lastModified": "2024-08-22T21:15:17.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images. (Work on a fixed version release has started in PR 3363.)"
"value": "LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images."
},
{
"lang": "es",
@ -119,6 +119,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/realestate-com-au/vulnerability-disclosures/blob/main/LibreChat/CVE-2024-41704.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-42418",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-08-22T20:15:09.470",
"lastModified": "2024-08-22T20:15:09.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Avtec Outpost uses a default cryptographic key that can be used to decrypt sensitive information."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-235-04",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-42599",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T20:15:09.730",
"lastModified": "2024-08-22T20:15:09.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_files.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/fushuling/cve/blob/master/CVE-2024-42599.md",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_files.php%20code%20injection.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-42761",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T21:15:17.193",
"lastModified": "2024-08-22T21:15:17.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin_schedule.php\" in Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via scheduleDurationPHP parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Stored%20XSS%20-%20Bus%20Schedule%20List.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-42762",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T21:15:17.293",
"lastModified": "2024-08-22T21:15:17.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/history.php\" in Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via the Name, Phone, and Email parameter fields."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Stored%20XSS%20-%20Customer%20Booking%20List.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-42763",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T21:15:17.380",
"lastModified": "2024-08-22T21:15:17.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in the \"/schedule.php\" page of the Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via the \"bookingdate\" parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Reflected%20XSS%20-%20Book%20Ticket.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T16:15:09.730",
"lastModified": "2024-08-22T16:15:09.730",
"lastModified": "2024-08-22T20:35:19.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \" /admin/edit_room_controller.php\" of the Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"room_name\" parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Stored%20XSS%20-%20Edit%20Room.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42774",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T17:15:06.350",
"lastModified": "2024-08-22T17:15:06.350",
"lastModified": "2024-08-22T20:35:20.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An Incorrect Access Control vulnerability was found in /admin/delete_room.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to delete valid hotel room entries in the administrator section."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Room%20Entry.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42775",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T17:15:06.580",
"lastModified": "2024-08-22T17:15:06.580",
"lastModified": "2024-08-22T20:35:21.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An Incorrect Access Control vulnerability was found in /admin/add_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to add the valid hotel room entries in the administrator section via the direct URL access."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Add%20New%20Room%20Entry.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42776",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T17:15:06.807",
"lastModified": "2024-08-22T17:15:06.807",
"lastModified": "2024-08-22T20:35:22.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Kashipara Hotel Management System v1.0 is vulnerable to Incorrect Access Control via /admin/users.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User%20Data.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45167",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T04:15:25.710",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T20:35:24.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Debido a una validaci\u00f3n de entrada inadecuada, una deserializaci\u00f3n inadecuada y una restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria, IDOL2 es vulnerable a ataques de denegaci\u00f3n de servicio (DoS) y posiblemente a la ejecuci\u00f3n remota de c\u00f3digo. Un determinado documento XmlMessage provoca un consumo de CPU del 100 %."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "http://download.uci.de/idol2/idol2Client_2_12.exe",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45191",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T16:15:10.120",
"lastModified": "2024-08-22T16:15:10.120",
"lastModified": "2024-08-22T21:35:06.397",
"vulnStatus": "Received",
"cveTags": [
{
@ -18,7 +18,42 @@
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-208"
}
]
}
],
"references": [
{
"url": "https://gitlab.matrix.org/matrix-org/olm/",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-45201",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T20:15:10.063",
"lastModified": "2024-08-22T20:15:10.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in llama_index before 0.10.38. download/integration.py includes an exec call for import {cls_name}."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/run-llama/llama_index/compare/v0.10.37...v0.10.38",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/run-llama/llama_index/pull/13523",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7969",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.203",
"lastModified": "2024-08-22T17:42:47.627",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T20:35:26.473",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -59,6 +79,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7977",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.630",
"lastModified": "2024-08-22T17:39:32.730",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T20:35:28.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T20:15:10.210",
"lastModified": "2024-08-22T20:15:10.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg. The manipulation leads to os command injection. The attack can be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275557",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275557",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.390929",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T20:15:11.017",
"lastModified": "2024-08-22T20:15:11.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275558",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275558",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T20:15:11.690",
"lastModified": "2024-08-22T20:15:11.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275559",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275559",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T21:15:17.603",
"lastModified": "2024-08-22T21:15:17.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275560",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275560",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T21:15:17.910",
"lastModified": "2024-08-22T21:15:17.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275561",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275561",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.390937",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T21:15:18.217",
"lastModified": "2024-08-22T21:15:18.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Online Health Care System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument f_name with the input 1%' or 1=1 ) UNION SELECT 1,2,3,4,5,database(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23# as part of string leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/shang159/sqli-vul/blob/main/sql2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275562",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275562",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.395465",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-22T20:00:18.271897+00:00
2024-08-22T22:00:17.044146+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-22T19:35:40.953000+00:00
2024-08-22T21:35:06.397000+00:00
```
### Last Data Feed Release
@ -33,49 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260969
260983
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `14`
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-22T19:15:09.173`)
- [CVE-2024-42767](CVE-2024/CVE-2024-427xx/CVE-2024-42767.json) (`2024-08-22T18:15:10.280`)
- [CVE-2024-42773](CVE-2024/CVE-2024-427xx/CVE-2024-42773.json) (`2024-08-22T18:15:10.367`)
- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2024-08-22T18:15:10.553`)
- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-22T19:15:09.720`)
- [CVE-2023-7260](CVE-2023/CVE-2023-72xx/CVE-2023-7260.json) (`2024-08-22T21:15:16.107`)
- [CVE-2024-39776](CVE-2024/CVE-2024-397xx/CVE-2024-39776.json) (`2024-08-22T20:15:08.750`)
- [CVE-2024-42418](CVE-2024/CVE-2024-424xx/CVE-2024-42418.json) (`2024-08-22T20:15:09.470`)
- [CVE-2024-42599](CVE-2024/CVE-2024-425xx/CVE-2024-42599.json) (`2024-08-22T20:15:09.730`)
- [CVE-2024-42761](CVE-2024/CVE-2024-427xx/CVE-2024-42761.json) (`2024-08-22T21:15:17.193`)
- [CVE-2024-42762](CVE-2024/CVE-2024-427xx/CVE-2024-42762.json) (`2024-08-22T21:15:17.293`)
- [CVE-2024-42763](CVE-2024/CVE-2024-427xx/CVE-2024-42763.json) (`2024-08-22T21:15:17.380`)
- [CVE-2024-45201](CVE-2024/CVE-2024-452xx/CVE-2024-45201.json) (`2024-08-22T20:15:10.063`)
- [CVE-2024-8075](CVE-2024/CVE-2024-80xx/CVE-2024-8075.json) (`2024-08-22T20:15:10.210`)
- [CVE-2024-8076](CVE-2024/CVE-2024-80xx/CVE-2024-8076.json) (`2024-08-22T20:15:11.017`)
- [CVE-2024-8077](CVE-2024/CVE-2024-80xx/CVE-2024-8077.json) (`2024-08-22T20:15:11.690`)
