diff --git a/CVE-2021/CVE-2021-36xx/CVE-2021-3600.json b/CVE-2021/CVE-2021-36xx/CVE-2021-3600.json index 040753983da..0987855fd4d 100644 --- a/CVE-2021/CVE-2021-36xx/CVE-2021-3600.json +++ b/CVE-2021/CVE-2021-36xx/CVE-2021-3600.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3600", "sourceIdentifier": "security@ubuntu.com", "published": "2024-01-08T19:15:08.470", - "lastModified": "2024-01-11T18:40:05.340", + "lastModified": "2024-08-22T20:29:55.757", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.14", + "versionStartIncluding": "4.14.115", + "versionEndExcluding": "4.14.308", + "matchCriteriaId": "7B01397E-F6D7-4353-BE25-4951FE26F18B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", "versionEndExcluding": "4.19.206", - "matchCriteriaId": "FD710309-3897-495A-8AE3-4BD2EFA790E0" + "matchCriteriaId": "FA79A011-2A9D-48C5-B43E-0340D350528C" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46950.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46950.json index 9948081a3b3..5273fcceac9 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46950.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46950.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46950", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:06.420", - "lastModified": "2024-04-10T20:13:16.993", + "lastModified": "2024-08-22T20:28:57.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -61,44 +61,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.14.0", + "versionStartIncluding": "4.14.147", "versionEndExcluding": "4.14.233", - "matchCriteriaId": "86B2A77C-6C00-4E2C-9294-8E428795F340" + "matchCriteriaId": "06219DEF-0B7F-4D93-9878-9DC640945517" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.15.0", + "versionStartIncluding": "4.19.77", "versionEndExcluding": "4.19.191", - "matchCriteriaId": "B7281E1E-A00B-49C0-A849-9CE1CE780227" + "matchCriteriaId": "3E80ED24-F781-449F-8035-CBA0FB5C6691" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.20.0", + "versionStartIncluding": "5.2.19", + "versionEndExcluding": "5.3", + "matchCriteriaId": "48875F15-B129-4684-8556-4EAD32A9586F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.4", "versionEndExcluding": "5.4.118", - "matchCriteriaId": "5670AEA3-082C-42D6-A067-CD9ECED4B84B" + "matchCriteriaId": "9904B6DF-B2DB-4584-B17A-8EEC7C81258B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.5.0", + "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.36", - "matchCriteriaId": "C7148769-B830-4B8F-986F-E0C85A19FC7F" + "matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.11.0", + "versionStartIncluding": "5.11", "versionEndExcluding": "5.11.20", - "matchCriteriaId": "EFB425F0-C28C-4B44-8B4C-AD512AA832DE" + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.12.0", + "versionStartIncluding": "5.12", "versionEndExcluding": "5.12.3", - "matchCriteriaId": "C3814FA3-8141-4313-A852-8C4212BE12AD" + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" } ] } diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2585.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2585.json index d6920821b16..459b4e37b15 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2585.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2585.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2585", "sourceIdentifier": "security@ubuntu.com", "published": "2024-01-08T18:15:44.383", - "lastModified": "2024-01-19T17:14:35.877", + "lastModified": "2024-08-22T20:28:23.727", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,8 +92,29 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.7", - "versionEndExcluding": "6.0", - "matchCriteriaId": "83F78277-6AE5-49BE-B412-E200DE9C0AB2" + "versionEndExcluding": "5.10.137", + "matchCriteriaId": "674AABE4-BC3E-4530-9717-5DFE7AB70A3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.61", + "matchCriteriaId": "51861563-7F40-460F-82CD-2D3FBDAD6618" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "5.19.2", + "matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F" } ] } diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2588.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2588.json index 6056aa18c2f..97e0f49e781 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2588.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2588.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2588", "sourceIdentifier": "security@ubuntu.com", "published": "2024-01-08T18:15:44.840", - "lastModified": "2024-01-12T16:47:44.873", + "lastModified": "2024-08-22T20:28:03.190", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,8 +91,57 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.19.17", - "matchCriteriaId": "3369AE19-74F5-4B36-A1B4-3C7A6FC23C3B" + "versionEndExcluding": "4.9.326", + "matchCriteriaId": "5B4EA906-CFF9-4D4A-AFD7-43AC02C77E48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.291", + "matchCriteriaId": "3BBC7E43-6161-4F21-977C-5BB7792C6C94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.256", + "matchCriteriaId": "6C47CDE3-B039-4AE5-B8E4-1DC820E473FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.211", + "matchCriteriaId": "B1C63D19-C08C-4308-A848-B2523C9275BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.137", + "matchCriteriaId": "C2BF720F-C5EE-4DE2-9BDF-CE4CFBC767F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.61", + "matchCriteriaId": "51861563-7F40-460F-82CD-2D3FBDAD6618" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "5.19.2", + "matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F" } ] } diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json index 3c28399e661..e3f3b60f5b0 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48425", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-19T03:15:11.633", - "lastModified": "2023-04-13T17:15:07.703", - "vulnStatus": "Modified", + "lastModified": "2024-08-22T20:27:26.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -57,8 +57,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "6.2.7", - "matchCriteriaId": "65EFC60C-1DC7-4346-96FE-E60D4F634F3B" + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.113", + "matchCriteriaId": "75B3BF61-F56C-4BD7-94AF-50E17A4AA732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.33", + "matchCriteriaId": "B443970D-73AA-4C9A-9338-25D38130D285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.3.4", + "matchCriteriaId": "26C54BF0-3EED-46D4-92A7-5F07F658B49B" } ] } @@ -82,7 +97,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230413-0006/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48934.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48934.json index 1677e281ee7..c1d0cf624a9 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48934.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48934.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48934", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T04:15:16.357", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T20:33:29.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfp: flower: corrige una fuga potencial en nfp_tunnel_add_shared_mac() ida_simple_get() devuelve una identificaci\u00f3n entre min (0) y max (NFP_MAX_MAC_INDEX) incluida. Entonces NFP_MAX_MAC_INDEX (0xff) es una identificaci\u00f3n v\u00e1lida. Para que la ruta de manejo de errores funcione correctamente, el valor 'no v\u00e1lido' para 'ida_idx' no debe estar en el rango 0..NFP_MAX_MAC_INDEX, incluida. As\u00ed que config\u00farelo en -1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.182", + "matchCriteriaId": "1CDEB4A7-1804-4926-A8B9-CD0849352FA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.103", + "matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.26", + "matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.12", + "matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3a14d0888eb4b0045884126acc69abfb7b87814d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4086d2433576baf85f0e538511df97c8101e0a10", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ad5886f85b6bd893e3ed19013765fb0c243c069", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d8097caa73200710d52b9f4d9f430548f46a900", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af4bc921d39dffdb83076e0a7eed1321242b7d87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2176.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2176.json index d43b19f84a0..c285f06a3c2 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2176.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2176.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2176", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-20T21:15:08.937", - "lastModified": "2023-07-27T15:21:17.413", + "lastModified": "2024-08-22T20:26:17.927", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -68,8 +68,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.81", + "matchCriteriaId": "89A51AC3-83B4-4F44-B496-385D10612456" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", "versionEndExcluding": "6.3", - "matchCriteriaId": "51ECE2D8-6904-404A-A11A-356BAD8B12F2" + "matchCriteriaId": "8682F89E-B23D-4D17-AE3E-E32BF630CCC6" } ] } diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json index 204e8b1c6dc..a4a318334aa 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29929.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29929", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:09.173", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T21:15:15.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "http://loadmaster.com", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/YSaxon/CVE-2023-29929/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32257.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32257.json index a884ee21a6b..ccf23399c2d 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32257.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32257.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32257", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.680", - "lastModified": "2023-12-22T17:06:02.047", + "lastModified": "2024-08-22T20:30:50.603", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,8 +92,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.29", - "matchCriteriaId": "7E233AD0-DABB-4668-93A7-DD0909B16CB9" + "matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32258.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32258.json index f26ef84fc3e..ffdf4bacb08 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32258.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32258.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32258", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.750", - "lastModified": "2023-11-17T18:29:58.827", + "lastModified": "2024-08-22T20:30:28.627", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,8 +92,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.29", - "matchCriteriaId": "7E233AD0-DABB-4668-93A7-DD0909B16CB9" + "matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json index 581d6c805e0..520ef5cba59 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3611", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-07-21T21:15:11.897", - "lastModified": "2024-01-11T19:15:10.547", - "vulnStatus": "Modified", + "lastModified": "2024-08-22T20:25:34.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -88,8 +88,50 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.8", - "versionEndExcluding": "6.5", - "matchCriteriaId": "CF31EEDA-1400-421A-BE85-493473C7CD70" + "versionEndExcluding": "4.14.322", + "matchCriteriaId": "F395B68F-3350-4D7E-A0F3-DBE2FC9A7E0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.291", + "matchCriteriaId": "D2D2CA9F-4CC4-4AF5-8C6D-E58415AB782E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.253", + "matchCriteriaId": "0707E9FF-8CDE-4AC1-98F3-5BB74EF88F8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.188", + "matchCriteriaId": "43CAE50A-4A6C-488E-813C-F8DB77C13C8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.121", + "matchCriteriaId": "EC77775B-EC31-4966-966C-1286C02B2A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.40", + "matchCriteriaId": "69315BCC-36D2-45CD-84F8-381EDF8E38F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "923F6AEA-C2EF-4B08-B038-69A18F3D41F8" }, { "vulnerable": true, @@ -154,7 +196,10 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230908-0002/", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json index 2e5c183220a..9c0542b4849 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3776", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-07-21T21:15:11.973", - "lastModified": "2024-02-02T14:15:53.723", - "vulnStatus": "Modified", + "lastModified": "2024-08-22T20:24:45.