- [CVE-2024-8078](CVE-2024/CVE-2024-80xx/CVE-2024-8078.json) (`2024-08-22T21:15:17.603`)
- [CVE-2024-8079](CVE-2024/CVE-2024-80xx/CVE-2024-8079.json) (`2024-08-22T21:15:17.910`)
- [CVE-2024-8080](CVE-2024/CVE-2024-80xx/CVE-2024-8080.json) (`2024-08-22T21:15:18.217`)
### CVEs modified in the last Commit
Recently modified CVEs: `65`
Recently modified CVEs: `46`
- [CVE-2024-34527](CVE-2024/CVE-2024-345xx/CVE-2024-34527.json) (`2024-08-22T18:35:09.990`)
- [CVE-2024-35469](CVE-2024/CVE-2024-354xx/CVE-2024-35469.json) (`2024-08-22T19:35:28.953`)
- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2024-08-22T19:35:35.700`)
- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T18:35:12.120`)
- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T19:35:29.793`)
- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T19:35:30.730`)
- [CVE-2024-36580](CVE-2024/CVE-2024-365xx/CVE-2024-36580.json) (`2024-08-22T19:35:31.613`)
- [CVE-2024-36773](CVE-2024/CVE-2024-367xx/CVE-2024-36773.json) (`2024-08-22T19:35:32.557`)
- [CVE-2024-36811](CVE-2024/CVE-2024-368xx/CVE-2024-36811.json) (`2024-08-22T18:35:13.753`)
- [CVE-2024-36843](CVE-2024/CVE-2024-368xx/CVE-2024-36843.json) (`2024-08-22T18:35:15.457`)
- [CVE-2024-36856](CVE-2024/CVE-2024-368xx/CVE-2024-36856.json) (`2024-08-22T19:35:33.427`)
- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-08-22T18:22:47.927`)
- [CVE-2024-39211](CVE-2024/CVE-2024-392xx/CVE-2024-39211.json) (`2024-08-22T19:35:34.747`)
- [CVE-2024-40347](CVE-2024/CVE-2024-403xx/CVE-2024-40347.json) (`2024-08-22T18:37:49.850`)
- [CVE-2024-40535](CVE-2024/CVE-2024-405xx/CVE-2024-40535.json) (`2024-08-22T19:35:35.893`)
- [CVE-2024-41599](CVE-2024/CVE-2024-415xx/CVE-2024-41599.json) (`2024-08-22T18:27:45.397`)
- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-08-22T18:27:15.310`)
- [CVE-2024-42598](CVE-2024/CVE-2024-425xx/CVE-2024-42598.json) (`2024-08-22T18:15:10.187`)
- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T18:35:16.727`)
- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T19:35:37.830`)
- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T19:35:38.793`)
- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-22T19:35:39.710`)
- [CVE-2024-43853](CVE-2024/CVE-2024-438xx/CVE-2024-43853.json) (`2024-08-22T18:06:38.087`)
- [CVE-2024-43854](CVE-2024/CVE-2024-438xx/CVE-2024-43854.json) (`2024-08-22T18:12:28.620`)
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T19:35:40.953`)
- [CVE-2024-28213](CVE-2024/CVE-2024-282xx/CVE-2024-28213.json) (`2024-08-22T20:35:07.957`)
- [CVE-2024-28390](CVE-2024/CVE-2024-283xx/CVE-2024-28390.json) (`2024-08-22T21:35:03.607`)
- [CVE-2024-30187](CVE-2024/CVE-2024-301xx/CVE-2024-30187.json) (`2024-08-22T21:35:04.480`)
- [CVE-2024-3219](CVE-2024/CVE-2024-32xx/CVE-2024-3219.json) (`2024-08-22T20:15:09.143`)
- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-08-22T20:35:09.343`)
- [CVE-2024-34832](CVE-2024/CVE-2024-348xx/CVE-2024-34832.json) (`2024-08-22T20:35:10.197`)
- [CVE-2024-35434](CVE-2024/CVE-2024-354xx/CVE-2024-35434.json) (`2024-08-22T20:35:11.130`)
- [CVE-2024-35512](CVE-2024/CVE-2024-355xx/CVE-2024-35512.json) (`2024-08-22T21:35:05.483`)
- [CVE-2024-36268](CVE-2024/CVE-2024-362xx/CVE-2024-36268.json) (`2024-08-22T20:35:12.037`)
- [CVE-2024-36440](CVE-2024/CVE-2024-364xx/CVE-2024-36440.json) (`2024-08-22T20:35:13.640`)
- [CVE-2024-36445](CVE-2024/CVE-2024-364xx/CVE-2024-36445.json) (`2024-08-22T20:35:14.640`)
- [CVE-2024-36740](CVE-2024/CVE-2024-367xx/CVE-2024-36740.json) (`2024-08-22T20:35:15.900`)
- [CVE-2024-36800](CVE-2024/CVE-2024-368xx/CVE-2024-36800.json) (`2024-08-22T20:35:16.867`)
- [CVE-2024-40096](CVE-2024/CVE-2024-400xx/CVE-2024-40096.json) (`2024-08-22T20:15:09.340`)
- [CVE-2024-41572](CVE-2024/CVE-2024-415xx/CVE-2024-41572.json) (`2024-08-22T21:15:16.797`)
- [CVE-2024-41703](CVE-2024/CVE-2024-417xx/CVE-2024-41703.json) (`2024-08-22T21:15:16.903`)
- [CVE-2024-41704](CVE-2024/CVE-2024-417xx/CVE-2024-41704.json) (`2024-08-22T21:15:17.050`)
- [CVE-2024-42771](CVE-2024/CVE-2024-427xx/CVE-2024-42771.json) (`2024-08-22T20:35:19.220`)
- [CVE-2024-42774](CVE-2024/CVE-2024-427xx/CVE-2024-42774.json) (`2024-08-22T20:35:20.297`)
- [CVE-2024-42775](CVE-2024/CVE-2024-427xx/CVE-2024-42775.json) (`2024-08-22T20:35:21.223`)
- [CVE-2024-42776](CVE-2024/CVE-2024-427xx/CVE-2024-42776.json) (`2024-08-22T20:35:22.323`)
- [CVE-2024-45167](CVE-2024/CVE-2024-451xx/CVE-2024-45167.json) (`2024-08-22T20:35:24.417`)
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-22T21:35:06.397`)
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T20:35:26.473`)
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T20:35:28.140`)
## Download and Usage

View File

@ -153303,7 +153303,7 @@ CVE-2020-22524,0,0,3963018bd375efbb104317019440f969cb986995a7cd6c3fe6c16a8a1b9da
CVE-2020-2253,0,0,6c05875bf0d2370ea4760b0be37855dec09deb871bbe2ec77d0ed51932a51534,2023-10-25T18:16:39.320000
CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3ea73,2023-04-10T19:17:46.887000
CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000
CVE-2020-22539,0,1,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000
CVE-2020-22539,0,0,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000
CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000
CVE-2020-22540,0,0,376647c49c1c6bd480053c09b9a209b442662340e7faa02a7740de4fbd0b2879,2024-04-16T13:24:07.103000
CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000
@ -178736,7 +178736,7 @@ CVE-2021-35995,0,0,349e9318c68e5b5d153347a6e533cf78553b1475bb38fac079d88ddc948aa
CVE-2021-35996,0,0,1663a6f92f1b95f83531ce33aa0fd5a3119ad943f5c0ce7598f6b0e3d2b19ecf,2022-10-07T20:22:18.837000
CVE-2021-35997,0,0,c512899773c17835aa4149b91e20cf38f61e47ce21669684808d82e3f67c089d,2022-10-07T20:22:12.210000
CVE-2021-35999,0,0,a47697863ca0585b885465aab9b343721e65375507779bcbadb3145cdb57c1a8,2022-10-07T20:22:06.717000
CVE-2021-3600,0,0,ff4285e484ea9d035dce65d68ecaf9df091914b96726936a3c0bc36713651534,2024-01-11T18:40:05.340000
CVE-2021-3600,0,1,68d3389910ec8a57b5fca4ebd834a541ec4461274b597a250123427824e365a8,2024-08-22T20:29:55.757000
CVE-2021-36000,0,0,3024c741fce9de3e846f898958df6f0252edf3f7cf6522ab0fc19b97a3e122a3,2022-10-07T20:22:00.183000
CVE-2021-36001,0,0,dd55474bf59098fe2ae9e21d2a79605bc83e24f4e554f317a1dede2f5385e4ca,2021-08-30T14:38:18.463000
CVE-2021-36002,0,0,099a2d2e1bca7feab124f3b05648e6f5ac03f77b0d5773e80599d73a9816b5a6,2022-10-27T12:48:34.320000
@ -186799,7 +186799,7 @@ CVE-2021-46946,0,0,674cb9a6d3dc94cb9097d5b30f23ae90502eb67a19dc98c50a2caa5c5af6a
CVE-2021-46947,0,0,1d3bcb9b51594916cfb931a1a0a94f10ffa497a31616810ae9c6c324df9eecf5,2024-04-10T20:00:47.847000
CVE-2021-46948,0,0,3486d0dde8f16ae13b49663c64a96f5a559016977d15287dd193b1354f70ad23,2024-04-10T20:14:23.420000
CVE-2021-46949,0,0,7780ecf17802080ca3d32668dffcbf0a7031303fc8545a6d3f10b6f913adbbee,2024-04-10T20:14:05.477000
CVE-2021-46950,0,0,308d1de93b1e6b5e053d07df8ad923a97181ff7f566f7696ba53ffdeb30f166b,2024-04-10T20:13:16.993000
CVE-2021-46950,0,1,08f63b3663af12d264369d90f0fac82d2fd9d779a4da1a38ecfe7374e75c9671,2024-08-22T20:28:57.697000
CVE-2021-46951,0,0,885c61f9e7da07612d949faded4ceb8afc94f412e675d52bf4d2b2ee3f013270,2024-04-10T20:15:55.593000
CVE-2021-46952,0,0,9b0db874ec7e3850deaad8426e3b7d3cc0b498036f5c3e78f7383423f408a42e,2024-04-10T20:15:42.153000
CVE-2021-46953,0,0,5b8b163a10423fb772acc2c04e5217817b2f0ad2a781f96947cdc6f9504f8984,2024-04-10T20:15:31.827000
@ -194042,7 +194042,7 @@ CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025
CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000
CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000
CVE-2022-25037,0,0,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000
CVE-2022-25038,0,1,6bbcf5f0263481ae60f4fbb572b5749eaac36bd2e533bf005101ca5448d9ad88,2024-08-22T19:35:03.130000
CVE-2022-25038,0,0,6bbcf5f0263481ae60f4fbb572b5749eaac36bd2e533bf005101ca5448d9ad88,2024-08-22T19:35:03.130000
CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000
CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000
CVE-2022-25044,0,0,04a774b0ed7f50c45cfbfcc56f7a8d205c4448d23d2248f0cfc9ee2ba6a7d6c1,2022-03-11T15:58:29.333000
@ -194717,7 +194717,7 @@ CVE-2022-25845,0,0,bb8fbb25d9b2b6e33d68fdcdc8c9cf5844a6a1278b54a8ecd97fc0d93c499
CVE-2022-25847,0,0,fd01bf86f7234e02d6e14441d150103ded4c384f9819a7f63538363979b5db57,2023-11-07T03:44:50.853000
CVE-2022-25848,0,0,1c166a4d8bdad332db5c332e277f83b2fe5adfc4d209eb6d35d765412da1a95f,2022-12-01T20:56:52.047000
CVE-2022-25849,0,0,40fdd2c7c5a9b6f67199776f608bf7be531ac8afb1ff29b95b93da6407748d08,2022-11-03T13:59:27.003000
CVE-2022-2585,0,0,b8b95c8f4f1261a5f8daeff0a33f06e234b972c677119db6e33f7bde5d49182d,2024-01-19T17:14:35.877000
CVE-2022-2585,0,1,312adc11c9feb5033187283da27806bae01aae0fee5bee9d7527d0e147a42fd1,2024-08-22T20:28:23.727000
CVE-2022-25850,0,0,5516aca96018d93e219b28733fdc72ac67bb9f4bd4f8926e97274bf7c83b45e1,2022-05-11T17:41:01.270000
CVE-2022-25851,0,0,897443b15a99fbe7af936f177b04170409c64e5843c89fc4d49fddd67041967f,2022-06-17T17:21:15.713000
CVE-2022-25852,0,0,87e5f9027a2cd15f539eca3895e163801a82c49f9e6d22be43ec52d3dbf6663d,2023-10-11T15:27:34.157000
@ -194743,7 +194743,7 @@ CVE-2022-25873,0,0,98f5d7a77ef73a803c4ad61ba52a354f3ce3d43294171fd5e34e7918371ba
CVE-2022-25875,0,0,91816922e712745c8516deb6671db43dd777e487b6c3eb59c201f0decf3314bb,2022-07-19T02:23:10.670000
CVE-2022-25876,0,0,0cbf63ffb99c2a267ba8626d28735c1632a57fc575ab1c949a0cfd02a34433be,2022-07-12T18:51:54.013000
CVE-2022-25878,0,0,69f365dbe73e43803876891aafd22493a2113971835fe4e52936a9250eb7d64f,2022-06-08T17:22:01.157000
CVE-2022-2588,0,0,1fd72d5bf613b15e1c90f427e65f259898c3d6137459ac9a8a7d747dea358212,2024-01-12T16:47:44.873000
CVE-2022-2588,0,1,1834e0ebe2937bbf3392a2abb9a6f9314526d56a18e3c4779029ab2ac2b6e249,2024-08-22T20:28:03.190000
CVE-2022-25880,0,0,37bb4e58bb41997da651debe069382e51e06fd2008e38177238d372b1bbad545,2022-06-29T20:47:20.340000
CVE-2022-25881,0,0,0113241b6a0219133c886d52582facad96711330aa8d36f38f09b4118065ac9a,2023-11-07T03:44:51.800000
CVE-2022-25882,0,0,cc2e9e64fce1daa6e7128976be7a9dd9d17b8df7c338f770ad33ea9d283c4847,2023-11-07T03:44:51.890000
@ -211948,7 +211948,7 @@ CVE-2022-4842,0,0,c8ccb57c619d69dcfd24b9e6f2c3813735740531a8d882d1c0e70d7bbb8289
CVE-2022-48422,0,0,bd8399e6d021a19c602491fc3e25797be11d8dee0ea80a83486503d7e2b11745,2023-08-08T14:21:49.707000
CVE-2022-48423,0,0,45c0d8698239adea9a642b5068ee9b019af288e1bec23dc3a7ea86cccc945f23,2023-08-08T14:21:49.707000
CVE-2022-48424,0,0,969015f21c5b5e99d31b6de4766e2501e25c4e4dc59ee3ca6422cce1a4c61c45,2023-06-07T12:47:03.713000
CVE-2022-48425,0,0,48949ccec66a52d34959ccec10e4d68856370b32644ec260d4e028872b5b1770,2023-04-13T17:15:07.703000
CVE-2022-48425,0,1,0f181fadb11408ddd7ccbdeab735521c1ae9f757e6fc016fc9f36f7bc53ddb9d,2024-08-22T20:27:26.153000
CVE-2022-48426,0,0,d92ff876d9de346da0341d6c60530e0606fdd7b524e706b8b6b5157ced575541,2023-03-30T19:40:32.927000
CVE-2022-48427,0,0,4df5f46a0c1a7d12cdfd5073366a38e5e1870ffafb7c550513b31bcd9a3fc75e,2023-03-31T19:19:08.563000
CVE-2022-48428,0,0,11ee3c6a1426f04278f4eb95e945d28303745dbea7a76a08ff4d886d312c1c96,2023-03-31T19:14:05.383000
@ -212446,17 +212446,17 @@ CVE-2022-48930,0,0,f4814afe4f8412d22f471d4b42c41a39289b07c6b527361cd94120f7cf641
CVE-2022-48931,0,0,d5215ce4f6e7bf10dfe8eda34e306f21ac23decacbdf3e56afc51d77eb9002c5,2024-08-22T12:48:02.790000
CVE-2022-48932,0,0,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf21e,2024-08-22T12:48:02.790000
CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000
CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000
CVE-2022-48934,0,1,5b4d3e9f36a52ea0bbbb4966ebd00c594a823cadc603a7281937d3623cfb89c3,2024-08-22T20:33:29.860000
CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000
CVE-2022-48936,0,1,36ac70219cd8aef6a8970544481442eac16b9c0cd068921aa64078a27ffc7215,2024-08-22T19:03:59.643000
CVE-2022-48937,0,1,5acf0c5064ef79bcf25c1dae2675f0433d0999928e6f36ce64d5e6c9907aa5b9,2024-08-22T19:07:28.567000
CVE-2022-48938,0,1,eff2e9fbfc7aa611d20c84d8b3736eb4c859583a2ca7af1dd4c15351c5551139,2024-08-22T18:49:20.320000
CVE-2022-48939,0,1,171710b03fe72b0b5576806a870449655b0f9165fe85d09b9d9bd74ca80174f4,2024-08-22T19:02:08.770000
CVE-2022-48936,0,0,36ac70219cd8aef6a8970544481442eac16b9c0cd068921aa64078a27ffc7215,2024-08-22T19:03:59.643000
CVE-2022-48937,0,0,5acf0c5064ef79bcf25c1dae2675f0433d0999928e6f36ce64d5e6c9907aa5b9,2024-08-22T19:07:28.567000
CVE-2022-48938,0,0,eff2e9fbfc7aa611d20c84d8b3736eb4c859583a2ca7af1dd4c15351c5551139,2024-08-22T18:49:20.320000
CVE-2022-48939,0,0,171710b03fe72b0b5576806a870449655b0f9165fe85d09b9d9bd74ca80174f4,2024-08-22T19:02:08.770000
CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000
CVE-2022-48940,0,1,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea902,2024-08-22T18:37:46.133000
CVE-2022-48941,0,1,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000
CVE-2022-48942,0,1,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000
CVE-2022-48943,0,1,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000
CVE-2022-48940,0,0,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea902,2024-08-22T18:37:46.133000
CVE-2022-48941,0,0,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000
CVE-2022-48942,0,0,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000
CVE-2022-48943,0,0,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
@ -215976,7 +215976,7 @@ CVE-2023-21756,0,0,1b03dfc95e63fb764e1ddf08dc45ab107ec090acc6b8af12c31a905432b96
CVE-2023-21757,0,0,66e53ca89c214e394392f33dae849e0a1a5392ebc91c1ecc0518ca90aeb29f4b,2024-05-29T03:15:29.643000
CVE-2023-21758,0,0,bf9b219d514822c269493695dac80cdf506c45b9d7cd29c41c1981d499e6707e,2024-05-29T03:15:29.863000
CVE-2023-21759,0,0,e1a4e11a518a12eb61c2899ad716a41c91b6356142ec0c61c1586039cc88b0a3,2023-04-27T19:15:15.787000
CVE-2023-2176,0,0,1a8086beb1b71bf6126480c7f49e7fd9673e664e03fca3868a879083402c9efc,2023-07-27T15:21:17.413000
CVE-2023-2176,0,1,7cdfccc3bc2f21dffaf86c600684c9fc971be1865442a6f77a0fce2817a14bad,2024-08-22T20:26:17.927000
CVE-2023-21760,0,0,d04eba9231acb5e0de6a74dbadc0745534b8faecda70382c9df1559162694305,2024-05-29T03:15:30.017000
CVE-2023-21761,0,0,83e1d0a1b67e385073f77438eec460b2c534682dd214b942bbe115d16a312053,2024-05-29T03:15:30.167000
CVE-2023-21762,0,0,05a2c530d10b80c19ff5216ee3b7109584a6555de2f4a1de02eb3bd4c93013ea,2024-05-29T03:15:30.287000
@ -222570,7 +222570,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db
CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000
CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000
CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000
CVE-2023-29929,0,0,6e328a7115739fc9a6f658723a1504ea401ff9bc6fd40aaaaf4e9cf810b89bd4,2024-08-22T12:48:02.790000
CVE-2023-29929,0,1,c4b7c8db7151fa57c0c0242b0a906c7d8eab412a4479e9c2d1bd3d305adc2920,2024-08-22T21:15:15.840000
CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000
CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000
CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000
@ -224204,8 +224204,8 @@ CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ec
CVE-2023-32250,0,0,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000
CVE-2023-32252,0,0,d58cdd6d41b61e01636cbce96c5c95617a1fb413e4534a05ad59e2763a4df396,2023-12-04T14:53:38.480000
CVE-2023-32254,0,0,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000
CVE-2023-32257,0,0,e863f95271bbd102a1dbc5990b29c3c9bedfb59faca99d10f3fe80d80959dfb3,2023-12-22T17:06:02.047000
CVE-2023-32258,0,0,1b7d9e9ed9a24d4763f3dd34c86ff525f58eabf344847aa293dd4e794e241b4a,2023-11-17T18:29:58.827000
CVE-2023-32257,0,1,e74ac3005b85dd9bb4e730408991fe6943d75b26a83bc250461d82f29002e0b0,2024-08-22T20:30:50.603000
CVE-2023-32258,0,1,3765cc941b240ae55ac325df051cd68b23e7f4aeaf6466a32872913e20fc6f23,2024-08-22T20:30:28.627000
CVE-2023-32259,0,0,63d94242b8b0d4e358593674a90324955b50adf4e3d50cf943b4320e76d2c808,2024-03-19T16:33:58.680000
CVE-2023-3226,0,0,f374a8fec37bbb146b103948aced2aaf6543c8988572ca127a48f77cd827c0ef,2023-12-15T11:15:09.510000
CVE-2023-32260,0,0,b9cd8dd7693e77252f036c5a8a5da5ab355842eec3ef40a54fe05bd3713e1328,2024-03-19T16:33:58.680000
@ -227064,7 +227064,7 @@ CVE-2023-3610,0,0,64c0e8d2425050cc67fb6bf5e0c9fc93a2196e61379b8959e14e5951d75581
CVE-2023-36100,0,0,2780314d2b1141fba57782f745de049c531df759192c158ad02872ef9d44b115,2023-09-07T18:16:22.440000
CVE-2023-36106,0,0,b4d24519cb6404a5e8ee83f274be002cd600bd9db8f91c065889d76d5476c9aa,2023-08-23T14:33:07.907000
CVE-2023-36109,0,0,2905c47f1f22b864042595a1a3690775764e8e0cf79a8f06d31d838015bda409,2023-09-22T02:12:15.177000
CVE-2023-3611,0,0,1118492cd13540fd45f50b4e270639e035d8260456f55645dbd94c0ff6f94aee,2024-01-11T19:15:10.547000
CVE-2023-3611,0,1,3276ea952612bf8ce9f28e73d33d9668ae065819920d37d3d7dd3deee2d0f859,2024-08-22T20:25:34.373000
CVE-2023-36118,0,0,bff10a029ac853a7f4d10cc995c3c5052dcacfa8824027454be423de12359dc1,2023-11-07T04:16:09.273000
CVE-2023-36119,0,0,3418931f19d9071315cf9ad030fc2ad364ebb82d059d685a3e5cf4c15ef96490,2023-11-07T04:16:10.287000
CVE-2023-3612,0,0,ce840538d67bfd82048ad669ef6d5df66302e0f8cb394f907a4a0c92d6165ecf,2023-09-13T17:53:49.923000
@ -228297,7 +228297,7 @@ CVE-2023-37755,0,0,d7feac74f9cc218d5cfafa14ebddafd6f21d084107f2ae84d69e367dde916
CVE-2023-37756,0,0,669162a115e862f67140188330b7c4e9110f3ad42f860c18393f51efb7d8a57f,2023-11-07T04:17:05.383000
CVE-2023-37758,0,0,0eb788e5174366fa5ef1709461edbc8be7cf203fdbb36660f1f7b79134900a04,2023-11-07T04:17:06.350000
CVE-2023-37759,0,0,8d811c0b8310054880776e953681e58c9721cfeb28b1a6a1571932324e14c3d8,2023-09-12T00:10:11.453000
CVE-2023-3776,0,0,5061d424210869549ddf3bbc00642ca7c2895e5677a0387942e6a7d83b59a0e6,2024-02-02T14:15:53.723000
CVE-2023-3776,0,1,9b9e6fdf1c4bc5c96e654d9815690fa791039ca2db35eb2aa960559d73c92292,2024-08-22T20:24:45.973000
CVE-2023-37765,0,0,32b4486ea41a3dc4882b58189f7f6acda83aea9b7d08b1dd3c5e7a09f1cc9941,2023-07-19T13:23:02.507000
CVE-2023-37766,0,0,8c4cb10362a4c422f0370e6242faf4281fdacf1e8eaebaf78325b3a4131b0c66,2023-07-19T13:23:09.597000
CVE-2023-37767,0,0,60856d57fef3bb2747e75b5f6421f739b7660d5998660526a164bb704d8a46c4,2023-07-19T13:23:15.433000
@ -232950,7 +232950,7 @@ CVE-2023-43838,0,0,ef0d4d0a77025638e25ac91e467d096c6c184c9c50cf0c660c7d95e782382
CVE-2023-4384,0,0,54db9c5e0e48d365638318efaabdbc065f24cee66ef882641c4e391d0e81b6d5,2024-05-17T02:31:31.327000
CVE-2023-43842,0,0,b6c9d2305f759c50dd01157f2fbb2de8cf46992da781f7afb126c4e1f97d4198,2024-05-29T13:02:09.280000
CVE-2023-43843,0,0,aef808c71263ea6153f2eb4b7e45ae7b9a73047abeb8810e9698360185074ff9,2024-05-29T13:02:09.280000
CVE-2023-43844,0,0,aa0cd59b83effa93acbfce005198f4cf37e8fc86576a6cf7d023f3952cbe3bd5,2024-05-29T13:02:09.280000
CVE-2023-43844,0,1,060d731423af6f4711e120eb2a59d74f233fa214c9e9f3f730d535056c38b526,2024-08-22T20:35:01.130000
CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000
CVE-2023-43846,0,0,fb3201cf7e6c0f2741576b6bdf0ad5f80553de1de784098b61d62597e5d839be,2024-05-29T13:02:09.280000
CVE-2023-43847,0,0,28c6e47ec33c1957d51359e438da5dfff5700e365d5de705396d6276e82a5e1e,2024-05-29T13:02:09.280000
@ -234349,7 +234349,7 @@ CVE-2023-46040,0,0,6eff75a2812c317a80847f611adb0ea2b165227205b9790d775b06619e979
CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000
CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000
CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000
CVE-2023-46047,0,1,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
@ -234562,7 +234562,7 @@ CVE-2023-4629,0,0,a2da5926fb0fca7bbafeced6fa322c009d8e911a79a6b6bf7f38a2a5e0ea6e
CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000
CVE-2023-46294,0,0,5aebe5d15d21a3c99db9d0aa22d1effedd56a960f93e5caf38568b64d0bdb4c0,2024-05-02T13:27:25.103000
CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000
CVE-2023-46297,0,1,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000
CVE-2023-46297,0,0,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000
CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000
CVE-2023-4630,0,0,84642586247351fd243a36a028f47b98bdbaebb8bb9393939811b558e3daca7b,2023-09-13T16:50:23.250000
CVE-2023-46300,0,0,ef50ba7da8805e453a397a1a5d11a994fcd6ff305d395f739cf3f9017964b18d,2023-10-31T17:08:50.757000
@ -234665,7 +234665,7 @@ CVE-2023-46427,0,0,f866f9e54a1652715d6c8d5cf0ab85e5d06c714508a8f7e5c787c0848377e
CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000
CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000
CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000
CVE-2023-46442,0,1,9293faa2d8956aa4f30804364065a1b1e61ee21acf16953213f0ca472daec3be,2024-08-22T19:35:06.600000
CVE-2023-46442,0,0,9293faa2d8956aa4f30804364065a1b1e61ee21acf16953213f0ca472daec3be,2024-08-22T19:35:06.600000