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -87,9 +87,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "2.6", - "versionEndExcluding": "6.5", - "matchCriteriaId": "6CC235BB-2BE9-4F58-993C-D5A1C422818E" + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "4.14.322", + "matchCriteriaId": "E7A8308C-F4B2-4261-B590-BCD968EF650E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.291", + "matchCriteriaId": "D2D2CA9F-4CC4-4AF5-8C6D-E58415AB782E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.251", + "matchCriteriaId": "7FA663C4-CA72-4B5A-8592-7354D978F58E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.188", + "matchCriteriaId": "43CAE50A-4A6C-488E-813C-F8DB77C13C8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.121", + "matchCriteriaId": "EC77775B-EC31-4966-966C-1286C02B2A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.40", + "matchCriteriaId": "69315BCC-36D2-45CD-84F8-381EDF8E38F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "923F6AEA-C2EF-4B08-B038-69A18F3D41F8" }, { "vulnerable": true, @@ -137,7 +179,11 @@ }, { "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f", @@ -166,11 +212,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240202-0003/", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43844.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43844.json index c7e2406a0e3..4782526d381 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43844.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43844.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43844", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.333", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-08-22T20:35:01.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Aten PE6208 2.3.228 y 2.4.232 tienen credenciales predeterminadas para la cuenta de interfaz web privilegiada. No se solicita al usuario que cambie las credenciales despu\u00e9s de iniciar sesi\u00f3n por primera vez. Si no se modifica, los atacantes pueden iniciar sesi\u00f3n en la interfaz web y obtener privilegios de administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], "references": [ { "url": "https://github.com/setersora/pe6208", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51518.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51518.json index 5dab9a9eae1..a83a1d826ae 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51518.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51518.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51518", "sourceIdentifier": "security@apache.org", "published": "2024-02-27T09:15:36.983", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-22T21:35:00.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Apache James anterior a las versiones 3.7.5 y 3.8.0 expone un endpoint JMX en localhost sujeto a deserializaci\u00f3n previa a la autenticaci\u00f3n de datos que no son de confianza. Dado un dispositivo de deserializaci\u00f3n, esto podr\u00eda aprovecharse como parte de una cadena de explotaci\u00f3n que podr\u00eda resultar en una escalada de privilegios. Tenga en cuenta que, de forma predeterminada, el endpoint JMX solo est\u00e1 vinculado localmente. Recomendamos a los usuarios: - Actualizar a una versi\u00f3n de Apache James no vulnerable - Ejecutar Apache James aislado de otros procesos (docker - m\u00e1quina virtual dedicada) - Si es posible, desactive JMX" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51931.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51931.json index 712e6aeb6bd..21c5fb900cc 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51931.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51931.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51931", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-16T09:15:08.247", - "lastModified": "2024-02-16T13:37:51.433", + "lastModified": "2024-08-22T21:35:01.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en alanclarke URLite v.3.1.0 permite a un atacante provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un payload manipulado para la funci\u00f3n de an\u00e1lisis." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json new file mode 100644 index 00000000000..2c5b7c650dc --- /dev/null +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2023-7260", + "sourceIdentifier": "security@opentext.com", + "published": "2024-08-22T21:15:16.107", + "lastModified": "2024-08-22T21:15:16.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal vulnerability discovered in OpenText\u2122 CX-E Voice, \n\naffecting all version through 22.4. The vulnerability could allow\u00a0arbitrarily access files on the system." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Amber", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "AMBER", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0823114", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json index a6e2a7aac19..6eaff17788f 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22014", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T18:15:10.143", - "lastModified": "2024-04-15T19:12:25.887", + "lastModified": "2024-08-22T21:35:02.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en 360 Total Security Antivirus hasta la versi\u00f3n 11.0.0.1061 para Windows permite a los atacantes obtener privilegios aumentados a trav\u00e9s de Symbolic Link Follow hasta la eliminaci\u00f3n arbitraria de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], "references": [ { "url": "https://github.com/mansk1es/CVE_360TS", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22590.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22590.json index ba88a8878c1..426efdb74e5 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22590.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22590.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22590", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:12.573", - "lastModified": "2024-05-28T17:11:55.903", + "lastModified": "2024-08-22T20:35:03.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El motor TLS en Kwik commit 745fd4e2 no rastrea el estado actual de la conexi\u00f3n. Esta vulnerabilidad puede permitir que los mensajes de saludo del cliente se sobrescriban en cualquier momento, incluso despu\u00e9s de que se haya establecido una conexi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-372" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/QUICTester/ea3eb2ac736bb63e47c654e14e3ec556", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json index 3f0c7a35e1e..565bf798c7e 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24938", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:10.303", - "lastModified": "2024-02-09T01:05:13.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-22T20:35:04.587", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,6 +56,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25657.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25657.json index f89c6cea3d8..c6508cd2b3a 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25657.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25657.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25657", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T20:15:09.013", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-22T20:35:04.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una redirecci\u00f3n abierta en la funcionalidad de inicio de sesi\u00f3n/cierre de sesi\u00f3n de la administraci\u00f3n web en AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS podr\u00eda permitir a atacantes redirigir a usuarios autenticados a sitios web maliciosos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25657", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25738.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25738.json index 612192127e3..b86db4e74a7 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25738.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25738.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25738", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T19:15:08.807", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-08-22T20:35:05.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /Upgrade/FixConfig en Open Library Foundation VuFind 2.0 hasta 9.1 anterior a 9.1.1 permite a un atacante remoto sobrescribir archivos de configuraci\u00f3n locales para obtener acceso al panel de administrador y lograr la ejecuci\u00f3n remota de c\u00f3digo. Un factor atenuante es que requiere que est\u00e9 activada la configuraci\u00f3n de tiempo de ejecuci\u00f3n de PHP enable_url_include, que est\u00e1 desactivada en las instalaciones predeterminadas. Tambi\u00e9n requiere que se exponga la ruta /Upgrade, que se expone de forma predeterminada despu\u00e9s de instalar VuFind, y se recomienda deshabilitarla configurando autoConfigure en false en config.ini." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://vufind.org/wiki/security:cve-2024-25738", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27209.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27209.json index e4111ec9bb0..2dd000ae5e2 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27209.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27209.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27209", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.160", - "lastModified": "2024-03-15T20:15:08.860", + "lastModified": "2024-08-22T20:35:06.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En TBD de TBD, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28213.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28213.json index 005fbac9a3f..2c3aca54243 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28213.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28213.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28213", "sourceIdentifier": "cve@navercorp.com", "published": "2024-03-07T05:15:54.710", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-22T20:35:07.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "nGrinder anterior a 3.5.9 permite aceptar objetos Java serializados de usuarios no autenticados, lo que podr\u00eda permitir a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la deserializaci\u00f3n de objetos Java no seguros." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cve@navercorp.com", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json index 17ff01d5ee2..2cdb0ed2cff 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28390", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.640", - "lastModified": "2024-03-14T12:52:09.877", + "lastModified": "2024-08-22T21:35:03.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el m\u00f3dulo de complementos avanzados ultimateimagetool para PrestaShop anterior a v.2.2.01 permite a un atacante remoto escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un control de acceso inadecuado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/03/12/ultimateimagetool.html", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30187.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30187.json index 07db2030aae..f0a53d8e6c6 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30187.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30187.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30187", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T08:15:36.587", - "lastModified": "2024-03-25T13:47:14.087", + "lastModified": "2024-08-22T21:35:04.480", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Anope anterior a 2.0.15 no impide restablecer la contrase\u00f1a de una cuenta suspendida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://github.com/anope/anope/commit/2b7872139c40ea5b0ca96c1d6595b7d5f9fa60a5", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json index 821ccf81fd6..052189cbbcf 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3219", "sourceIdentifier": "cna@python.org", "published": "2024-07-29T22:15:04.970", - "lastModified": "2024-08-05T15:15:53.960", + "lastModified": "2024-08-22T20:15:09.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,52 @@ "value": "Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. El m\u00f3dulo \"socket\" proporciona un respaldo de Python puro a la funci\u00f3n socket.socketpair() para plataformas que no admiten AF_UNIX, como Windows. Esta implementaci\u00f3n pura de Python utiliza AF_INET o AF_INET6 para crear un par de sockets conectados localmente. La conexi\u00f3n entre los dos sockets no se verific\u00f3 antes de devolverlos al usuario, lo que deja al socket del servidor vulnerable a una ejecuci\u00f3n de conexi\u00f3n de un par local malicioso. Las plataformas que admiten AF_UNIX, como Linux y macOS, no se ven afectadas por esta vulnerabilidad. Las versiones anteriores a CPython 3.5 no se ven afectadas debido a que no se incluye la API vulnerable." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@python.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 2.1, + "baseSeverity": "LOW" + } + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/29/3", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33904.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33904.json index 12a3f83cfe4..ba217953ef1 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33904.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33904.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33904", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T06:15:17.320", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-08-22T20:35:09.343", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En plugins/HookSystem.cpp en Hyprland hasta 0.39.1 (antes de 28c8561), a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n, un atacante local puede provocar la ejecuci\u00f3n de c\u00f3digo ensamblador arbitrario escribiendo en un archivo temporal predecible." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://github.com/hyprwm/Hyprland/commit/28c85619243e6320e75d7abcfe8244fa99d054dd", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json index f892f086463..a0abaf59ef0 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34832", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T15:15:44.873", - "lastModified": "2024-08-02T17:02:44.753", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-22T20:35:10.197", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35434.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35434.json index 3a0af91364b..c04030f2e4f 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35434.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35434.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35434", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-29T19:15:48.200", - "lastModified": "2024-05-29T19:50:25.303", + "lastModified": "2024-08-22T20:35:11.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Irontec Sngrep v1.8.1 conten\u00eda un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico mediante la funci\u00f3n rtp_check_packet en /sngrep/src/rtp.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete SIP manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/inputzero/Security-Advisories/blob/main/CVE-XXXX-XXXX.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35512.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35512.json index 7088eba4289..2144b7b0b99 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35512.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35512.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35512", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-29T17:16:20.540", - "lastModified": "2024-05-29T19:50:25.303", + "lastModified": "2024-08-22T21:35:05.483", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en hmq v1.5.5 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante solicitudes manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://gist.github.com/pengwGit/6ccca73a5acf91f31ff0d4185b15a3ea", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json index a236c9dfdbb..fda57f17ea9 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36268", "sourceIdentifier": "security@apache.org", "published": "2024-08-02T10:16:00.367", - "lastModified": "2024-08-02T12:59:43.990", + "lastModified": "2024-08-22T20:35:12.037", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.10.0 hasta la 1.12.0, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.13.0 de Apache InLong o seleccionen la que m\u00e1s les convenga [1] para resolverlo. [1] https://github.com/apache/inlong/pull/10251" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json index cbc05c9ae3a..0e970490493 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36440", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:15.977", - "lastModified": "2024-08-22T15:15:15.977", + "lastModified": "2024-08-22T20:35:13.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,50 @@ "value": "An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1393" + }, + { + "lang": "en", + "value": "CWE-327" + }, + { + "lang": "en", + "value": "CWE-759" + } + ] + } + ], "references": [ { "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json index 472c0b809ed..c7bb7d85c3e 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36445", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T15:15:16.187", - "lastModified": "2024-08-22T15:15:16.187", + "lastModified": "2024-08-22T20:35:14.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json index b3140d24d48..f3e637eb233 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36740", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:58.217", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-08-22T20:35:15.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) cuando el \u00edndice como n\u00famero negativo excede el rango de tama\u00f1o." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/070f5b8b752079c6b761f00f3cab7103", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json index 264847d8b0b..e1885f4b79e 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36800", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T13:15:52.740", - "lastModified": "2024-06-04T16:57:41.053", + "lastModified": "2024-08-22T20:35:16.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en SEMCMS v.4.8 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID en Download.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json new file mode 100644 index 00000000000..29fb32c37c3 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39776.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39776", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-22T20:15:08.750", + "lastModified": "2024-08-22T20:15:08.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Avtec Outpost stores sensitive information in an insecure location without proper access controls in place." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-219" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-235-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40096.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40096.json index eaf9411bbde..e2e544a5e57 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40096.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40096.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40096", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-05T10:15:33.197", - "lastModified": "2024-08-05T12:41:45.957", + "lastModified": "2024-08-22T20:15:09.340", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://www.quokka.io/blog/critical-pii-exposure-in-who-caller-id-spam-block-app", + "source": "cve@mitre.org" + }, { "url": "https://www.quokka.io/critical-vulnerabilities-exploits-cve", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json index efd3d327b4f..2ffc13844f1 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json @@ -2,13 +2,13 @@ "id": "CVE-2024-41572", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T19:15:13.380", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T21:15:16.797", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Learning with Texts (LWT) 2.0.3 is vulnerable to Cross Site Scripting (XSS). The application has a specific function that does not filter special characters in URL parameters. Remote attackers can inject JavaScript code without authorization." + "value": "Learning with Texts (LWT) 2.0.3 is vulnerable to Cross Site Scripting (XSS). The application has a specific function that does not filter special characters in URL parameters. Remote attackers can inject JavaScript code without authorization. Exploiting this vulnerability, attackers can steal user credentials or execute actions such as injecting malicious scripts or redirecting users to malicious sites." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json index 883e4879568..ca0da43238e 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json @@ -2,13 +2,13 @@ "id": "CVE-2024-41703", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T05:15:03.450", - "lastModified": "2024-08-01T13:59:05.890", + "lastModified": "2024-08-22T21:15:16.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "LibreChat through 0.7.4-rc1 has incorrect access control for message updates. (Work on a fixed version release has started in PR 3363.)" + "value": "LibreChat through 0.7.4-rc1 has incorrect access control for message updates." }, { "lang": "es", @@ -118,6 +118,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://github.com/realestate-com-au/vulnerability-disclosures/blob/main/LibreChat/CVE-2024-41703.md", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json index 76f68a4fc9a..069c9449f19 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json @@ -2,13 +2,13 @@ "id": "CVE-2024-41704", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T05:15:03.537", - "lastModified": "2024-08-01T13:59:06.900", + "lastModified": "2024-08-22T21:15:17.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images. (Work on a fixed version release has started in PR 3363.)" + "value": "LibreChat through 0.7.4-rc1 does not validate the normalized pathnames of images." }, { "lang": "es", @@ -119,6 +119,10 @@ "Issue Tracking", "Patch" ] + }, + { + "url": "https://github.com/realestate-com-au/vulnerability-disclosures/blob/main/LibreChat/CVE-2024-41704.md", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json new file mode 100644 index 00000000000..4697fe8a186 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42418.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-42418", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-22T20:15:09.470", + "lastModified": "2024-08-22T20:15:09.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Avtec Outpost uses a default cryptographic key that can be used to decrypt sensitive information." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-235-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json new file mode 100644 index 00000000000..4bb0e352fec --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42599.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42599", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T20:15:09.730", + "lastModified": "2024-08-22T20:15:09.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_files.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/fushuling/cve/blob/master/CVE-2024-42599.md", + "source": "cve@mitre.org" + }, + { + "url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_files.php%20code%20injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json new file mode 100644 index 00000000000..d39fdb64d71 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42761.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42761", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T21:15:17.193", + "lastModified": "2024-08-22T21:15:17.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin_schedule.php\" in Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via scheduleDurationPHP parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Stored%20XSS%20-%20Bus%20Schedule%20List.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json new file mode 100644 index 00000000000..4ab5b89592f --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42762.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42762", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T21:15:17.293", + "lastModified": "2024-08-22T21:15:17.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/history.php\" in Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via the Name, Phone, and Email parameter fields." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Stored%20XSS%20-%20Customer%20Booking%20List.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json new file mode 100644 index 00000000000..fe9b13c6082 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42763.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42763", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T21:15:17.380", + "lastModified": "2024-08-22T21:15:17.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in the \"/schedule.php\" page of the Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via the \"bookingdate\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/Reflected%20XSS%20-%20Book%20Ticket.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json index d4c43878d19..286f3c19f96 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42771.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42771", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:09.730", - "lastModified": "2024-08-22T16:15:09.730", + "lastModified": "2024-08-22T20:35:19.