CVE-2023-46445,0,0,d30b7a69d534d58879daef0d8df2b1cc94af49180044c8b573c6dff1e56b4fe0,2023-12-22T20:15:07.270000
CVE-2023-46446,0,0,8947e039d91da74ea0d8abe1c8e929f5ba6d7ec6e059b8fabb66ab2753cd716c,2023-12-22T20:15:07.367000
CVE-2023-46447,0,0,3399247934a925d1a22abe563fd15983a03e402beebeab4d93fc81ab8bf7b896,2024-01-29T15:27:03.267000
@ -237194,9 +237194,9 @@ CVE-2023-49959,0,0,88693f11e9749c7b6e276c7f9d19f715b73a4f2009b695830855f5158498f
CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000
CVE-2023-49960,0,0,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000
CVE-2023-49961,0,0,fe18aca8b440f329c1d528d19a34369d87e6c8005ab3d538fd1c3f47cafa72b1,2024-01-12T16:13:48.350000
CVE-2023-49963,0,1,1834205893b0a4ca865a9ef7e3a83b265bbd7d92cfe069a1f2dd2fa040d59a3c,2024-08-22T19:35:07.550000
CVE-2023-49963,0,0,1834205893b0a4ca865a9ef7e3a83b265bbd7d92cfe069a1f2dd2fa040d59a3c,2024-08-22T19:35:07.550000
CVE-2023-49964,0,0,4a201f112134a3d6cf6021d5b91032c58a31552b69366b1a2d0998d8e981118b,2023-12-14T14:36:17.293000
CVE-2023-49965,0,1,48e6b3e821ed6e4ac6e7c9a1268066cbff076d429495b607839693844fd16bcd,2024-08-22T18:35:03.353000
CVE-2023-49965,0,0,48e6b3e821ed6e4ac6e7c9a1268066cbff076d429495b607839693844fd16bcd,2024-08-22T18:35:03.353000
CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb098,2023-12-09T04:48:27.967000
CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000
CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000
@ -237255,7 +237255,7 @@ CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb918
CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000
CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000
CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000
CVE-2023-50061,0,1,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000
CVE-2023-50061,0,0,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000
CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000
CVE-2023-5007,0,0,2c3a0305698c7d0eb69e8429d362775d9108864cd5873643c1bb4add99591ed5,2023-12-26T21:32:57.167000
CVE-2023-50070,0,0,4c0e0b3a6a619999bf7c4d96a134f8e5b7b9f9c028a8642d016e18163d586de9,2024-01-05T19:45:20.357000
@ -238112,7 +238112,7 @@ CVE-2023-51514,0,0,0eb2ee3fd9b0034c90eca3300b10970dc139157ae89c053eb67a396471a01
CVE-2023-51515,0,0,cc18e149599efa8bd615b60d79969ab273afa4ec8798b946776d7aee959ab978,2024-04-15T13:15:51.577000
CVE-2023-51516,0,0,e44c247aa8508748385aa693a34efbfabb8cca356a675cddfac250ff230e8b60,2024-08-07T18:55:36.290000
CVE-2023-51517,0,0,f21565246724904cf226c379676ef00de528846305ac2339577821a4e1e75ec9,2024-01-05T18:14:06.130000
CVE-2023-51518,0,0,0a9a5ddbb6bf752da4ad320c7fc5b79bc6c6b12096c51104834aba7f60719601,2024-02-27T14:20:06.637000
CVE-2023-51518,0,1,4cff8930c44a3ef87c97abcb51415075298ad505db8700f7bba20b1757731fcf,2024-08-22T21:35:00.913000
CVE-2023-51519,0,0,cd145cc8a1178894852234206f692025fbea90391949823a6279cf801fb89f41,2024-08-07T14:58:46.600000
CVE-2023-5152,0,0,07fcc818eecddc54d77eb3e4b6f83f2abf16672c5d883157bdd84f1aa91c0deb,2024-08-02T08:15:32.730000
CVE-2023-51520,0,0,fa83905e551c0f1871442257a4349a3f47d49f0c9a9a63d95c309c60b1ea747d,2024-02-06T20:20:11.330000
@ -238429,7 +238429,7 @@ CVE-2023-51926,0,0,48f337dd0208b483cfaf633fcadfc65db647f5eeaa52ba4c0a98740652fc6
CVE-2023-51927,0,0,fb1dc39f0e1a648051c3638e969ca5441d946196af53c49a13ea6832797b13c1,2024-01-26T17:27:31.547000
CVE-2023-51928,0,0,5892af84c609cb1319b62109ed5f5ffa0f57fff8719855a0e1272e3c1a3b5b81,2024-01-26T17:33:22.560000
CVE-2023-5193,0,0,6c14fe1b0d05ec1ecb6d7fbb91436fbbb459d1827e213cb06adbe0316d8ee7d8,2023-10-03T17:32:42.060000
CVE-2023-51931,0,0,eb2a1dba1701c7a0359148b88e1449a67c3e3fced9dbe9fdbb4774fb21c0e108,2024-02-16T13:37:51.433000
CVE-2023-51931,0,1,b6faf7d4c9ea318cde84757135d6c208ce721da55074bb4c8721c2fc65793d28,2024-08-22T21:35:01.133000
CVE-2023-51939,0,0,b355495172e94b23753a3ead26c3ecfbce81e28e05d5a78e1c3b95667afc69cb,2024-02-08T20:11:36.137000
CVE-2023-5194,0,0,d1e50fe762de4978a1b73c69310e31acf5729568c7d8530d8a3e61d13bfd0f72,2023-10-03T17:36:14.853000
CVE-2023-51946,0,0,a9330db6bd80c9f6fcc27c4633adcac46a938b5c72a048149315accd439966ec,2024-01-25T15:52:22.730000
@ -238579,7 +238579,7 @@ CVE-2023-5215,0,0,076f3ad4d1737a363373e0b80c210de679a7c69cccbb36b095edcc1c654cb5
CVE-2023-52150,0,0,d6cc0c17a73b480b712f1be2d69c9c9ac6e0f201ff524861fd68bbcccab1a10f,2024-01-10T19:50:26.923000
CVE-2023-52151,0,0,85b7b7f24b04898381709d8e25edbe733fd7631a4f636fe0a6d084fa96bc68a9,2024-01-10T03:59:57.907000
CVE-2023-52152,0,0,097fc00b61b252fe2f250d2355f140cbca254720913054490d1cf9f4c7d22fe8,2024-01-05T16:00:51.157000
CVE-2023-52153,0,1,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943c76,2024-08-22T19:35:09.257000
CVE-2023-52153,0,0,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943c76,2024-08-22T19:35:09.257000
CVE-2023-52154,0,0,3c09d8bbc34bc21301a7ba257cb3ebe4acad4608bcdd31c9c14e3f17024b636a,2024-02-22T19:07:27.197000
CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000
CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000
@ -238743,7 +238743,7 @@ CVE-2023-52362,0,0,43adf8e6c64a96c436ca7a8a4039c94bf893e1cb423359d1487ffcd189c40
CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000
CVE-2023-52364,0,0,503781f00d75ade91ea9177c8585cd44a5a73fe2baa30f425ba6bec99d44c41c,2024-04-08T18:48:40.217000
CVE-2023-52365,0,0,bd1a11d425827e65eed9149e868165cf65bfaf0fcc43e0347175b951fc733d54,2024-02-20T19:50:53.960000
CVE-2023-52366,0,1,237c716036b70fdbe0d981998960891e9cef688cdb85da8994548d5f0d670539,2024-08-22T18:35:04.153000
CVE-2023-52366,0,0,237c716036b70fdbe0d981998960891e9cef688cdb85da8994548d5f0d670539,2024-08-22T18:35:04.153000
CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000
CVE-2023-52368,0,0,ab6ff08815d4283a11d94d78d409b6cb80ad558c4d3f1353292c6023cff0808c,2024-02-20T19:50:53.960000
CVE-2023-52369,0,0,1047464a4296b31a7cf6f87a7a312b39cc01e8c732edf6ebc4526ed97e7841ad,2024-02-20T19:50:53.960000
@ -241071,6 +241071,7 @@ CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5
CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000
CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000
CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
CVE-2023-7260,1,1,19104bbb4c6e3338ddc0fb4c40d135954a97c9a44f74b63a8a70f0296b3652ac,2024-08-22T21:15:16.107000
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
CVE-2023-7265,0,0,f2f550eec8eb52e2d7c6d4751c88c82f6bbba78e56c41a54eac7449c27df676c,2024-08-08T13:04:18.753000
@ -242921,7 +242922,7 @@ CVE-2024-20032,0,0,d9f17715cae8cf4f7f490704895224d3c5f8721c9379d158f6d75534a2fbe
CVE-2024-20033,0,0,54fbaa24cdc7b0bf4840e2f98e0d8064474699ec248bdbd149da783c89610676,2024-03-04T13:58:23.447000
CVE-2024-20034,0,0,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000
CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a9ce,2024-03-04T13:58:23.447000
CVE-2024-20037,0,1,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000
CVE-2024-20037,0,0,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000
CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000
CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000
CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc68,2024-07-30T02:15:05.320000
@ -244255,7 +244256,7 @@ CVE-2024-22009,0,0,b5b916a7d5e03fc859dbc7dc76ad79ca7e20552b5b212df09fe8f4b48b2af
CVE-2024-22010,0,0,48bb31cd9fda5132d6bf173e5f25a90e9963e9143797f12960e4a1affd5276cd,2024-03-12T12:40:13.500000
CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000
CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000
CVE-2024-22014,0,0,97be981b1958260947f79b7908c49463e10e156bc85f07e7f7d4adfcc41c6d71,2024-04-15T19:12:25.887000
CVE-2024-22014,0,1,c5bff26c435087f5079304a805aa4d4c0115cfcca173e494a6205154db70b18c,2024-08-22T21:35:02.417000
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
CVE-2024-22017,0,0,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d440c2,2024-08-15T19:35:04.510000
@ -244594,7 +244595,7 @@ CVE-2024-2239,0,0,62d5946fcfafb2a4be7efadc9b7155219cc610ca4673c610a784dbbc3d091b
CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000
CVE-2024-22391,0,0,1f24cf22f6c35797cf3f1b5f513aeb27d6c9ee9188ababd3d8b06daf33275477,2024-05-05T03:15:06.950000
CVE-2024-22393,0,0,708a22f5d3d86e394b7bd57dc98253e578e5dadb2c4096ced276d5893ef994b3,2024-08-01T13:46:55.723000
CVE-2024-22394,0,1,2d2cacf44303c3f2d5173aeda14462e9b46618509e14fff72aa5e0f1e00e04f1,2024-08-22T19:35:11.720000
CVE-2024-22394,0,0,2d2cacf44303c3f2d5173aeda14462e9b46618509e14fff72aa5e0f1e00e04f1,2024-08-22T19:35:11.720000
CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000
CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000
CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000
@ -244710,9 +244711,9 @@ CVE-2024-22569,0,0,709461d4796d213733f83973d7bcb39ae1034c99e9f028bded13074174036
CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
CVE-2024-22588,0,1,a256e02887a23b217209241f70470c3ebdd9d466eea5d17713c72f3f04119775,2024-08-22T19:35:11.923000
CVE-2024-22588,0,0,a256e02887a23b217209241f70470c3ebdd9d466eea5d17713c72f3f04119775,2024-08-22T19:35:11.923000
CVE-2024-2259,0,0,47e9716e08a8a64152636e816d65e3ceba79ed2969d2637cad811811cd82755b,2024-08-13T12:58:25.437000
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
CVE-2024-22590,0,1,d6412fa08202703f5ad227553f1802d67a899aa26e46c95f53e4a8e42002c8bc,2024-08-22T20:35:03.440000
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
CVE-2024-22592,0,0,268d0bb3e8d404d0087cf60d681467b452c81f0d7e52d485caa72c08138c2725,2024-01-20T18:49:41.750000
CVE-2024-22593,0,0,a9ca57d36c76f00065303d1015def590eb9e5a76ce97b84afb4d13dfe83ee2a6,2024-01-20T18:49:24.957000
@ -244892,7 +244893,7 @@ CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff
CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000
CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc0ec,2024-01-18T15:18:14.357000
CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000
CVE-2024-23076,0,1,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000
CVE-2024-23076,0,0,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000
CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000
CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000
CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000
@ -245692,7 +245693,7 @@ CVE-2024-2412,0,0,5eb3e084c15080bce88063a202edef708e748222aace75a3232d4d6b3f448d
CVE-2024-2413,0,0,bcce963a476349e5182596e9d4a6b2abe57a4b3c6a7908768bff05824ae06fd2,2024-03-13T12:33:51.697000
CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000
CVE-2024-24131,0,0,8a34d68fbe59589499b97058e1cc5501abd20303216cfd95ea1911115864db68,2024-02-12T14:32:43.777000
CVE-2024-24133,0,1,d949da0e1ac241998db2e8167fd5857f2e74feefba8bfda0856fa1bf8007e505,2024-08-22T19:35:13.840000
CVE-2024-24133,0,0,d949da0e1ac241998db2e8167fd5857f2e74feefba8bfda0856fa1bf8007e505,2024-08-22T19:35:13.840000
CVE-2024-24134,0,0,60e84ab02df9a5eebdd98ea4a5db40e2dea9f01666850cc98731ba000a572158,2024-02-22T03:36:42.397000
CVE-2024-24135,0,0,977ca85955d4bb50888ba44be3ff5724d7a85958ba21e73ab9d084c94066f20a,2024-02-22T03:39:23.233000
CVE-2024-24136,0,0,4e52a4e0c3e2bcd6af5c4faaf3a70948e406b5b2d6cac3691257ba4bddd05547,2024-02-02T23:32:58.107000
@ -245828,7 +245829,7 @@ CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a26
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
CVE-2024-24476,0,1,35173e0759cbff63e7dc92d5e25f4cab09b39e59ddcae8323e62df958905df80,2024-08-22T18:35:04.910000
CVE-2024-24476,0,0,35173e0759cbff63e7dc92d5e25f4cab09b39e59ddcae8323e62df958905df80,2024-08-22T18:35:04.910000
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
CVE-2024-24479,0,0,549c1faefc95446c73c237c8fc36405069121ac467e76d98310d7dcfb6901321,2024-08-02T00:15:19.433000
CVE-2024-2448,0,0,1625ab16b72103512d70f9dadaa1a93632daea1863fd2e539d584ce390412d31,2024-03-22T15:34:43.663000
@ -246159,7 +246160,7 @@ CVE-2024-24934,0,0,717ebd29baf0223147954ff4fc7b5abf7339ed99fc54fb4afa5bc07c2af82
CVE-2024-24935,0,0,39b3b47eec290d795dff4288fa3e077d67ca6b2bbc4436ed0fecf9ebb566b6a7,2024-02-12T14:19:54.330000
CVE-2024-24936,0,0,2f4b3d891c0fd71fb32f3f7281dc7468776050ecaee7860140e85b8329051af2,2024-02-09T01:06:20.053000
CVE-2024-24937,0,0,c913638a2922af897146e30fa39c4ae1eedee29a56b43ae469e999010515ffd7,2024-02-09T01:05:30.783000
CVE-2024-24938,0,0,dd8d31eccb802487f76a5c5f8eb0f1039cbdc8a46a8dfc0fe7129cca794500de,2024-02-09T01:05:13.527000
CVE-2024-24938,0,1,978a8e92d6abe74a239a68136614ec8b72eac7e14ad968791e1a3865ec19723c,2024-08-22T20:35:04.587000
CVE-2024-24939,0,0,1da892b278f27c0babb19a7942acd7f99014d05ffb12620f6b0a4b4b40d95594,2024-02-09T01:04:16.577000
CVE-2024-2494,0,0,0de5ad571b20519106dd976ff7c2bbe7fd4c1e42aeffbaa001c9ef8e69fc06c0,2024-06-10T17:16:25.307000
CVE-2024-24940,0,0,08a72ebdb54f61cfe3310654c3d68e440cb00279c18f6cecfd62390f59a13430,2024-02-07T23:45:31.493000
@ -246493,7 +246494,7 @@ CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d4
CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000
CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000
CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000
CVE-2024-25502,0,1,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000
CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000
CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000
CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000
CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000
@ -246613,13 +246614,13 @@ CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedf
CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d2d4,2024-03-14T12:52:09.877000
CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000
CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000
CVE-2024-25651,0,1,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000
CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
CVE-2024-25655,0,0,e15adc8eac4466bc206ecbf344e823f2dc60c695c8e2b528f93955091c188195,2024-03-19T13:26:46
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
CVE-2024-25657,0,0,076c37ba4df1bc69bbba3bb7d6ce236d56ed5cb3f42c6bab975b7d73d5a3aafd,2024-03-19T13:26:46
CVE-2024-25657,0,1,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
@ -246668,7 +246669,7 @@ CVE-2024-25734,0,0,4ee66182e097f4f56b6291ef1e6f0e392b286ce02b5247ef63df668ee1fb6
CVE-2024-25735,0,0,50c4e020abf1cffc3f47fd08c4abff2bccf96943b546e88771993726e766684a,2024-08-06T16:35:06.527000
CVE-2024-25736,0,0,e656e37839c1ec7c7b63871d566a91468e6f49c6416723c6764b550ab05e5670,2024-08-05T22:35:01.947000
CVE-2024-25737,0,0,2e40edda2bf8f11be62e123472d611b88082a8433647751d6e9fa8369863db2e,2024-05-24T01:15:30.977000
CVE-2024-25738,0,0,27fee36ee7c623ae584d6f5e106ac421c5c75b8036960cd8a9acca121dc6748c,2024-05-24T01:15:30.977000
CVE-2024-25738,0,1,708ab77db4798450f178306dfdce8e54e50af183337435b77974d77b7119e627,2024-08-22T20:35:05.737000
CVE-2024-25739,0,0,976dd73cb281097b08298328a4164e038521b14231c5653569f9d2458078f4f3,2024-06-27T13:15:55.520000
CVE-2024-2574,0,0,0663b3bf620e7eaea35e1b3237dc263b6d897527ed31c7e8166e509390c6cb16,2024-05-17T02:38:20.537000
CVE-2024-25740,0,0,6ba085d5463d39f02fcd8a1bcb6b0d08f943a0acf58c18d3b1c39a6a03f005b3,2024-02-26T21:11:27.837000
@ -246719,7 +246720,7 @@ CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000
CVE-2024-25850,0,1,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000
CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000
CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000
@ -247917,7 +247918,7 @@ CVE-2024-27205,0,0,6c651845ed79bae59e4bc5dfd269c86e5f248589b03155d6d1c21d876f034
CVE-2024-27206,0,0,3dbcbfbe90f7ccf1cbfa262db765dc01c5f5c5d064d48875899ccc34bacdeafb,2024-03-15T20:15:08.743000
CVE-2024-27207,0,0,9c2ba1f8859e635c52bb4f64d4b0a04f4cc6d5d084308215e2bb1b9341c49fd3,2024-08-05T18:35:09.463000
CVE-2024-27208,0,0,fe92ce35aa96bad489de57160c7a2fca3fa967ec6e1cec1d7b791aa73e9643da,2024-03-15T20:15:08.817000
CVE-2024-27209,0,0,b612b3955c2ff4f0a4005965ed798aa1e7684d6f13f33d83981249f317bba3c3,2024-03-15T20:15:08.860000
CVE-2024-27209,0,1,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f24a3,2024-08-22T20:35:06.747000
CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000
CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000
CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000
@ -248170,7 +248171,7 @@ CVE-2024-2751,0,0,e0380b41cfa9755453969621f95a77af0ea62dd5295ce9849e6c35313a94c3
CVE-2024-27515,0,0,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000
CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000
CVE-2024-27517,0,0,5e97f075b436a5c8f2e51d28a398abf4c938438e6f3743132df7b78060b7cc66,2024-02-29T13:49:29.390000
CVE-2024-27518,0,1,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000
CVE-2024-27518,0,0,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000
CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000
CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000
CVE-2024-2753,0,0,af8f0bf6c002c3e1db46c2cc4926e36d1e1afb83468ed827c9e47555532f1bd6,2024-04-04T12:48:41.700000
@ -248189,7 +248190,7 @@ CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
CVE-2024-27571,0,1,ac088f7b64ad71ffe595852b417cdbab48f16b4154eb8d90ddb111c8e2f63030,2024-08-22T19:35:19.107000
CVE-2024-27571,0,0,ac088f7b64ad71ffe595852b417cdbab48f16b4154eb8d90ddb111c8e2f63030,2024-08-22T19:35:19.107000
CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c782,2024-08-01T13:48:32.977000
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
@ -248669,7 +248670,7 @@ CVE-2024-28200,0,0,848f47156b7dea97a9f192a57ecb65c4366a740aa5ada8f7c8eccf77e8193
CVE-2024-2821,0,0,c2b44894dd7f88b2b849e5ba19097fd13ba6654511fb9e687a8b00c577041545,2024-05-17T02:38:32.443000
CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9650,2024-08-05T20:35:06.830000
CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000
CVE-2024-28213,0,0,ad07392c928a03cb3f0e61c49e78fde891a40d9dec43fbc4d8f05b06ec9b5b99,2024-03-07T13:52:27.110000
CVE-2024-28213,0,1,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000
CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000
CVE-2024-28215,0,0,6b2656e187f54be3b8692756e38dcefabd67fa7060f9733da9dff9ce708bf4af,2024-03-07T13:52:27.110000
CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000
@ -248760,7 +248761,7 @@ CVE-2024-28387,0,0,af4c90d656accc5b2d132269cbcc25e25573278fd5f53e46eeb301cb514b3
CVE-2024-28388,0,0,575d4968aa541f7d6ef0da0b573c9a8bb55aa2b590b70d0372139e0de2630184,2024-03-14T12:52:09.877000
CVE-2024-28389,0,0,42acf6cbaebdc461cce2af35b74679c9d1c81ce9114564911b85ebeaf88a2bac,2024-08-02T16:35:40.323000
CVE-2024-2839,0,0,ee45053b5ac83eae18c1a71d98f9817e7025bc9d7e049918f01e284843f64c90,2024-04-02T12:50:42.233000
CVE-2024-28390,0,0,8e966fdec021f459642300414ff272480719a8ad797893b6828dff0c5c67b98e,2024-03-14T12:52:09.877000
CVE-2024-28390,0,1,668a15f7dcbbeb37a1e1d9d05ceb4da1149f17d4318e69ac0b18c5f0285d949e,2024-08-22T21:35:03.607000
CVE-2024-28391,0,0,1612464a5045a9dcbfbed51b4145357f41a0970daedd21315ce2194196825398,2024-08-01T13:49:04.167000
CVE-2024-28392,0,0,5824697cb412e64caabb20f46b93c113a811b02735a0ef2ece011572dc931f0d,2024-03-20T17:18:26.603000
CVE-2024-28393,0,0,04c598367976d9977c43beb15b030d893b4ef27f3405bd598ddf167ac93764fc,2024-03-25T16:43:06.137000
@ -248791,7 +248792,7 @@ CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdc
CVE-2024-28435,0,0,4c02f96d0bdc1a14461e768ad92ad2becc695cfb2c978e4da67bd0167ce78dc9,2024-03-25T16:43:06.137000
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
CVE-2024-28441,0,1,98f673e8e169ee952dddca79ea78c3ead96fc2eb99b2c0a11068e947c06c44d4,2024-08-22T18:35:05.960000
CVE-2024-28441,0,0,98f673e8e169ee952dddca79ea78c3ead96fc2eb99b2c0a11068e947c06c44d4,2024-08-22T18:35:05.960000
CVE-2024-28442,0,0,b5d378d7bf249d8932b5ef67495fddcb797bea8509e4f1706eab874d95ebf375,2024-08-05T17:35:10
CVE-2024-28446,0,0,5cb6c3ad6343c7605d7288fa21a1a2b4ecbb6433ed1975b50505c4c4841c4770,2024-03-19T13:26:46
CVE-2024-28447,0,0,96efc6b45fb26dce648a4b187b204c486498ef994105e9fd2065b17d0a61b2f5,2024-08-20T21:35:02.770000
@ -249430,7 +249431,7 @@ CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f6
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
CVE-2024-29477,0,0,95dcae9bc8061c5d58cf2b63e167bb4091735292e7ec34284f04e5b395f25cbd,2024-04-03T12:38:04.840000
CVE-2024-2948,0,0,2331d78509f1f3893daaecaf2db5091913c1d64d9406e6199bfd4abbc5caa395,2024-04-01T01:12:59.077000
CVE-2024-29489,0,1,2cd7b967a834ebb80ab1382ec368c5b1d73b4dff18a9c5fbfabbbbccd3dff0ee,2024-08-22T19:35:20.067000
CVE-2024-29489,0,0,2cd7b967a834ebb80ab1382ec368c5b1d73b4dff18a9c5fbfabbbbccd3dff0ee,2024-08-22T19:35:20.067000
CVE-2024-2949,0,0,741e52e7909be6687101b8ec7aa347d81d5d7ec2a7c6c782e512ff2bce69b7e4,2024-04-08T18:48:40.217000
CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000
CVE-2024-2950,0,0,596af42449f28aff5b2c79c90b770bb4c97ffb9bc969aaf5cc4ba262b42d972f,2024-04-08T18:49:25.863000
@ -249906,7 +249907,7 @@ CVE-2024-30183,0,0,ad137d8416946ce656cce31eb7a0b96200b841fa81cd9483fb6811366140c
CVE-2024-30184,0,0,77c9228d008326bd99ae127ca8e132427e74beec3c963f6478bcbcf355838fa3,2024-03-27T12:29:30.307000
CVE-2024-30185,0,0,021fa2bb56fdb06083e9059af1891d4677f384120b9c9cff2bf7cdb9c84fa539,2024-03-27T12:29:30.307000
CVE-2024-30186,0,0,2c739b7180a604f892f32e45c0608cfe3aaa016f782853a55dd614d1b973db95,2024-03-27T12:29:30.307000
CVE-2024-30187,0,0,a87417506a6715324081b8a6732358ff8be0f886268063cb33d3fafba7ead39b,2024-03-25T13:47:14.087000
CVE-2024-30187,0,1,45ee6c8bfcb6b07e2d43488dfa236e29eadba9b30ce6ca6fed5fafe6b59b5859,2024-08-22T21:35:04.480000
CVE-2024-30188,0,0,a17021bfa0c57e65a7aad5abba7285a3d1572183b295c16e57ecab41a5e8200c,2024-08-12T13:41:36.517000
CVE-2024-30189,0,0,bea0641188c77d9ff9bf3c0d46eff997519b7c27956011c836ea03e42a1ac4c0,2024-04-09T12:48:04.090000
CVE-2024-3019,0,0,fc47f9f0e8d896280f4a2d46090d1bc0cf7b321d9a30221be0d2b03759c35ec9,2024-05-28T19:15:11.323000
@ -250427,7 +250428,7 @@ CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe
CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000
CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000
CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000
CVE-2024-30804,0,1,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000
CVE-2024-30804,0,0,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000
CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000
CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000
CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000
@ -250535,12 +250536,12 @@ CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765
CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8d92,2024-04-04T12:48:41.700000
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
CVE-2024-31032,0,1,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
CVE-2024-31033,0,0,ad98d7e55b8cc6171b35a6136e6eb51847672500aa911f7497c7969c50af9164,2024-08-02T02:15:31.420000
CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000
CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000
CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000
CVE-2024-31041,0,1,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000
CVE-2024-31041,0,0,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000
CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000
CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f57,2024-06-17T12:42:04.623000
CVE-2024-31061,0,0,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000
@ -251015,7 +251016,7 @@ CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff
CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000
CVE-2024-31756,0,0,b265a44ac5576ee6d5c0a18978b0e66ae2e3119d6151f744407705cbd0d8e888,2024-05-22T12:46:53.887000
CVE-2024-31757,0,0,640246057d9af431a856f7069b3a4b0176cede6dd1a0ca84cccb72f8b2351ce2,2024-05-22T12:46:53.887000
CVE-2024-31759,0,1,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fef94,2024-08-22T19:35:24.357000
CVE-2024-31759,0,0,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fef94,2024-08-22T19:35:24.357000
CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000
CVE-2024-31760,0,0,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000
CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000
@ -251324,7 +251325,7 @@ CVE-2024-32166,0,0,e117f1f1473eb5a0781f79a5d43c653abcb8b2fa988a11cd3340ec0a690c0
CVE-2024-32167,0,0,915de4b0debb285120767f5ee79a021decbe9afbb3817337a80cac9f827f0a60,2024-08-01T13:51:22.630000
CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000
CVE-2024-3219,0,0,12c4e5f254e3ed2bfca4b5e1da68c88dbcde5c0140caaf887a7815a8e10e3460,2024-08-05T15:15:53.960000
CVE-2024-3219,0,1,3c8ce0e475eab60efda7b485e6b89370ab21b7f77aca5f7f93f1e93874c8b857,2024-08-22T20:15:09.143000
CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000
CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000
CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000
@ -252017,7 +252018,7 @@ CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610
CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
CVE-2024-33103,0,1,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
@ -252067,7 +252068,7 @@ CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d63
CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000
CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
CVE-2024-33226,0,1,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f05c3,2024-08-22T19:35:26.237000
CVE-2024-33226,0,0,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f05c3,2024-08-22T19:35:26.237000
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
@ -252329,7 +252330,7 @@ CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbd
CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000
CVE-2024-33653,0,0,265fc534e8717f316164edd35fe39b65af5bd4a9e2599f020b58283bd3269b45,2024-07-09T18:19:14.047000
CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c732,2024-07-09T18:19:14.047000
CVE-2024-33655,0,1,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000
CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000
CVE-2024-33656,0,0,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000
CVE-2024-33657,0,0,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000
CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000
@ -252400,7 +252401,7 @@ CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd6
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000
CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000
CVE-2024-33799,0,1,9d8baf9264b308f06d2bfe7c972157c80c3d36eac1c756578279660cf6d83ddb,2024-08-22T19:35:28.087000
CVE-2024-33799,0,0,9d8baf9264b308f06d2bfe7c972157c80c3d36eac1c756578279660cf6d83ddb,2024-08-22T19:35:28.087000
CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000
CVE-2024-33800,0,0,201356ff7d99d67e9b23318eb81347b8e0acce7c8616f8f0b16bc1aecb8d2a62,2024-05-28T17:11:47.007000
CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000
@ -252472,7 +252473,7 @@ CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1e
CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000
CVE-2024-33901,0,0,a1f0948d73a23ff6210c02030912794a258b1439fa01bfbefd0ef5985673396e,2024-08-02T03:15:33.887000
CVE-2024-33903,0,0,66fa6f18457541069e9742d7224c491d6b0a223ce231b54f3cf8ba6c6e111733,2024-04-29T12:42:03.667000
CVE-2024-33904,0,0,649f4e21e4e6e1bd169137db7a1546844fc67399c9649d4ffcd3b89ea6d1e17d,2024-04-29T12:42:03.667000
CVE-2024-33904,0,1,7f612cc39cf5cffef556560adbc4e6bcc771b421fa11cf86490b14ea4a43c0ba,2024-08-22T20:35:09.343000
CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000
CVE-2024-33907,0,0,51edf1f50248f36c9e87b8d73ea1cc5abed4f93b57bba096b80e73be40374db3,2024-05-07T13:39:32.710000
CVE-2024-33908,0,0,df73291580be08f5b2a94bed722cbb238436865b447d67c437568125e63f333e,2024-05-07T13:39:32.710000
@ -252892,7 +252893,7 @@ CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb4
CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000
CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
CVE-2024-34459,0,1,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000
CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000
CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000
@ -252935,7 +252936,7 @@ CVE-2024-34519,0,0,e1bab0f51bff6ddc1064f759576ee7e30191ae4ab924c21597ebc2a29f9b8
CVE-2024-34523,0,0,7ef51f7e789546b198cf934fa08689a630a0291ba9909985498eacb1d192e4fb,2024-08-02T03:15:43.153000
CVE-2024-34524,0,0,3e667092f2fac2e9248384e2031bfe46558254a6a3fc0f2ae0aecbfd07dbb573,2024-07-03T02:00:27.283000
CVE-2024-34525,0,0,7b62d839278ce76830c96b3fb5e58c932a408ac771b301e231e0f571e1316ee9,2024-07-03T02:00:29.427000
CVE-2024-34527,0,1,23e03d0c4fa6bfa8b77f24e782beaeccc9957ed9211c09f918e2b7968b887f04,2024-08-22T18:35:09.990000
CVE-2024-34527,0,0,23e03d0c4fa6bfa8b77f24e782beaeccc9957ed9211c09f918e2b7968b887f04,2024-08-22T18:35:09.990000
CVE-2024-34528,0,0,8d9b5b257f7d2fd4a76a2b149b8062182b52b5547fe4d60dbfd3d242d3d40d64,2024-05-06T12:44:56.377000
CVE-2024-34529,0,0,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb105b,2024-07-03T02:00:30.540000
CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000
@ -253176,7 +253177,7 @@ CVE-2024-34826,0,0,351c22bcab8818868b07290276f62aa434130aafdd9ebc850cc6b73894d2e
CVE-2024-34827,0,0,dd19689a79f1067d7d45985a043cee153e2c55a2f9cd3e74b0ee8f1e25e905fb,2024-05-14T16:12:23.490000
CVE-2024-34828,0,0,e7ae500419610a76a265629d4e156ba43b75d86bab84cd6265c5a22f7e811bd5,2024-05-14T16:12:23.490000
CVE-2024-3483,0,0,72ac121e10f0fbec3441fdc985105b5517c67c7d15c68e546183af8699afc04f,2024-05-15T18:35:11.453000
CVE-2024-34832,0,0,e38f6d8d3f9b6bca1687cfccc25da7adcce2d7488c36a825ea76f897c194b67d,2024-08-02T17:02:44.753000
CVE-2024-34832,0,1,9221b37c801147fa3e1f0e1374d69209bf6d3d76dd01b6b6751ad3db7ce446e9,2024-08-22T20:35:10.197000
CVE-2024-34833,0,0,d0fc9ae10a7af80da29383727746a9a28b1b3908848ebf21d8371a48e86f18df,2024-08-05T17:35:13.953000
CVE-2024-3484,0,0,615f14fdd6b7cd87ca18ef762e16cc35184db7733a3812c430864b915d907b16,2024-05-15T18:35:11.453000
CVE-2024-3485,0,0,cfcae770f37ba0f2f38addf6a74502cf1d2c306fb9374f29d74c99431684fa32,2024-05-15T18:35:11.453000
@ -253481,12 +253482,12 @@ CVE-2024-35430,0,0,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9
CVE-2024-35431,0,0,0a35dffe7e6c93066fa509053c839d3a8bc16edf2b77120799090f4882a8d3ea,2024-08-01T13:52:41.087000
CVE-2024-35432,0,0,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000
CVE-2024-35433,0,0,0b3687e6d05fd0aabce2f6753ab48622a6daecb670483272307382dbb941306d,2024-05-30T18:18:58.870000
CVE-2024-35434,0,0,55e035c2a162134710b80f5640b923747de7468a0790da753e41ecb6e33217f6,2024-05-29T19:50:25.303000
CVE-2024-35434,0,1,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000
CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000
CVE-2024-3545,0,0,d9f283192ab8f986c7e851f9b58a13c1438e2ebb25fe23225197629fde187eac,2024-04-10T13:23:38.787000
CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000
CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000
CVE-2024-35469,0,1,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000
CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000
CVE-2024-3547,0,0,5281ad8cfbf75d8e7097f8df52b8a3e9c74f8dabf40b76a70b99a4928380607e,2024-05-14T16:11:39.510000