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \" /admin/edit_room_controller.php\" of the Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"room_name\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Stored%20XSS%20-%20Edit%20Room.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json index 0275d8b6b77..5bb76656ce5 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42774.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42774", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.350", - "lastModified": "2024-08-22T17:15:06.350", + "lastModified": "2024-08-22T20:35:20.297", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An Incorrect Access Control vulnerability was found in /admin/delete_room.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to delete valid hotel room entries in the administrator section." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Room%20Entry.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json index 26ffe7ab6be..779f9ece9b3 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42775.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42775", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.580", - "lastModified": "2024-08-22T17:15:06.580", + "lastModified": "2024-08-22T20:35:21.223", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An Incorrect Access Control vulnerability was found in /admin/add_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to add the valid hotel room entries in the administrator section via the direct URL access." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Add%20New%20Room%20Entry.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json index d14aca29cac..d65d7e3e45d 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42776.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42776", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T17:15:06.807", - "lastModified": "2024-08-22T17:15:06.807", + "lastModified": "2024-08-22T20:35:22.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Kashipara Hotel Management System v1.0 is vulnerable to Incorrect Access Control via /admin/users.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User%20Data.pdf", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45167.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45167.json index 6354665f043..13a97cd18cd 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45167.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45167.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45167", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T04:15:25.710", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T20:35:24.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Debido a una validaci\u00f3n de entrada inadecuada, una deserializaci\u00f3n inadecuada y una restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria, IDOL2 es vulnerable a ataques de denegaci\u00f3n de servicio (DoS) y posiblemente a la ejecuci\u00f3n remota de c\u00f3digo. Un determinado documento XmlMessage provoca un consumo de CPU del 100 %." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "http://download.uci.de/idol2/idol2Client_2_12.exe", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json index 882530b55dc..d74f150ed70 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45191.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45191", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T16:15:10.120", - "lastModified": "2024-08-22T16:15:10.120", + "lastModified": "2024-08-22T21:35:06.397", "vulnStatus": "Received", "cveTags": [ { @@ -18,7 +18,42 @@ "value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-208" + } + ] + } + ], "references": [ { "url": "https://gitlab.matrix.org/matrix-org/olm/", diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json new file mode 100644 index 00000000000..23a5a76f4a1 --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45201.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45201", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T20:15:10.063", + "lastModified": "2024-08-22T20:15:10.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in llama_index before 0.10.38. download/integration.py includes an exec call for import {cls_name}." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/run-llama/llama_index/compare/v0.10.37...v0.10.38", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/run-llama/llama_index/pull/13523", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7969.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7969.json index 5e298927675..65deb384f2b 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7969.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7969", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.203", - "lastModified": "2024-08-22T17:42:47.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-22T20:35:26.473", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7977.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7977.json index 5726ae23708..8c8fb5bdef3 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7977.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7977", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.630", - "lastModified": "2024-08-22T17:39:32.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-22T20:35:28.140", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json new file mode 100644 index 00000000000..9cc2cd6a9e0 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8075.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8075", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-22T20:15:10.210", + "lastModified": "2024-08-22T20:15:10.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg. The manipulation leads to os command injection. The attack can be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275557", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275557", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.390929", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json new file mode 100644 index 00000000000..2e0670cf4d3 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8076.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-8076", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-22T20:15:11.017", + "lastModified": "2024-08-22T20:15:11.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275558", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275558", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json new file mode 100644 index 00000000000..534a7b6a6cb --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8077.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-8077", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-22T20:15:11.690", + "lastModified": "2024-08-22T20:15:11.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275559", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275559", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json new file mode 100644 index 00000000000..0523f0debbf --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8078.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-8078", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-22T21:15:17.603", + "lastModified": "2024-08-22T21:15:17.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275560", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275560", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json new file mode 100644 index 00000000000..c3a7dd55f24 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8079.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8079", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-22T21:15:17.910", + "lastModified": "2024-08-22T21:15:17.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275561", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275561", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.390937", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json new file mode 100644 index 00000000000..58fe6eb5ca3 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-8080", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-22T21:15:18.217", + "lastModified": "2024-08-22T21:15:18.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Online Health Care System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument f_name with the input 1%' or 1=1 ) UNION SELECT 1,2,3,4,5,database(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23# as part of string leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/shang159/sqli-vul/blob/main/sql2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275562", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275562", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.395465", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1c3cec49335..8a016257de9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-22T20:00:18.271897+00:00 +2024-08-22T22:00:17.044146+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-22T19:35:40.953000+00:00 +2024-08-22T21:35:06.397000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260969 +260983 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `14` -- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-22T19:15:09.173`) -- [CVE-2024-42767](CVE-2024/CVE-2024-427xx/CVE-2024-42767.json) (`2024-08-22T18:15:10.280`) -- [CVE-2024-42773](CVE-2024/CVE-2024-427xx/CVE-2024-42773.json) (`2024-08-22T18:15:10.367`) -- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2024-08-22T18:15:10.553`) -- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-22T19:15:09.720`) +- [CVE-2023-7260](CVE-2023/CVE-2023-72xx/CVE-2023-7260.json) (`2024-08-22T21:15:16.107`) +- [CVE-2024-39776](CVE-2024/CVE-2024-397xx/CVE-2024-39776.json) (`2024-08-22T20:15:08.750`) +- [CVE-2024-42418](CVE-2024/CVE-2024-424xx/CVE-2024-42418.json) (`2024-08-22T20:15:09.470`) +- [CVE-2024-42599](CVE-2024/CVE-2024-425xx/CVE-2024-42599.json) (`2024-08-22T20:15:09.730`) +- [CVE-2024-42761](CVE-2024/CVE-2024-427xx/CVE-2024-42761.json) (`2024-08-22T21:15:17.193`) +- [CVE-2024-42762](CVE-2024/CVE-2024-427xx/CVE-2024-42762.json) (`2024-08-22T21:15:17.293`) +- [CVE-2024-42763](CVE-2024/CVE-2024-427xx/CVE-2024-42763.json) (`2024-08-22T21:15:17.380`) +- [CVE-2024-45201](CVE-2024/CVE-2024-452xx/CVE-2024-45201.json) (`2024-08-22T20:15:10.063`) +- [CVE-2024-8075](CVE-2024/CVE-2024-80xx/CVE-2024-8075.json) (`2024-08-22T20:15:10.210`) +- [CVE-2024-8076](CVE-2024/CVE-2024-80xx/CVE-2024-8076.json) (`2024-08-22T20:15:11.017`) +- [CVE-2024-8077](CVE-2024/CVE-2024-80xx/CVE-2024-8077.json) (`2024-08-22T20:15:11.690`) +- [CVE-2024-8078](CVE-2024/CVE-2024-80xx/CVE-2024-8078.json) (`2024-08-22T21:15:17.603`) +- [CVE-2024-8079](CVE-2024/CVE-2024-80xx/CVE-2024-8079.json) (`2024-08-22T21:15:17.910`) +- [CVE-2024-8080](CVE-2024/CVE-2024-80xx/CVE-2024-8080.json) (`2024-08-22T21:15:18.217`) ### CVEs modified in the last Commit -Recently modified CVEs: `65` +Recently modified CVEs: `46` -- [CVE-2024-34527](CVE-2024/CVE-2024-345xx/CVE-2024-34527.json) (`2024-08-22T18:35:09.990`) -- [CVE-2024-35469](CVE-2024/CVE-2024-354xx/CVE-2024-35469.json) (`2024-08-22T19:35:28.953`) -- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2024-08-22T19:35:35.700`) -- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T18:35:12.120`) -- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T19:35:29.793`) -- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T19:35:30.730`) -- [CVE-2024-36580](CVE-2024/CVE-2024-365xx/CVE-2024-36580.json) (`2024-08-22T19:35:31.613`) -- [CVE-2024-36773](CVE-2024/CVE-2024-367xx/CVE-2024-36773.json) (`2024-08-22T19:35:32.557`) -- [CVE-2024-36811](CVE-2024/CVE-2024-368xx/CVE-2024-36811.json) (`2024-08-22T18:35:13.753`) -- [CVE-2024-36843](CVE-2024/CVE-2024-368xx/CVE-2024-36843.json) (`2024-08-22T18:35:15.457`) -- [CVE-2024-36856](CVE-2024/CVE-2024-368xx/CVE-2024-36856.json) (`2024-08-22T19:35:33.427`) -- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-08-22T18:22:47.927`) -- [CVE-2024-39211](CVE-2024/CVE-2024-392xx/CVE-2024-39211.json) (`2024-08-22T19:35:34.747`) -- [CVE-2024-40347](CVE-2024/CVE-2024-403xx/CVE-2024-40347.json) (`2024-08-22T18:37:49.850`) -- [CVE-2024-40535](CVE-2024/CVE-2024-405xx/CVE-2024-40535.json) (`2024-08-22T19:35:35.893`) -- [CVE-2024-41599](CVE-2024/CVE-2024-415xx/CVE-2024-41599.json) (`2024-08-22T18:27:45.397`) -- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-08-22T18:27:15.310`) -- [CVE-2024-42598](CVE-2024/CVE-2024-425xx/CVE-2024-42598.json) (`2024-08-22T18:15:10.187`) -- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T18:35:16.727`) -- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T19:35:37.830`) -- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T19:35:38.793`) -- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-22T19:35:39.710`) -- [CVE-2024-43853](CVE-2024/CVE-2024-438xx/CVE-2024-43853.json) (`2024-08-22T