CVE-2024-35474,0,0,1aa452483d6d7da77f1090f3cd37ef4b816291e1838401dc1342635ac1a9c4c8,2024-06-10T18:06:22.600000
CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf4fd,2024-07-03T02:01:45.963000
@ -253498,7 +253499,7 @@ CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052
CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000
CVE-2024-35510,0,0,caaffeb522a9243cb4a1bb41637eced11d63455c55d5f889189d39467161eb6a,2024-07-03T02:01:46.810000
CVE-2024-35511,0,0,0925e571054fff897af51a6c91c2579c2749b26c74104183a16b37d4fa6c6517,2024-07-03T02:01:47.583000
CVE-2024-35512,0,0,825dd69eea00721f269736947db0dabb552de9aaee5d843af6ea9626743eb096,2024-05-29T19:50:25.303000
CVE-2024-35512,0,1,b896e4527afcecfdf8ee8b9a5d8645a7997efcebb8181c42302f1215247b04ab,2024-08-22T21:35:05.483000
CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000
CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f171,2024-06-26T12:44:29.693000
CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000
@ -253580,7 +253581,7 @@ CVE-2024-35656,0,0,b6fb99a75659a0b6cddb17e86374269e5493cd14bd9535b3dfd7ed1f6e679
CVE-2024-35657,0,0,b51c4e22c7c5f52f89b80edb48a52842853a592201112fcdbd807b87af974c40,2024-06-10T02:52:08.267000
CVE-2024-35658,0,0,02d603bb4833c826378dc2c7b4b6c158aa64f99f63e182d87141c499aba708ea,2024-06-12T17:50:55.227000
CVE-2024-35659,0,0,2651c0d3218fe1050c14ffaf3928003168756cb772b19ad449c9389f3dfde3e5,2024-06-10T02:52:08.267000
CVE-2024-3566,0,1,d8adb5426b454694781dd5ab667311ecd90bc8a46fc99ba28a1f66dd045ba157,2024-08-22T19:35:35.700000
CVE-2024-3566,0,0,d8adb5426b454694781dd5ab667311ecd90bc8a46fc99ba28a1f66dd045ba157,2024-08-22T19:35:35.700000
CVE-2024-35660,0,0,a85ff0a7822a14d165e5de7ed1919abb154a1de11c8215173a97f054ca1441ea,2024-06-10T02:52:08.267000
CVE-2024-35661,0,0,8b8332085c8053a42df002a98652102b5e05133894d3f36aab8949e0eb0e3128,2024-06-12T13:31:41.527000
CVE-2024-35662,0,0,43b492385b92b1fc942c99fc466dcd6547a4a7b780999e4b389c076e3ea39b15,2024-06-12T13:31:10.767000
@ -254178,7 +254179,7 @@ CVE-2024-36264,0,0,14c280aba5df11c6b2ff8e262101089437d0333d307f52ff751b574a69563
CVE-2024-36265,0,0,3c8ae8461757f224b0e43678d6a3475afd39b129c52679abb832e768cb65918d,2024-08-02T04:16:59.920000
CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000
CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000
CVE-2024-36268,0,0,dff0467d290592509ee25f10c7bba0154491650d4cb39d7b286134a8cb057fcc,2024-08-02T12:59:43.990000
CVE-2024-36268,0,1,043d5e00f7bba001fc819462941e5679cccbff624823c585768e8f325f4d2d8e,2024-08-22T20:35:12.037000
CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000
CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000
CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000
@ -254277,14 +254278,14 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046
CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
CVE-2024-36439,0,1,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000
CVE-2024-36439,0,0,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
CVE-2024-36440,0,0,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
CVE-2024-36441,0,1,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000
CVE-2024-36440,0,1,b326a6820a4986176d290647e2ca4280ea1a45872937a97772f4d16e115926d6,2024-08-22T20:35:13.640000
CVE-2024-36441,0,0,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000
CVE-2024-36442,0,0,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
CVE-2024-36443,0,1,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000
CVE-2024-36443,0,0,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000
CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
CVE-2024-36445,0,0,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
CVE-2024-36445,0,1,fa564e1c9d1c227d129e726de305d057f0b73fb302963320d7035e07e6afee8d,2024-08-22T20:35:14.640000
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000
CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000
@ -254366,7 +254367,7 @@ CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092
CVE-2024-36577,0,0,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000
CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000
CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000
CVE-2024-36580,0,1,214697697bb80df3f9cca6a9df817f6d970b4b4eff9913528d0b988f85d755f8,2024-08-22T19:35:31.613000
CVE-2024-36580,0,0,214697697bb80df3f9cca6a9df817f6d970b4b4eff9913528d0b988f85d755f8,2024-08-22T19:35:31.613000
CVE-2024-36581,0,0,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000
CVE-2024-36582,0,0,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000
CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000
@ -254424,7 +254425,7 @@ CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb5
CVE-2024-36736,0,0,b20d2ef797aa6fbbca71cb0c7c6886935927b9ada97126f8e3cbe4efcdbdd655,2024-06-07T14:56:05.647000
CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000
CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000
CVE-2024-36740,0,0,2119901e17f2acabf72e64a543d2aa59166a4d04cef9ebec63b859fb8418a1d5,2024-06-07T14:56:05.647000
CVE-2024-36740,0,1,b8d6e8bca7b91dd7c523241570682574ea3e2e1025716afa76fbc7a7c4de936f,2024-08-22T20:35:15.900000
CVE-2024-36742,0,0,acb38f1b43ab4e7383495b3e1f06f162c75f285b1ef8caa005f6865ae9c13ef1,2024-08-01T13:53:15.053000
CVE-2024-36743,0,0,918adf8ca0ed469017b9c6faa54a88497274ae724212583479f2aa193c53be72,2024-07-03T02:03:35.050000
CVE-2024-36745,0,0,1c12c7bcc24ae5bb6a1ae8c5c800342ca4dc4e184f12e2bbc75666cd5cf9fdfd,2024-06-07T14:56:05.647000
@ -254434,7 +254435,7 @@ CVE-2024-3676,0,0,8dc193c8609917b35ba91a632e73de4e92ed46289774a677f06060a8b04aac
CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000
CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000
CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000
CVE-2024-36773,0,1,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000
CVE-2024-36773,0,0,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000
CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000
CVE-2024-36775,0,0,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000
@ -254448,11 +254449,11 @@ CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465
CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000
CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
CVE-2024-36800,0,0,7145d6f747aaada9716fb81bc8dfb45a6760f4d4c44d1923a8fcdfd4d6bf0704,2024-06-04T16:57:41.053000
CVE-2024-36800,0,1,22057c82ea39171d646a3d69514bfe24d86c6abe66f6737dc702e3f1234458ca,2024-08-22T20:35:16.867000
CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83c50,2024-06-04T16:57:41.053000
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
CVE-2024-36811,0,1,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000
CVE-2024-36811,0,0,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
CVE-2024-36821,0,0,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000
@ -254462,11 +254463,11 @@ CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e
CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000
CVE-2024-3684,0,0,ef6904f473bb993a6bf9ca34fba021c50efb8f96f04049399eccb5be29999ef7,2024-04-19T16:19:49.043000
CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000
CVE-2024-36843,0,1,4198bc8a9b485a9b6edbe36e6e06e96f5937d55d9694e4e4309439b88c915982,2024-08-22T18:35:15.457000
CVE-2024-36843,0,0,4198bc8a9b485a9b6edbe36e6e06e96f5937d55d9694e4e4309439b88c915982,2024-08-22T18:35:15.457000
CVE-2024-36844,0,0,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000
CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000
CVE-2024-3685,0,0,dda0c71ef8f633473513e14b8b76ca4b9f78357b8af623185fa69818b961df70,2024-05-17T02:40:03.840000
CVE-2024-36856,0,1,dcc09dd034e14f7209a49a89553bd06990a72cd8ab2f8f5d6e2d144a9d460281,2024-08-22T19:35:33.427000
CVE-2024-36856,0,0,dcc09dd034e14f7209a49a89553bd06990a72cd8ab2f8f5d6e2d144a9d460281,2024-08-22T19:35:33.427000
CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e274,2024-08-14T20:35:15.433000
CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000
CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000
@ -254649,7 +254650,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6
CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000
CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000
CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000
CVE-2024-37066,0,1,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000
CVE-2024-37066,0,0,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
@ -255985,7 +255986,7 @@ CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b744627
CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000
CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000
CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000
CVE-2024-39211,0,1,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000
CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
@ -256336,7 +256337,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
CVE-2024-39717,1,1,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000
CVE-2024-39717,0,0,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
@ -256361,6 +256362,7 @@ CVE-2024-39746,0,0,0e20ca81d9d325bdeee73b70da8ce4b47d626b09ef1d79c40ba99deb3dbd4
CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000
CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000
CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000
CVE-2024-39776,1,1,d375cf92d107deb4a4260c0cdd1844c7758bfad179a08835f00260dc4d40ef32,2024-08-22T20:15:08.750000
CVE-2024-39777,0,0,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170daf18,2024-08-01T16:45:25.400000
CVE-2024-39778,0,0,bb2539eb59e56cbeaf6e7ed7999fae0d5792d390eb9e1100733cc6f4b019e4fc,2024-08-19T16:20:52.980000
CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000
@ -256498,7 +256500,7 @@ CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
CVE-2024-40096,0,0,d8754528addbe80fbf9f4d9648ed7183bc82944e53f9acdf3e8fc0aa5af1d9bc,2024-08-05T12:41:45.957000
CVE-2024-40096,0,1,f4d93815f52e3c16c28040ba21795a35002b57c191156f911baad6e63290a17a,2024-08-22T20:15:09.340000
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
CVE-2024-40101,0,0,fa05a141dcc36735ee72bbd0c3b7b1a769814f7631a0be292d4f64087437d8d6,2024-08-06T16:30:24.547000
CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000
@ -256535,7 +256537,7 @@ CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e
CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000
CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000
CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000
CVE-2024-40347,0,1,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000
CVE-2024-40347,0,0,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000
CVE-2024-40348,0,0,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000
CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000
CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000
@ -256601,7 +256603,7 @@ CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000
CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000
CVE-2024-40535,0,1,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
CVE-2024-40540,0,0,812067b26dd7cd753b1d3089300f8704ff38af643d689f8a41629c2d3fffe24f,2024-08-01T13:57:39.867000
@ -257159,14 +257161,14 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
CVE-2024-41572,0,0,ab40cf80c59b95a1ebd2f7b9ce0b0eac0ef9840c48fb790d9e4d27dbb6725659,2024-08-22T12:48:02.790000
CVE-2024-41572,0,1,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000
CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000
CVE-2024-41599,0,1,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000
CVE-2024-41599,0,0,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
CVE-2024-41600,0,1,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000
CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000
CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
@ -257236,8 +257238,8 @@ CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975
CVE-2024-41700,0,0,3462462fad0fddef375740da32d232c879628b29f2cdae5057660af90196a0e0,2024-08-20T15:44:20.567000
CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000
CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000
CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000
CVE-2024-41704,0,0,859a0932f984f671cffc12a925924b508ad9d462f16bdea412375c597ddcb036,2024-08-01T13:59:06.900000
CVE-2024-41703,0,1,cf5695a5bf98c8d2693a5d1ac0fe1e0e7a87ab2451cdb300ec7fae87f74f10dc,2024-08-22T21:15:16.903000
CVE-2024-41704,0,1,2bc018b99d38a9eaaef3e278b3999e228c9f0ef28a260142aea13990cbc48962,2024-08-22T21:15:17.050000
CVE-2024-41705,0,0,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000
CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f08765e,2024-08-01T13:59:08.790000
CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000
@ -257700,6 +257702,7 @@ CVE-2024-42400,0,0,e23fa86955810ac61993a53dac28992470f4d4df1a643f460294725e3f989
CVE-2024-42408,0,0,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-42411,0,0,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000
CVE-2024-42418,1,1,ed1a91e2514a20155cb45746dd2dd22745796ef58e5d081f231343d5c83982e8,2024-08-22T20:15:09.470000
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
CVE-2024-42434,0,0,9a2fab3c0bfcfe26ad4bc7e023423fbf9916073a1831f3237f47ba85a53a41b9,2024-08-14T17:49:14.177000
@ -257799,7 +257802,8 @@ CVE-2024-42583,0,0,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c13
CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000
CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000
CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000
CVE-2024-42598,0,1,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000
CVE-2024-42598,0,0,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000
CVE-2024-42599,1,1,af0c7758e4fae58f5f3fab3c39c9fe73a105a9457488ef47408afb1c1cb07d8a,2024-08-22T20:15:09.730000
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
@ -257871,21 +257875,24 @@ CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d0
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
CVE-2024-42767,1,1,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000
CVE-2024-42768,0,1,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000
CVE-2024-42769,0,1,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000
CVE-2024-42761,1,1,42f4d93a23e5ceb7589a0a0a994eda8177750c796c64d1251492a032ce0c4fe4,2024-08-22T21:15:17.193000
CVE-2024-42762,1,1,692b7e241af803e71a0199e9e1e9d231aedd9ddb0d50fcdbd1087b56440a7a53,2024-08-22T21:15:17.293000
CVE-2024-42763,1,1,735e3da39deff34346e84ecd6fa3b45243704f42eb840457ded8ef73e6d196c6,2024-08-22T21:15:17.380000
CVE-2024-42767,0,0,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000
CVE-2024-42768,0,0,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000
CVE-2024-42769,0,0,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
CVE-2024-42770,0,0,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000
CVE-2024-42771,0,0,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000
CVE-2024-42772,0,1,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000
CVE-2024-42773,1,1,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000
CVE-2024-42774,0,0,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000
CVE-2024-42775,0,0,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000
CVE-2024-42776,0,0,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000
CVE-2024-42771,0,1,8a6776e936284bf431b85500960417f150ea6f356fbe5a41f7e8048c36e3a27c,2024-08-22T20:35:19.220000
CVE-2024-42772,0,0,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000
CVE-2024-42773,0,0,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000
CVE-2024-42774,0,1,d6b497b74223592e0aaadab0ba1724b646e73c13f25cfe2c430987e37aa4b077,2024-08-22T20:35:20.297000
CVE-2024-42775,0,1,18cbd0d1c764e7cf72a48985672f628f2f56479c5638cf3e733448c67269c381,2024-08-22T20:35:21.223000
CVE-2024-42776,0,1,0f1b241b50bf4862f737c1887d1ca871138724163a8e58e8e94932d3b2fab0d1,2024-08-22T20:35:22.323000
CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
CVE-2024-42778,0,0,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000
CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
CVE-2024-42780,0,1,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000
CVE-2024-42780,0,0,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000
CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
CVE-2024-42783,0,0,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000
@ -258253,8 +258260,8 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec
CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000
CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
CVE-2024-43853,0,1,36efb4595067b56d7e5fcb48cb087d35edd1df5e2fba303124fad2de2b6dde32,2024-08-22T18:06:38.087000
CVE-2024-43854,0,1,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000
CVE-2024-43853,0,0,36efb4595067b56d7e5fcb48cb087d35edd1df5e2fba303124fad2de2b6dde32,2024-08-22T18:06:38.087000
CVE-2024-43854,0,0,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000
CVE-2024-43855,0,0,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
CVE-2024-43856,0,0,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
CVE-2024-43857,0,0,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000
@ -258406,16 +258413,17 @@ CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
CVE-2024-45167,0,0,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000
CVE-2024-45167,0,1,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000
CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000
CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
CVE-2024-45191,0,0,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000
CVE-2024-45192,0,1,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000
CVE-2024-45191,0,1,6e362ad118273f4202bdc6854a76c33f6ead6f18b708e6e6c5e428cb771cc872,2024-08-22T21:35:06.397000
CVE-2024-45192,0,0,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000
CVE-2024-45193,0,0,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
CVE-2024-45201,1,1,3beba8e0e0c40151876f7bf97d547955727b1d2b25312099976993b69ba37344,2024-08-22T20:15:10.063000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000
@ -260764,7 +260772,7 @@ CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472
CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000
CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
CVE-2024-7634,1,1,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000
CVE-2024-7634,0,0,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000
CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000
CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000
CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000
@ -260943,14 +260951,14 @@ CVE-2024-7965,0,0,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2d
CVE-2024-7966,0,0,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000
CVE-2024-7967,0,0,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
CVE-2024-7968,0,0,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000
CVE-2024-7969,0,0,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000
CVE-2024-7969,0,1,8acea45baac76f5e45d05acf8035608f405ec6038c8af4ab71dabd90619c2144,2024-08-22T20:35:26.473000
CVE-2024-7971,0,0,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
CVE-2024-7972,0,0,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
CVE-2024-7973,0,0,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
CVE-2024-7977,0,0,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000
CVE-2024-7977,0,1,7f96e9ae91564fe788773f7fc620ef26ab3a10a3c58ea5396e14a68a3ee2a8b8,2024-08-22T20:35:28.140000
CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000
CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
@ -260967,4 +260975,10 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad
CVE-2024-8041,0,0,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000
CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
CVE-2024-8088,1,1,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000
CVE-2024-8075,1,1,7079b719572b53350db51e194b079bb027ed093b84ca2288274afcc9c61e18e9,2024-08-22T20:15:10.210000
CVE-2024-8076,1,1,5422ff555378339e3db32bbb4b4a84b33933a93def5de9c6bbe2c92bdf4d6eb0,2024-08-22T20:15:11.017000
CVE-2024-8077,1,1,dfda6dec69a8c0f0b52ef8c08df76e2bad192b6161a8d6308689618841f71875,2024-08-22T20:15:11.690000
CVE-2024-8078,1,1,2411dc17166c6e2b6a2c4099cd4a7c0f52610cbc3a42ead6750f7228a1af594b,2024-08-22T21:15:17.603000
CVE-2024-8079,1,1,4926967e2b3295baddb2321c216aff25029967f573a76b1e6e5c30e67c6da0d4,2024-08-22T21:15:17.910000
CVE-2024-8080,1,1,b7396789c05f63952d87297908119d6db13570ae1754c0bf6c6b54a52e342c2d,2024-08-22T21:15:18.217000
CVE-2024-8088,0,0,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000

Can't render this file because it is too large.