18:06:38.087`) -- [CVE-2024-43854](CVE-2024/CVE-2024-438xx/CVE-2024-43854.json) (`2024-08-22T18:12:28.620`) -- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T19:35:40.953`) +- [CVE-2024-28213](CVE-2024/CVE-2024-282xx/CVE-2024-28213.json) (`2024-08-22T20:35:07.957`) +- [CVE-2024-28390](CVE-2024/CVE-2024-283xx/CVE-2024-28390.json) (`2024-08-22T21:35:03.607`) +- [CVE-2024-30187](CVE-2024/CVE-2024-301xx/CVE-2024-30187.json) (`2024-08-22T21:35:04.480`) +- [CVE-2024-3219](CVE-2024/CVE-2024-32xx/CVE-2024-3219.json) (`2024-08-22T20:15:09.143`) +- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-08-22T20:35:09.343`) +- [CVE-2024-34832](CVE-2024/CVE-2024-348xx/CVE-2024-34832.json) (`2024-08-22T20:35:10.197`) +- [CVE-2024-35434](CVE-2024/CVE-2024-354xx/CVE-2024-35434.json) (`2024-08-22T20:35:11.130`) +- [CVE-2024-35512](CVE-2024/CVE-2024-355xx/CVE-2024-35512.json) (`2024-08-22T21:35:05.483`) +- [CVE-2024-36268](CVE-2024/CVE-2024-362xx/CVE-2024-36268.json) (`2024-08-22T20:35:12.037`) +- [CVE-2024-36440](CVE-2024/CVE-2024-364xx/CVE-2024-36440.json) (`2024-08-22T20:35:13.640`) +- [CVE-2024-36445](CVE-2024/CVE-2024-364xx/CVE-2024-36445.json) (`2024-08-22T20:35:14.640`) +- [CVE-2024-36740](CVE-2024/CVE-2024-367xx/CVE-2024-36740.json) (`2024-08-22T20:35:15.900`) +- [CVE-2024-36800](CVE-2024/CVE-2024-368xx/CVE-2024-36800.json) (`2024-08-22T20:35:16.867`) +- [CVE-2024-40096](CVE-2024/CVE-2024-400xx/CVE-2024-40096.json) (`2024-08-22T20:15:09.340`) +- [CVE-2024-41572](CVE-2024/CVE-2024-415xx/CVE-2024-41572.json) (`2024-08-22T21:15:16.797`) +- [CVE-2024-41703](CVE-2024/CVE-2024-417xx/CVE-2024-41703.json) (`2024-08-22T21:15:16.903`) +- [CVE-2024-41704](CVE-2024/CVE-2024-417xx/CVE-2024-41704.json) (`2024-08-22T21:15:17.050`) +- [CVE-2024-42771](CVE-2024/CVE-2024-427xx/CVE-2024-42771.json) (`2024-08-22T20:35:19.220`) +- [CVE-2024-42774](CVE-2024/CVE-2024-427xx/CVE-2024-42774.json) (`2024-08-22T20:35:20.297`) +- [CVE-2024-42775](CVE-2024/CVE-2024-427xx/CVE-2024-42775.json) (`2024-08-22T20:35:21.223`) +- [CVE-2024-42776](CVE-2024/CVE-2024-427xx/CVE-2024-42776.json) (`2024-08-22T20:35:22.323`) +- [CVE-2024-45167](CVE-2024/CVE-2024-451xx/CVE-2024-45167.json) (`2024-08-22T20:35:24.417`) +- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-22T21:35:06.397`) +- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T20:35:26.473`) +- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T20:35:28.140`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1aa75672ee4..ede708f8db2 100644 --- a/_state.csv +++ b/_state.csv @@ -153303,7 +153303,7 @@ CVE-2020-22524,0,0,3963018bd375efbb104317019440f969cb986995a7cd6c3fe6c16a8a1b9da CVE-2020-2253,0,0,6c05875bf0d2370ea4760b0be37855dec09deb871bbe2ec77d0ed51932a51534,2023-10-25T18:16:39.320000 CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3ea73,2023-04-10T19:17:46.887000 CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000 -CVE-2020-22539,0,1,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000 +CVE-2020-22539,0,0,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000 CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000 CVE-2020-22540,0,0,376647c49c1c6bd480053c09b9a209b442662340e7faa02a7740de4fbd0b2879,2024-04-16T13:24:07.103000 CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000 @@ -178736,7 +178736,7 @@ CVE-2021-35995,0,0,349e9318c68e5b5d153347a6e533cf78553b1475bb38fac079d88ddc948aa CVE-2021-35996,0,0,1663a6f92f1b95f83531ce33aa0fd5a3119ad943f5c0ce7598f6b0e3d2b19ecf,2022-10-07T20:22:18.837000 CVE-2021-35997,0,0,c512899773c17835aa4149b91e20cf38f61e47ce21669684808d82e3f67c089d,2022-10-07T20:22:12.210000 CVE-2021-35999,0,0,a47697863ca0585b885465aab9b343721e65375507779bcbadb3145cdb57c1a8,2022-10-07T20:22:06.717000 -CVE-2021-3600,0,0,ff4285e484ea9d035dce65d68ecaf9df091914b96726936a3c0bc36713651534,2024-01-11T18:40:05.340000 +CVE-2021-3600,0,1,68d3389910ec8a57b5fca4ebd834a541ec4461274b597a250123427824e365a8,2024-08-22T20:29:55.757000 CVE-2021-36000,0,0,3024c741fce9de3e846f898958df6f0252edf3f7cf6522ab0fc19b97a3e122a3,2022-10-07T20:22:00.183000 CVE-2021-36001,0,0,dd55474bf59098fe2ae9e21d2a79605bc83e24f4e554f317a1dede2f5385e4ca,2021-08-30T14:38:18.463000 CVE-2021-36002,0,0,099a2d2e1bca7feab124f3b05648e6f5ac03f77b0d5773e80599d73a9816b5a6,2022-10-27T12:48:34.320000 @@ -186799,7 +186799,7 @@ CVE-2021-46946,0,0,674cb9a6d3dc94cb9097d5b30f23ae90502eb67a19dc98c50a2caa5c5af6a CVE-2021-46947,0,0,1d3bcb9b51594916cfb931a1a0a94f10ffa497a31616810ae9c6c324df9eecf5,2024-04-10T20:00:47.847000 CVE-2021-46948,0,0,3486d0dde8f16ae13b49663c64a96f5a559016977d15287dd193b1354f70ad23,2024-04-10T20:14:23.420000 CVE-2021-46949,0,0,7780ecf17802080ca3d32668dffcbf0a7031303fc8545a6d3f10b6f913adbbee,2024-04-10T20:14:05.477000 -CVE-2021-46950,0,0,308d1de93b1e6b5e053d07df8ad923a97181ff7f566f7696ba53ffdeb30f166b,2024-04-10T20:13:16.993000 +CVE-2021-46950,0,1,08f63b3663af12d264369d90f0fac82d2fd9d779a4da1a38ecfe7374e75c9671,2024-08-22T20:28:57.697000 CVE-2021-46951,0,0,885c61f9e7da07612d949faded4ceb8afc94f412e675d52bf4d2b2ee3f013270,2024-04-10T20:15:55.593000 CVE-2021-46952,0,0,9b0db874ec7e3850deaad8426e3b7d3cc0b498036f5c3e78f7383423f408a42e,2024-04-10T20:15:42.153000 CVE-2021-46953,0,0,5b8b163a10423fb772acc2c04e5217817b2f0ad2a781f96947cdc6f9504f8984,2024-04-10T20:15:31.827000 @@ -194042,7 +194042,7 @@ CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025 CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000 CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000 CVE-2022-25037,0,0,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000 -CVE-2022-25038,0,1,6bbcf5f0263481ae60f4fbb572b5749eaac36bd2e533bf005101ca5448d9ad88,2024-08-22T19:35:03.130000 +CVE-2022-25038,0,0,6bbcf5f0263481ae60f4fbb572b5749eaac36bd2e533bf005101ca5448d9ad88,2024-08-22T19:35:03.130000 CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000 CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000 CVE-2022-25044,0,0,04a774b0ed7f50c45cfbfcc56f7a8d205c4448d23d2248f0cfc9ee2ba6a7d6c1,2022-03-11T15:58:29.333000 @@ -194717,7 +194717,7 @@ CVE-2022-25845,0,0,bb8fbb25d9b2b6e33d68fdcdc8c9cf5844a6a1278b54a8ecd97fc0d93c499 CVE-2022-25847,0,0,fd01bf86f7234e02d6e14441d150103ded4c384f9819a7f63538363979b5db57,2023-11-07T03:44:50.853000 CVE-2022-25848,0,0,1c166a4d8bdad332db5c332e277f83b2fe5adfc4d209eb6d35d765412da1a95f,2022-12-01T20:56:52.047000 CVE-2022-25849,0,0,40fdd2c7c5a9b6f67199776f608bf7be531ac8afb1ff29b95b93da6407748d08,2022-11-03T13:59:27.003000 -CVE-2022-2585,0,0,b8b95c8f4f1261a5f8daeff0a33f06e234b972c677119db6e33f7bde5d49182d,2024-01-19T17:14:35.877000 +CVE-2022-2585,0,1,312adc11c9feb5033187283da27806bae01aae0fee5bee9d7527d0e147a42fd1,2024-08-22T20:28:23.727000 CVE-2022-25850,0,0,5516aca96018d93e219b28733fdc72ac67bb9f4bd4f8926e97274bf7c83b45e1,2022-05-11T17:41:01.270000 CVE-2022-25851,0,0,897443b15a99fbe7af936f177b04170409c64e5843c89fc4d49fddd67041967f,2022-06-17T17:21:15.713000 CVE-2022-25852,0,0,87e5f9027a2cd15f539eca3895e163801a82c49f9e6d22be43ec52d3dbf6663d,2023-10-11T15:27:34.157000 @@ -194743,7 +194743,7 @@ CVE-2022-25873,0,0,98f5d7a77ef73a803c4ad61ba52a354f3ce3d43294171fd5e34e7918371ba CVE-2022-25875,0,0,91816922e712745c8516deb6671db43dd777e487b6c3eb59c201f0decf3314bb,2022-07-19T02:23:10.670000 CVE-2022-25876,0,0,0cbf63ffb99c2a267ba8626d28735c1632a57fc575ab1c949a0cfd02a34433be,2022-07-12T18:51:54.013000 CVE-2022-25878,0,0,69f365dbe73e43803876891aafd22493a2113971835fe4e52936a9250eb7d64f,2022-06-08T17:22:01.157000 -CVE-2022-2588,0,0,1fd72d5bf613b15e1c90f427e65f259898c3d6137459ac9a8a7d747dea358212,2024-01-12T16:47:44.873000 +CVE-2022-2588,0,1,1834e0ebe2937bbf3392a2abb9a6f9314526d56a18e3c4779029ab2ac2b6e249,2024-08-22T20:28:03.190000 CVE-2022-25880,0,0,37bb4e58bb41997da651debe069382e51e06fd2008e38177238d372b1bbad545,2022-06-29T20:47:20.340000 CVE-2022-25881,0,0,0113241b6a0219133c886d52582facad96711330aa8d36f38f09b4118065ac9a,2023-11-07T03:44:51.800000 CVE-2022-25882,0,0,cc2e9e64fce1daa6e7128976be7a9dd9d17b8df7c338f770ad33ea9d283c4847,2023-11-07T03:44:51.890000 @@ -211948,7 +211948,7 @@ CVE-2022-4842,0,0,c8ccb57c619d69dcfd24b9e6f2c3813735740531a8d882d1c0e70d7bbb8289 CVE-2022-48422,0,0,bd8399e6d021a19c602491fc3e25797be11d8dee0ea80a83486503d7e2b11745,2023-08-08T14:21:49.707000 CVE-2022-48423,0,0,45c0d8698239adea9a642b5068ee9b019af288e1bec23dc3a7ea86cccc945f23,2023-08-08T14:21:49.707000 CVE-2022-48424,0,0,969015f21c5b5e99d31b6de4766e2501e25c4e4dc59ee3ca6422cce1a4c61c45,2023-06-07T12:47:03.713000 -CVE-2022-48425,0,0,48949ccec66a52d34959ccec10e4d68856370b32644ec260d4e028872b5b1770,2023-04-13T17:15:07.703000 +CVE-2022-48425,0,1,0f181fadb11408ddd7ccbdeab735521c1ae9f757e6fc016fc9f36f7bc53ddb9d,2024-08-22T20:27:26.153000 CVE-2022-48426,0,0,d92ff876d9de346da0341d6c60530e0606fdd7b524e706b8b6b5157ced575541,2023-03-30T19:40:32.927000 CVE-2022-48427,0,0,4df5f46a0c1a7d12cdfd5073366a38e5e1870ffafb7c550513b31bcd9a3fc75e,2023-03-31T19:19:08.563000 CVE-2022-48428,0,0,11ee3c6a1426f04278f4eb95e945d28303745dbea7a76a08ff4d886d312c1c96,2023-03-31T19:14:05.383000 @@ -212446,17 +212446,17 @@ CVE-2022-48930,0,0,f4814afe4f8412d22f471d4b42c41a39289b07c6b527361cd94120f7cf641 CVE-2022-48931,0,0,d5215ce4f6e7bf10dfe8eda34e306f21ac23decacbdf3e56afc51d77eb9002c5,2024-08-22T12:48:02.790000 CVE-2022-48932,0,0,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf21e,2024-08-22T12:48:02.790000 CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000 -CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000 +CVE-2022-48934,0,1,5b4d3e9f36a52ea0bbbb4966ebd00c594a823cadc603a7281937d3623cfb89c3,2024-08-22T20:33:29.860000 CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000 -CVE-2022-48936,0,1,36ac70219cd8aef6a8970544481442eac16b9c0cd068921aa64078a27ffc7215,2024-08-22T19:03:59.643000 -CVE-2022-48937,0,1,5acf0c5064ef79bcf25c1dae2675f0433d0999928e6f36ce64d5e6c9907aa5b9,2024-08-22T19:07:28.567000 -CVE-2022-48938,0,1,eff2e9fbfc7aa611d20c84d8b3736eb4c859583a2ca7af1dd4c15351c5551139,2024-08-22T18:49:20.320000 -CVE-2022-48939,0,1,171710b03fe72b0b5576806a870449655b0f9165fe85d09b9d9bd74ca80174f4,2024-08-22T19:02:08.770000 +CVE-2022-48936,0,0,36ac70219cd8aef6a8970544481442eac16b9c0cd068921aa64078a27ffc7215,2024-08-22T19:03:59.643000 +CVE-2022-48937,0,0,5acf0c5064ef79bcf25c1dae2675f0433d0999928e6f36ce64d5e6c9907aa5b9,2024-08-22T19:07:28.567000 +CVE-2022-48938,0,0,eff2e9fbfc7aa611d20c84d8b3736eb4c859583a2ca7af1dd4c15351c5551139,2024-08-22T18:49:20.320000 +CVE-2022-48939,0,0,171710b03fe72b0b5576806a870449655b0f9165fe85d09b9d9bd74ca80174f4,2024-08-22T19:02:08.770000 CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000 -CVE-2022-48940,0,1,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea902,2024-08-22T18:37:46.133000 -CVE-2022-48941,0,1,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000 -CVE-2022-48942,0,1,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000 -CVE-2022-48943,0,1,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000 +CVE-2022-48940,0,0,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea902,2024-08-22T18:37:46.133000 +CVE-2022-48941,0,0,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000 +CVE-2022-48942,0,0,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000 +CVE-2022-48943,0,0,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000 CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000 CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000 CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000 @@ -215976,7 +215976,7 @@ CVE-2023-21756,0,0,1b03dfc95e63fb764e1ddf08dc45ab107ec090acc6b8af12c31a905432b96 CVE-2023-21757,0,0,66e53ca89c214e394392f33dae849e0a1a5392ebc91c1ecc0518ca90aeb29f4b,2024-05-29T03:15:29.643000 CVE-2023-21758,0,0,bf9b219d514822c269493695dac80cdf506c45b9d7cd29c41c1981d499e6707e,2024-05-29T03:15:29.863000 CVE-2023-21759,0,0,e1a4e11a518a12eb61c2899ad716a41c91b6356142ec0c61c1586039cc88b0a3,2023-04-27T19:15:15.787000 -CVE-2023-2176,0,0,1a8086beb1b71bf6126480c7f49e7fd9673e664e03fca3868a879083402c9efc,2023-07-27T15:21:17.413000 +CVE-2023-2176,0,1,7cdfccc3bc2f21dffaf86c600684c9fc971be1865442a6f77a0fce2817a14bad,2024-08-22T20:26:17.927000 CVE-2023-21760,0,0,d04eba9231acb5e0de6a74dbadc0745534b8faecda70382c9df1559162694305,2024-05-29T03:15:30.017000 CVE-2023-21761,0,0,83e1d0a1b67e385073f77438eec460b2c534682dd214b942bbe115d16a312053,2024-05-29T03:15:30.167000 CVE-2023-21762,0,0,05a2c530d10b80c19ff5216ee3b7109584a6555de2f4a1de02eb3bd4c93013ea,2024-05-29T03:15:30.287000 @@ -222570,7 +222570,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000 CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000 CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000 -CVE-2023-29929,0,0,6e328a7115739fc9a6f658723a1504ea401ff9bc6fd40aaaaf4e9cf810b89bd4,2024-08-22T12:48:02.790000 +CVE-2023-29929,0,1,c4b7c8db7151fa57c0c0242b0a906c7d8eab412a4479e9c2d1bd3d305adc2920,2024-08-22T21:15:15.840000 CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000 CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000 CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000 @@ -224204,8 +224204,8 @@ CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ec CVE-2023-32250,0,0,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000 CVE-2023-32252,0,0,d58cdd6d41b61e01636cbce96c5c95617a1fb413e4534a05ad59e2763a4df396,2023-12-04T14:53:38.480000 CVE-2023-32254,0,0,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000 -CVE-2023-32257,0,0,e863f95271bbd102a1dbc5990b29c3c9bedfb59faca99d10f3fe80d80959dfb3,2023-12-22T17:06:02.047000 -CVE-2023-32258,0,0,1b7d9e9ed9a24d4763f3dd34c86ff525f58eabf344847aa293dd4e794e241b4a,2023-11-17T18:29:58.827000 +CVE-2023-32257,0,1,e74ac3005b85dd9bb4e730408991fe6943d75b26a83bc250461d82f29002e0b0,2024-08-22T20:30:50.603000 +CVE-2023-32258,0,1,3765cc941b240ae55ac325df051cd68b23e7f4aeaf6466a32872913e20fc6f23,2024-08-22T20:30:28.627000 CVE-2023-32259,0,0,63d94242b8b0d4e358593674a90324955b50adf4e3d50cf943b4320e76d2c808,2024-03-19T16:33:58.680000 CVE-2023-3226,0,0,f374a8fec37bbb146b103948aced2aaf6543c8988572ca127a48f77cd827c0ef,2023-12-15T11:15:09.510000 CVE-2023-32260,0,0,b9cd8dd7693e77252f036c5a8a5da5ab355842eec3ef40a54fe05bd3713e1328,2024-03-19T16:33:58.680000 @@ -227064,7 +227064,7 @@ CVE-2023-3610,0,0,64c0e8d2425050cc67fb6bf5e0c9fc93a2196e61379b8959e14e5951d75581 CVE-2023-36100,0,0,2780314d2b1141fba57782f745de049c531df759192c158ad02872ef9d44b115,2023-09-07T18:16:22.440000 CVE-2023-36106,0,0,b4d24519cb6404a5e8ee83f274be002cd600bd9db8f91c065889d76d5476c9aa,2023-08-23T14:33:07.907000 CVE-2023-36109,0,0,2905c47f1f22b864042595a1a3690775764e8e0cf79a8f06d31d838015bda409,2023-09-22T02:12:15.177000 -CVE-2023-3611,0,0,1118492cd13540fd45f50b4e270639e035d8260456f55645dbd94c0ff6f94aee,2024-01-11T19:15:10.547000 +CVE-2023-3611,0,1,3276ea952612bf8ce9f28e73d33d9668ae065819920d37d3d7dd3deee2d0f859,2024-08-22T20:25:34.373000 CVE-2023-36118,0,0,bff10a029ac853a7f4d10cc995c3c5052dcacfa8824027454be423de12359dc1,2023-11-07T04:16:09.273000 CVE-2023-36119,0,0,3418931f19d9071315cf9ad030fc2ad364ebb82d059d685a3e5cf4c15ef96490,2023-11-07T04:16:10.287000 CVE-2023-3612,0,0,ce840538d67bfd82048ad669ef6d5df66302e0f8cb394f907a4a0c92d6165ecf,2023-09-13T17:53:49.923000 @@ -228297,7 +228297,7 @@ CVE-2023-37755,0,0,d7feac74f9cc218d5cfafa14ebddafd6f21d084107f2ae84d69e367dde916 CVE-2023-37756,0,0,669162a115e862f67140188330b7c4e9110f3ad42f860c18393f51efb7d8a57f,2023-11-07T04:17:05.383000 CVE-2023-37758,0,0,0eb788e5174366fa5ef1709461edbc8be7cf203fdbb36660f1f7b79134900a04,2023-11-07T04:17:06.350000 CVE-2023-37759,0,0,8d811c0b8310054880776e953681e58c9721cfeb28b1a6a1571932324e14c3d8,2023-09-12T00:10:11.453000 -CVE-2023-3776,0,0,5061d424210869549ddf3bbc00642ca7c2895e5677a0387942e6a7d83b59a0e6,2024-02-02T14:15:53.723000 +CVE-2023-3776,0,1,9b9e6fdf1c4bc5c96e654d9815690fa791039ca2db35eb2aa960559d73c92292,2024-08-22T20:24:45.973000 CVE-2023-37765,0,0,32b4486ea41a3dc4882b58189f7f6acda83aea9b7d08b1dd3c5e7a09f1cc9941,2023-07-19T13:23:02.507000 CVE-2023-37766,0,0,8c4cb10362a4c422f0370e6242faf4281fdacf1e8eaebaf78325b3a4131b0c66,2023-07-19T13:23:09.597000 CVE-2023-37767,0,0,60856d57fef3bb2747e75b5f6421f739b7660d5998660526a164bb704d8a46c4,2023-07-19T13:23:15.433000 @@ -232950,7 +232950,7 @@ CVE-2023-43838,0,0,ef0d4d0a77025638e25ac91e467d096c6c184c9c50cf0c660c7d95e782382 CVE-2023-4384,0,0,54db9c5e0e48d365638318efaabdbc065f24cee66ef882641c4e391d0e81b6d5,2024-05-17T02:31:31.327000 CVE-2023-43842,0,0,b6c9d2305f759c50dd01157f2fbb2de8cf46992da781f7afb126c4e1f97d4198,2024-05-29T13:02:09.280000 CVE-2023-43843,0,0,aef808c71263ea6153f2eb4b7e45ae7b9a73047abeb8810e9698360185074ff9,2024-05-29T13:02:09.280000 -CVE-2023-43844,0,0,aa0cd59b83effa93acbfce005198f4cf37e8fc86576a6cf7d023f3952cbe3bd5,2024-05-29T13:02:09.280000 +CVE-2023-43844,0,1,060d731423af6f4711e120eb2a59d74f233fa214c9e9f3f730d535056c38b526,2024-08-22T20:35:01.130000 CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 CVE-2023-43846,0,0,fb3201cf7e6c0f2741576b6bdf0ad5f80553de1de784098b61d62597e5d839be,2024-05-29T13:02:09.280000 CVE-2023-43847,0,0,28c6e47ec33c1957d51359e438da5dfff5700e365d5de705396d6276e82a5e1e,2024-05-29T13:02:09.280000 @@ -234349,7 +234349,7 @@ CVE-2023-46040,0,0,6eff75a2812c317a80847f611adb0ea2b165227205b9790d775b06619e979 CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000 CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000 CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000 -CVE-2023-46047,0,1,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000 +CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000 CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000 CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000 CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000 @@ -234562,7 +234562,7 @@ CVE-2023-4629,0,0,a2da5926fb0fca7bbafeced6fa322c009d8e911a79a6b6bf7f38a2a5e0ea6e CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000 CVE-2023-46294,0,0,5aebe5d15d21a3c99db9d0aa22d1effedd56a960f93e5caf38568b64d0bdb4c0,2024-05-02T13:27:25.103000 CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000 -CVE-2023-46297,0,1,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000 +CVE-2023-46297,0,0,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000 CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000 CVE-2023-4630,0,0,84642586247351fd243a36a028f47b98bdbaebb8bb9393939811b558e3daca7b,2023-09-13T16:50:23.250000 CVE-2023-46300,0,0,ef50ba7da8805e453a397a1a5d11a994fcd6ff305d395f739cf3f9017964b18d,2023-10-31T17:08:50.757000 @@ -234665,7 +234665,7 @@ CVE-2023-46427,0,0,f866f9e54a1652715d6c8d5cf0ab85e5d06c714508a8f7e5c787c0848377e CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000 CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000 CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000 -CVE-2023-46442,0,1,9293faa2d8956aa4f30804364065a1b1e61ee21acf16953213f0ca472daec3be,2024-08-22T19:35:06.600000 +CVE-2023-46442,0,0,9293faa2d8956aa4f30804364065a1b1e61ee21acf16953213f0ca472daec3be,2024-08-22T19:35:06.600000 CVE-2023-46445,0,0,d30b7a69d534d58879daef0d8df2b1cc94af49180044c8b573c6dff1e56b4fe0,2023-12-22T20:15:07.270000 CVE-2023-46446,0,0,8947e039d91da74ea0d8abe1c8e929f5ba6d7ec6e059b8fabb66ab2753cd716c,2023-12-22T20:15:07.367000 CVE-2023-46447,0,0,3399247934a925d1a22abe563fd15983a03e402beebeab4d93fc81ab8bf7b896,2024-01-29T15:27:03.267000 @@ -237194,9 +237194,9 @@ CVE-2023-49959,0,0,88693f11e9749c7b6e276c7f9d19f715b73a4f2009b695830855f5158498f CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000 CVE-2023-49960,0,0,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000 CVE-2023-49961,0,0,fe18aca8b440f329c1d528d19a34369d87e6c8005ab3d538fd1c3f47cafa72b1,2024-01-12T16:13:48.350000 -CVE-2023-49963,0,1,1834205893b0a4ca865a9ef7e3a83b265bbd7d92cfe069a1f2dd2fa040d59a3c,2024-08-22T19:35:07.550000 +CVE-2023-49963,0,0,1834205893b0a4ca865a9ef7e3a83b265bbd7d92cfe069a1f2dd2fa040d59a3c,2024-08-22T19:35:07.550000 CVE-2023-49964,0,0,4a201f112134a3d6cf6021d5b91032c58a31552b69366b1a2d0998d8e981118b,2023-12-14T14:36:17.293000 -CVE-2023-49965,0,1,48e6b3e821ed6e4ac6e7c9a1268066cbff076d429495b607839693844fd16bcd,2024-08-22T18:35:03.353000 +CVE-2023-49965,0,0,48e6b3e821ed6e4ac6e7c9a1268066cbff076d429495b607839693844fd16bcd,2024-08-22T18:35:03.353000 CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb098,2023-12-09T04:48:27.967000 CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000 CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000 @@ -237255,7 +237255,7 @@ CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb918 CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000 CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000 CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000 -CVE-2023-50061,0,1,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000 +CVE-2023-50061,0,0,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000 CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000 CVE-2023-5007,0,0,2c3a0305698c7d0eb69e8429d362775d9108864cd5873643c1bb4add99591ed5,2023-12-26T21:32:57.167000 CVE-2023-50070,0,0,4c0e0b3a6a619999bf7c4d96a134f8e5b7b9f9c028a8642d016e18163d586de9,2024-01-05T19:45:20.357000 @@ -238112,7 +238112,7 @@ CVE-2023-51514,0,0,0eb2ee3fd9b0034c90eca3300b10970dc139157ae89c053eb67a396471a01 CVE-2023-51515,0,0,cc18e149599efa8bd615b60d79969ab273afa4ec8798b946776d7aee959ab978,2024-04-15T13:15:51.577000 CVE-2023-51516,0,0,e44c247aa8508748385aa693a34efbfabb8cca356a675cddfac250ff230e8b60,2024-08-07T18:55:36.290000 CVE-2023-51517,0,0,f21565246724904cf226c379676ef00de528846305ac2339577821a4e1e75ec9,2024-01-05T18:14:06.130000 -CVE-2023-51518,0,0,0a9a5ddbb6bf752da4ad320c7fc5b79bc6c6b12096c51104834aba7f60719601,2024-02-27T14:20:06.637000 +CVE-2023-51518,0,1,4cff8930c44a3ef87c97abcb51415075298ad505db8700f7bba20b1757731fcf,2024-08-22T21:35:00.913000 CVE-2023-51519,0,0,cd145cc8a1178894852234206f692025fbea90391949823a6279cf801fb89f41,2024-08-07T14:58:46.600000 CVE-2023-5152,0,0,07fcc818eecddc54d77eb3e4b6f83f2abf16672c5d883157bdd84f1aa91c0deb,2024-08-02T08:15:32.730000 CVE-2023-51520,0,0,fa83905e551c0f1871442257a4349a3f47d49f0c9a9a63d95c309c60b1ea747d,2024-02-06T20:20:11.330000 @@ -238429,7 +238429,7 @@ CVE-2023-51926,0,0,48f337dd0208b483cfaf633fcadfc65db647f5eeaa52ba4c0a98740652fc6 CVE-2023-51927,0,0,fb1dc39f0e1a648051c3638e969ca5441d946196af53c49a13ea6832797b13c1,2024-01-26T17:27:31.547000 CVE-2023-51928,0,0,5892af84c609cb1319b62109ed5f5ffa0f57fff8719855a0e1272e3c1a3b5b81,2024-01-26T17:33:22.560000 CVE-2023-5193,0,0,6c14fe1b0d05ec1ecb6d7fbb91436fbbb459d1827e213cb06adbe0316d8ee7d8,2023-10-03T17:32:42.060000 -CVE-2023-51931,0,0,eb2a1dba1701c7a0359148b88e1449a67c3e3fced9dbe9fdbb4774fb21c0e108,2024-02-16T13:37:51.433000 +CVE-2023-51931,0,1,b6faf7d4c9ea318cde84757135d6c208ce721da55074bb4c8721c2fc65793d28,2024-08-22T21:35:01.133000 CVE-2023-51939,0,0,b355495172e94b23753a3ead26c3ecfbce81e28e05d5a78e1c3b95667afc69cb,2024-02-08T20:11:36.137000 CVE-2023-5194,0,0,d1e50fe762de4978a1b73c69310e31acf5729568c7d8530d8a3e61d13bfd0f72,2023-10-03T17:36:14.853000 CVE-2023-51946,0,0,a9330db6bd80c9f6fcc27c4633adcac46a938b5c72a048149315accd439966ec,2024-01-25T15:52:22.730000 @@ -238579,7 +238579,7 @@ CVE-2023-5215,0,0,076f3ad4d1737a363373e0b80c210de679a7c69cccbb36b095edcc1c654cb5 CVE-2023-52150,0,0,d6cc0c17a73b480b712f1be2d69c9c9ac6e0f201ff524861fd68bbcccab1a10f,2024-01-10T19:50:26.923000 CVE-2023-52151,0,0,85b7b7f24b04898381709d8e25edbe733fd7631a4f636fe0a6d084fa96bc68a9,2024-01-10T03:59:57.907000 CVE-2023-52152,0,0,097fc00b61b252fe2f250d2355f140cbca254720913054490d1cf9f4c7d22fe8,2024-01-05T16:00:51.157000 -CVE-2023-52153,0,1,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943c76,2024-08-22T19:35:09.257000 +CVE-2023-52153,0,0,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943c76,2024-08-22T19:35:09.257000 CVE-2023-52154,0,0,3c09d8bbc34bc21301a7ba257cb3ebe4acad4608bcdd31c9c14e3f17024b636a,2024-02-22T19:07:27.197000 CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000 CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000 @@ -238743,7 +238743,7 @@ CVE-2023-52362,0,0,43adf8e6c64a96c436ca7a8a4039c94bf893e1cb423359d1487ffcd189c40 CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000 CVE-2023-52364,0,0,503781f00d75ade91ea9177c8585cd44a5a73fe2baa30f425ba6bec99d44c41c,2024-04-08T18:48:40.217000 CVE-2023-52365,0,0,bd1a11d425827e65eed9149e868165cf65bfaf0fcc43e0347175b951fc733d54,2024-02-20T19:50:53.960000 -CVE-2023-52366,0,1,237c716036b70fdbe0d981998960891e9cef688cdb85da8994548d5f0d670539,2024-08-22T18:35:04.153000 +CVE-2023-52366,0,0,237c716036b70fdbe0d981998960891e9cef688cdb85da8994548d5f0d670539,2024-08-22T18:35:04.153000 CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000 CVE-2023-52368,0,0,ab6ff08815d4283a11d94d78d409b6cb80ad558c4d3f1353292c6023cff0808c,2024-02-20T19:50:53.960000 CVE-2023-52369,0,0,1047464a4296b31a7cf6f87a7a312b39cc01e8c732edf6ebc4526ed97e7841ad,2024-02-20T19:50:53.960000 @@ -241071,6 +241071,7 @@ CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 +CVE-2023-7260,1,1,19104bbb4c6e3338ddc0fb4c40d135954a97c9a44f74b63a8a70f0296b3652ac,2024-08-22T21:15:16.107000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,f2f550eec8eb52e2d7c6d4751c88c82f6bbba78e56c41a54eac7449c27df676c,2024-08-08T13:04:18.753000 @@ -242921,7 +242922,7 @@ CVE-2024-20032,0,0,d9f17715cae8cf4f7f490704895224d3c5f8721c9379d158f6d75534a2fbe CVE-2024-20033,0,0,54fbaa24cdc7b0bf4840e2f98e0d8064474699ec248bdbd149da783c89610676,2024-03-04T13:58:23.447000 CVE-2024-20034,0,0,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000 CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a9ce,2024-03-04T13:58:23.447000 -CVE-2024-20037,0,1,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000 +CVE-2024-20037,0,0,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000 CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000 CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000 CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc68,2024-07-30T02:15:05.320000 @@ -244255,7 +244256,7 @@ CVE-2024-22009,0,0,b5b916a7d5e03fc859dbc7dc76ad79ca7e20552b5b212df09fe8f4b48b2af CVE-2024-22010,0,0,48bb31cd9fda5132d6bf173e5f25a90e9963e9143797f12960e4a1affd5276cd,2024-03-12T12:40:13.500000 CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000 CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000 -CVE-2024-22014,0,0,97be981b1958260947f79b7908c49463e10e156bc85f07e7f7d4adfcc41c6d71,2024-04-15T19:12:25.887000 +CVE-2024-22014,0,1,c5bff26c435087f5079304a805aa4d4c0115cfcca173e494a6205154db70b18c,2024-08-22T21:35:02.417000 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d440c2,2024-08-15T19:35:04.510000 @@ -244594,7 +244595,7 @@ CVE-2024-2239,0,0,62d5946fcfafb2a4be7efadc9b7155219cc610ca4673c610a784dbbc3d091b CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000 CVE-2024-22391,0,0,1f24cf22f6c35797cf3f1b5f513aeb27d6c9ee9188ababd3d8b06daf33275477,2024-05-05T03:15:06.950000 CVE-2024-22393,0,0,708a22f5d3d86e394b7bd57dc98253e578e5dadb2c4096ced276d5893ef994b3,2024-08-01T13:46:55.723000 -CVE-2024-22394,0,1,2d2cacf44303c3f2d5173aeda14462e9b46618509e14fff72aa5e0f1e00e04f1,2024-08-22T19:35:11.720000 +CVE-2024-22394,0,0,2d2cacf44303c3f2d5173aeda14462e9b46618509e14fff72aa5e0f1e00e04f1,2024-08-22T19:35:11.720000 CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000 CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000 @@ -244710,9 +244711,9 @@ CVE-2024-22569,0,0,709461d4796d213733f83973d7bcb39ae1034c99e9f028bded13074174036 CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000 CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000 CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000 -CVE-2024-22588,0,1,a256e02887a23b217209241f70470c3ebdd9d466eea5d17713c72f3f04119775,2024-08-22T19:35:11.923000 +CVE-2024-22588,0,0,a256e02887a23b217209241f70470c3ebdd9d466eea5d17713c72f3f04119775,2024-08-22T19:35:11.923000 CVE-2024-2259,0,0,47e9716e08a8a64152636e816d65e3ceba79ed2969d2637cad811811cd82755b,2024-08-13T12:58:25.437000 -CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000 +CVE-2024-22590,0,1,d6412fa08202703f5ad227553f1802d67a899aa26e46c95f53e4a8e42002c8bc,2024-08-22T20:35:03.440000 CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000 CVE-2024-22592,0,0,268d0bb3e8d404d0087cf60d681467b452c81f0d7e52d485caa72c08138c2725,2024-01-20T18:49:41.750000 CVE-2024-22593,0,0,a9ca57d36c76f00065303d1015def590eb9e5a76ce97b84afb4d13dfe83ee2a6,2024-01-20T18:49:24.957000 @@ -244892,7 +244893,7 @@ CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000 CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc0ec,2024-01-18T15:18:14.357000 CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000 -CVE-2024-23076,0,1,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000 +CVE-2024-23076,0,0,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000 CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000 CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000 CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000 @@ -245692,7 +245693,7 @@ CVE-2024-2412,0,0,5eb3e084c15080bce88063a202edef708e748222aace75a3232d4d6b3f448d CVE-2024-2413,0,0,bcce963a476349e5182596e9d4a6b2abe57a4b3c6a7908768bff05824ae06fd2,2024-03-13T12:33:51.697000 CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000 CVE-2024-24131,0,0,8a34d68fbe59589499b97058e1cc5501abd20303216cfd95ea1911115864db68,2024-02-12T14:32:43.777000 -CVE-2024-24133,0,1,d949da0e1ac241998db2e8167fd5857f2e74feefba8bfda0856fa1bf8007e505,2024-08-22T19:35:13.840000 +CVE-2024-24133,0,0,d949da0e1ac241998db2e8167fd5857f2e74feefba8bfda0856fa1bf8007e505,2024-08-22T19:35:13.840000 CVE-2024-24134,0,0,60e84ab02df9a5eebdd98ea4a5db40e2dea9f01666850cc98731ba000a572158,2024-02-22T03:36:42.397000 CVE-2024-24135,0,0,977ca85955d4bb50888ba44be3ff5724d7a85958ba21e73ab9d084c94066f20a,2024-02-22T03:39:23.233000 CVE-2024-24136,0,0,4e52a4e0c3e2bcd6af5c4faaf3a70948e406b5b2d6cac3691257ba4bddd05547,2024-02-02T23:32:58.107000 @@ -245828,7 +245829,7 @@ CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a26 CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000 CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000 CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000 -CVE-2024-24476,0,1,35173e0759cbff63e7dc92d5e25f4cab09b39e59ddcae8323e62df958905df80,2024-08-22T18:35:04.910000 +CVE-2024-24476,0,0,35173e0759cbff63e7dc92d5e25f4cab09b39e59ddcae8323e62df958905df80,2024-08-22T18:35:04.910000 CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000 CVE-2024-24479,0,0,549c1faefc95446c73c237c8fc36405069121ac467e76d98310d7dcfb6901321,2024-08-02T00:15:19.433000 CVE-2024-2448,0,0,1625ab16b72103512d70f9dadaa1a93632daea1863fd2e539d584ce390412d31,2024-03-22T15:34:43.663000 @@ -246159,7 +246160,7 @@ CVE-2024-24934,0,0,717ebd29baf0223147954ff4fc7b5abf7339ed99fc54fb4afa5bc07c2af82 CVE-2024-24935,0,0,39b3b47eec290d795dff4288fa3e077d67ca6b2bbc4436ed0fecf9ebb566b6a7,2024-02-12T14:19:54.330000 CVE-2024-24936,0,0,2f4b3d891c0fd71fb32f3f7281dc7468776050ecaee7860140e85b8329051af2,2024-02-09T01:06:20.053000 CVE-2024-24937,0,0,c913638a2922af897146e30fa39c4ae1eedee29a56b43ae469e999010515ffd7,2024-02-09T01:05:30.783000 -CVE-2024-24938,0,0,dd8d31eccb802487f76a5c5f8eb0f1039cbdc8a46a8dfc0fe7129cca794500de,2024-02-09T01:05:13.527000 +CVE-2024-24938,0,1,978a8e92d6abe74a239a68136614ec8b72eac7e14ad968791e1a3865ec19723c,2024-08-22T20:35:04.587000 CVE-2024-24939,0,0,1da892b278f27c0babb19a7942acd7f99014d05ffb12620f6b0a4b4b40d95594,2024-02-09T01:04:16.577000 CVE-2024-2494,0,0,0de5ad571b20519106dd976ff7c2bbe7fd4c1e42aeffbaa001c9ef8e69fc06c0,2024-06-10T17:16:25.307000 CVE-2024-24940,0,0,08a72ebdb54f61cfe3310654c3d68e440cb00279c18f6cecfd62390f59a13430,2024-02-07T23:45:31.493000 @@ -246493,7 +246494,7 @@ CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d4 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000 CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000 -CVE-2024-25502,0,1,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 +CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000 CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 @@ -246613,13 +246614,13 @@ CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedf CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d2d4,2024-03-14T12:52:09.877000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000 -CVE-2024-25651,0,1,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000 +CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000 CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000 CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000 CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46 CVE-2024-25655,0,0,e15adc8eac4466bc206ecbf344e823f2dc60c695c8e2b528f93955091c188195,2024-03-19T13:26:46 CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000 -CVE-2024-25657,0,0,076c37ba4df1bc69bbba3bb7d6ce236d56ed5cb3f42c6bab975b7d73d5a3aafd,2024-03-19T13:26:46 +CVE-2024-25657,0,1,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000 CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000 CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000 CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000 @@ -246668,7 +246669,7 @@ CVE-2024-25734,0,0,4ee66182e097f4f56b6291ef1e6f0e392b286ce02b5247ef63df668ee1fb6 CVE-2024-25735,0,0,50c4e020abf1cffc3f47fd08c4abff2bccf96943b546e88771993726e766684a,2024-08-06T16:35:06.527000 CVE-2024-25736,0,0,e656e37839c1ec7c7b63871d566a91468e6f49c6416723c6764b550ab05e5670,2024-08-05T22:35:01.947000 CVE-2024-25737,0,0,2e40edda2bf8f11be62e123472d611b88082a8433647751d6e9fa8369863db2e,2024-05-24T01:15:30.977000 -CVE-2024-25738,0,0,27fee36ee7c623ae584d6f5e106ac421c5c75b8036960cd8a9acca121dc6748c,2024-05-24T01:15:30.977000 +CVE-2024-25738,0,1,708ab77db4798450f178306dfdce8e54e50af183337435b77974d77b7119e627,2024-08-22T20:35:05.737000 CVE-2024-25739,0,0,976dd73cb281097b08298328a4164e038521b14231c5653569f9d2458078f4f3,2024-06-27T13:15:55.520000 CVE-2024-2574,0,0,0663b3bf620e7eaea35e1b3237dc263b6d897527ed31c7e8166e509390c6cb16,2024-05-17T02:38:20.537000 CVE-2024-25740,0,0,6ba085d5463d39f02fcd8a1bcb6b0d08f943a0acf58c18d3b1c39a6a03f005b3,2024-02-26T21:11:27.837000 @@ -246719,7 +246720,7 @@ CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000 CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000 CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000 -CVE-2024-25850,0,1,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000 +CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000 CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000 CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000 CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000 @@ -247917,7 +247918,7 @@ CVE-2024-27205,0,0,6c651845ed79bae59e4bc5dfd269c86e5f248589b03155d6d1c21d876f034 CVE-2024-27206,0,0,3dbcbfbe90f7ccf1cbfa262db765dc01c5f5c5d064d48875899ccc34bacdeafb,2024-03-15T20:15:08.743000 CVE-2024-27207,0,0,9c2ba1f8859e635c52bb4f64d4b0a04f4cc6d5d084308215e2bb1b9341c49fd3,2024-08-05T18:35:09.463000 CVE-2024-27208,0,0,fe92ce35aa96bad489de57160c7a2fca3fa967ec6e1cec1d7b791aa73e9643da,2024-03-15T20:15:08.817000 -CVE-2024-27209,0,0,b612b3955c2ff4f0a4005965ed798aa1e7684d6f13f33d83981249f317bba3c3,2024-03-15T20:15:08.860000 +CVE-2024-27209,0,1,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f24a3,2024-08-22T20:35:06.747000 CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000 CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000 CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000 @@ -248170,7 +248171,7 @@ CVE-2024-2751,0,0,e0380b41cfa9755453969621f95a77af0ea62dd5295ce9849e6c35313a94c3 CVE-2024-27515,0,0,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000 CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000 CVE-2024-27517,0,0,5e97f075b436a5c8f2e51d28a398abf4c938438e6f3743132df7b78060b7cc66,2024-02-29T13:49:29.390000 -CVE-2024-27518,0,1,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000 +CVE-2024-27518,0,0,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000 CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000 CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000 CVE-2024-2753,0,0,af8f0bf6c002c3e1db46c2cc4926e36d1e1afb83468ed827c9e47555532f1bd6,2024-04-04T12:48:41.700000 @@ -248189,7 +248190,7 @@ CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000 CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000 -CVE-2024-27571,0,1,ac088f7b64ad71ffe595852b417cdbab48f16b4154eb8d90ddb111c8e2f63030,2024-08-22T19:35:19.107000 +CVE-2024-27571,0,0,ac088f7b64ad71ffe595852b417cdbab48f16b4154eb8d90ddb111c8e2f63030,2024-08-22T19:35:19.107000 CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c782,2024-08-01T13:48:32.977000 CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 @@ -248669,7 +248670,7 @@ CVE-2024-28200,0,0,848f47156b7dea97a9f192a57ecb65c4366a740aa5ada8f7c8eccf77e8193 CVE-2024-2821,0,0,c2b44894dd7f88b2b849e5ba19097fd13ba6654511fb9e687a8b00c577041545,2024-05-17T02:38:32.443000 CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9650,2024-08-05T20:35:06.830000 CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000 -CVE-2024-28213,0,0,ad07392c928a03cb3f0e61c49e78fde891a40d9dec43fbc4d8f05b06ec9b5b99,2024-03-07T13:52:27.110000 +CVE-2024-28213,0,1,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000 CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000 CVE-2024-28215,0,0,6b2656e187f54be3b8692756e38dcefabd67fa7060f9733da9dff9ce708bf4af,2024-03-07T13:52:27.110000 CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000 @@ -248760,7 +248761,7 @@ CVE-2024-28387,0,0,af4c90d656accc5b2d132269cbcc25e25573278fd5f53e46eeb301cb514b3 CVE-2024-28388,0,0,575d4968aa541f7d6ef0da0b573c9a8bb55aa2b590b70d0372139e0de2630184,2024-03-14T12:52:09.877000 CVE-2024-28389,0,0,42acf6cbaebdc461cce2af35b74679c9d1c81ce9114564911b85ebeaf88a2bac,2024-08-02T16:35:40.323000 CVE-2024-2839,0,0,ee45053b5ac83eae18c1a71d98f9817e7025bc9d7e049918f01e284843f64c90,2024-04-02T12:50:42.233000 -CVE-2024-28390,0,0,8e966fdec021f459642300414ff272480719a8ad797893b6828dff0c5c67b98e,2024-03-14T12:52:09.877000 +CVE-2024-28390,0,1,668a15f7dcbbeb37a1e1d9d05ceb4da1149f17d4318e69ac0b18c5f0285d949e,2024-08-22T21:35:03.607000 CVE-2024-28391,0,0,1612464a5045a9dcbfbed51b4145357f41a0970daedd21315ce2194196825398,2024-08-01T13:49:04.167000 CVE-2024-28392,0,0,5824697cb412e64caabb20f46b93c113a811b02735a0ef2ece011572dc931f0d,2024-03-20T17:18:26.603000 CVE-2024-28393,0,0,04c598367976d9977c43beb15b030d893b4ef27f3405bd598ddf167ac93764fc,2024-03-25T16:43:06.137000 @@ -248791,7 +248792,7 @@ CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdc CVE-2024-28435,0,0,4c02f96d0bdc1a14461e768ad92ad2becc695cfb2c978e4da67bd0167ce78dc9,2024-03-25T16:43:06.137000 CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000 CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000 -CVE-2024-28441,0,1,98f673e8e169ee952dddca79ea78c3ead96fc2eb99b2c0a11068e947c06c44d4,2024-08-22T18:35:05.960000 +CVE-2024-28441,0,0,98f673e8e169ee952dddca79ea78c3ead96fc2eb99b2c0a11068e947c06c44d4,2024-08-22T18:35:05.960000 CVE-2024-28442,0,0,b5d378d7bf249d8932b5ef67495fddcb797bea8509e4f1706eab874d95ebf375,2024-08-05T17:35:10 CVE-2024-28446,0,0,5cb6c3ad6343c7605d7288fa21a1a2b4ecbb6433ed1975b50505c4c4841c4770,2024-03-19T13:26:46 CVE-2024-28447,0,0,96efc6b45fb26dce648a4b187b204c486498ef994105e9fd2065b17d0a61b2f5,2024-08-20T21:35:02.770000 @@ -249430,7 +249431,7 @@ CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f6 CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000 CVE-2024-29477,0,0,95dcae9bc8061c5d58cf2b63e167bb4091735292e7ec34284f04e5b395f25cbd,2024-04-03T12:38:04.840000 CVE-2024-2948,0,0,2331d78509f1f3893daaecaf2db5091913c1d64d9406e6199bfd4abbc5caa395,2024-04-01T01:12:59.077000 -CVE-2024-29489,0,1,2cd7b967a834ebb80ab1382ec368c5b1d73b4dff18a9c5fbfabbbbccd3dff0ee,2024-08-22T19:35:20.067000 +CVE-2024-29489,0,0,2cd7b967a834ebb80ab1382ec368c5b1d73b4dff18a9c5fbfabbbbccd3dff0ee,2024-08-22T19:35:20.067000 CVE-2024-2949,0,0,741e52e7909be6687101b8ec7aa347d81d5d7ec2a7c6c782e512ff2bce69b7e4,2024-04-08T18:48:40.217000 CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000 CVE-2024-2950,0,0,596af42449f28aff5b2c79c90b770bb4c97ffb9bc969aaf5cc4ba262b42d972f,2024-04-08T18:49:25.863000 @@ -249906,7 +249907,7 @@ CVE-2024-30183,0,0,ad137d8416946ce656cce31eb7a0b96200b841fa81cd9483fb6811366140c CVE-2024-30184,0,0,77c9228d008326bd99ae127ca8e132427e74beec3c963f6478bcbcf355838fa3,2024-03-27T12:29:30.307000 CVE-2024-30185,0,0,021fa2bb56fdb06083e9059af1891d4677f384120b9c9cff2bf7cdb9c84fa539,2024-03-27T12:29:30.307000 CVE-2024-30186,0,0,2c739b7180a604f892f32e45c0608cfe3aaa016f782853a55dd614d1b973db95,2024-03-27T12:29:30.307000 -CVE-2024-30187,0,0,a87417506a6715324081b8a6732358ff8be0f886268063cb33d3fafba7ead39b,2024-03-25T13:47:14.087000 +CVE-2024-30187,0,1,45ee6c8bfcb6b07e2d43488dfa236e29eadba9b30ce6ca6fed5fafe6b59b5859,2024-08-22T21:35:04.480000 CVE-2024-30188,0,0,a17021bfa0c57e65a7aad5abba7285a3d1572183b295c16e57ecab41a5e8200c,2024-08-12T13:41:36.517000 CVE-2024-30189,0,0,bea0641188c77d9ff9bf3c0d46eff997519b7c27956011c836ea03e42a1ac4c0,2024-04-09T12:48:04.090000 CVE-2024-3019,0,0,fc47f9f0e8d896280f4a2d46090d1bc0cf7b321d9a30221be0d2b03759c35ec9,2024-05-28T19:15:11.323000 @@ -250427,7 +250428,7 @@ CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000 CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000 CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000 -CVE-2024-30804,0,1,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000 +CVE-2024-30804,0,0,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000 CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000 CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000 CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000 @@ -250535,12 +250536,12 @@ CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765 CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8d92,2024-04-04T12:48:41.700000 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 -CVE-2024-31032,0,1,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 +CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 CVE-2024-31033,0,0,ad98d7e55b8cc6171b35a6136e6eb51847672500aa911f7497c7969c50af9164,2024-08-02T02:15:31.420000 CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000 CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 -CVE-2024-31041,0,1,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000 +CVE-2024-31041,0,0,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000 CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000 CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f57,2024-06-17T12:42:04.623000 CVE-2024-31061,0,0,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000 @@ -251015,7 +251016,7 @@ CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 CVE-2024-31756,0,0,b265a44ac5576ee6d5c0a18978b0e66ae2e3119d6151f744407705cbd0d8e888,2024-05-22T12:46:53.887000 CVE-2024-31757,0,0,640246057d9af431a856f7069b3a4b0176cede6dd1a0ca84cccb72f8b2351ce2,2024-05-22T12:46:53.887000 -CVE-2024-31759,0,1,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fef94,2024-08-22T19:35:24.357000 +CVE-2024-31759,0,0,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fef94,2024-08-22T19:35:24.357000 CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000 CVE-2024-31760,0,0,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000 CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000 @@ -251324,7 +251325,7 @@ CVE-2024-32166,0,0,e117f1f1473eb5a0781f79a5d43c653abcb8b2fa988a11cd3340ec0a690c0 CVE-2024-32167,0,0,915de4b0debb285120767f5ee79a021decbe9afbb3817337a80cac9f827f0a60,2024-08-01T13:51:22.630000 CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000 -CVE-2024-3219,0,0,12c4e5f254e3ed2bfca4b5e1da68c88dbcde5c0140caaf887a7815a8e10e3460,2024-08-05T15:15:53.960000 +CVE-2024-3219,0,1,3c8ce0e475eab60efda7b485e6b89370ab21b7f77aca5f7f93f1e93874c8b857,2024-08-22T20:15:09.143000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000 @@ -252017,7 +252018,7 @@ CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610 CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000 CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 -CVE-2024-33103,0,1,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000 +CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000 CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000 CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000 @@ -252067,7 +252068,7 @@ CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d63 CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000 CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000 CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000 -CVE-2024-33226,0,1,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f05c3,2024-08-22T19:35:26.237000 +CVE-2024-33226,0,0,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f05c3,2024-08-22T19:35:26.237000 CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000 CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000 CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000 @@ -252329,7 +252330,7 @@ CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbd CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000 CVE-2024-33653,0,0,265fc534e8717f316164edd35fe39b65af5bd4a9e2599f020b58283bd3269b45,2024-07-09T18:19:14.047000 CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c732,2024-07-09T18:19:14.047000 -CVE-2024-33655,0,1,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000 +CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000 CVE-2024-33656,0,0,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000 CVE-2024-33657,0,0,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000 CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 @@ -252400,7 +252401,7 @@ CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd6 CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 -CVE-2024-33799,0,1,9d8baf9264b308f06d2bfe7c972157c80c3d36eac1c756578279660cf6d83ddb,2024-08-22T19:35:28.087000 +CVE-2024-33799,0,0,9d8baf9264b308f06d2bfe7c972157c80c3d36eac1c756578279660cf6d83ddb,2024-08-22T19:35:28.087000 CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000 CVE-2024-33800,0,0,201356ff7d99d67e9b23318eb81347b8e0acce7c8616f8f0b16bc1aecb8d2a62,2024-05-28T17:11:47.007000 CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000 @@ -252472,7 +252473,7 @@ CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1e CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000 CVE-2024-33901,0,0,a1f0948d73a23ff6210c02030912794a258b1439fa01bfbefd0ef5985673396e,2024-08-02T03:15:33.887000 CVE-2024-33903,0,0,66fa6f18457541069e9742d7224c491d6b0a223ce231b54f3cf8ba6c6e111733,2024-04-29T12:42:03.667000 -CVE-2024-33904,0,0,649f4e21e4e6e1bd169137db7a1546844fc67399c9649d4ffcd3b89ea6d1e17d,2024-04-29T12:42:03.667000 +CVE-2024-33904,0,1,7f612cc39cf5cffef556560adbc4e6bcc771b421fa11cf86490b14ea4a43c0ba,2024-08-22T20:35:09.343000 CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000 CVE-2024-33907,0,0,51edf1f50248f36c9e87b8d73ea1cc5abed4f93b57bba096b80e73be40374db3,2024-05-07T13:39:32.710000 CVE-2024-33908,0,0,df73291580be08f5b2a94bed722cbb238436865b447d67c437568125e63f333e,2024-05-07T13:39:32.710000 @@ -252892,7 +252893,7 @@ CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb4 CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000 CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000 -CVE-2024-34459,0,1,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000 +CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000 CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000 CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000 @@ -252935,7 +252936,7 @@ CVE-2024-34519,0,0,e1bab0f51bff6ddc1064f759576ee7e30191ae4ab924c21597ebc2a29f9b8 CVE-2024-34523,0,0,7ef51f7e789546b198cf934fa08689a630a0291ba9909985498eacb1d192e4fb,2024-08-02T03:15:43.153000 CVE-2024-34524,0,0,3e667092f2fac2e9248384e2031bfe46558254a6a3fc0f2ae0aecbfd07dbb573,2024-07-03T02:00:27.283000 CVE-2024-34525,0,0,7b62d839278ce76830c96b3fb5e58c932a408ac771b301e231e0f571e1316ee9,2024-07-03T02:00:29.427000 -CVE-2024-34527,0,1,23e03d0c4fa6bfa8b77f24e782beaeccc9957ed9211c09f918e2b7968b887f04,2024-08-22T18:35:09.990000 +CVE-2024-34527,0,0,23e03d0c4fa6bfa8b77f24e782beaeccc9957ed9211c09f918e2b7968b887f04,2024-08-22T18:35:09.990000 CVE-2024-34528,0,0,8d9b5b257f7d2fd4a76a2b149b8062182b52b5547fe4d60dbfd3d242d3d40d64,2024-05-06T12:44:56.377000 CVE-2024-34529,0,0,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb105b,2024-07-03T02:00:30.540000 CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000 @@ -253176,7 +253177,7 @@ CVE-2024-34826,0,0,351c22bcab8818868b07290276f62aa434130aafdd9ebc850cc6b73894d2e CVE-2024-34827,0,0,dd19689a79f1067d7d45985a043cee153e2c55a2f9cd3e74b0ee8f1e25e905fb,2024-05-14T16:12:23.490000 CVE-2024-34828,0,0,e7ae500419610a76a265629d4e156ba43b75d86bab84cd6265c5a22f7e811bd5,2024-05-14T16:12:23.490000 CVE-2024-3483,0,0,72ac121e10f0fbec3441fdc985105b5517c67c7d15c68e546183af8699afc04f,2024-05-15T18:35:11.453000 -CVE-2024-34832,0,0,e38f6d8d3f9b6bca1687cfccc25da7adcce2d7488c36a825ea76f897c194b67d,2024-08-02T17:02:44.753000 +CVE-2024-34832,0,1,9221b37c801147fa3e1f0e1374d69209bf6d3d76dd01b6b6751ad3db7ce446e9,2024-08-22T20:35:10.197000 CVE-2024-34833,0,0,d0fc9ae10a7af80da29383727746a9a28b1b3908848ebf21d8371a48e86f18df,2024-08-05T17:35:13.953000 CVE-2024-3484,0,0,615f14fdd6b7cd87ca18ef762e16cc35184db7733a3812c430864b915d907b16,2024-05-15T18:35:11.453000 CVE-2024-3485,0,0,cfcae770f37ba0f2f38addf6a74502cf1d2c306fb9374f29d74c99431684fa32,2024-05-15T18:35:11.453000 @@ -253481,12 +253482,12 @@ CVE-2024-35430,0,0,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9 CVE-2024-35431,0,0,0a35dffe7e6c93066fa509053c839d3a8bc16edf2b77120799090f4882a8d3ea,2024-08-01T13:52:41.087000 CVE-2024-35432,0,0,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000 CVE-2024-35433,0,0,0b3687e6d05fd0aabce2f6753ab48622a6daecb670483272307382dbb941306d,2024-05-30T18:18:58.870000 -CVE-2024-35434,0,0,55e035c2a162134710b80f5640b923747de7468a0790da753e41ecb6e33217f6,2024-05-29T19:50:25.303000 +CVE-2024-35434,0,1,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000 CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000 CVE-2024-3545,0,0,d9f283192ab8f986c7e851f9b58a13c1438e2ebb25fe23225197629fde187eac,2024-04-10T13:23:38.787000 CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000 CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000 -CVE-2024-35469,0,1,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000 +CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000 CVE-2024-3547,0,0,5281ad8cfbf75d8e7097f8df52b8a3e9c74f8dabf40b76a70b99a4928380607e,2024-05-14T16:11:39.510000 CVE-2024-35474,0,0,1aa452483d6d7da77f1090f3cd37ef4b816291e1838401dc1342635ac1a9c4c8,2024-06-10T18:06:22.600000 CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf4fd,2024-07-03T02:01:45.963000 @@ -253498,7 +253499,7 @@ CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052 CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000 CVE-2024-35510,0,0,caaffeb522a9243cb4a1bb41637eced11d63455c55d5f889189d39467161eb6a,2024-07-03T02:01:46.810000 CVE-2024-35511,0,0,0925e571054fff897af51a6c91c2579c2749b26c74104183a16b37d4fa6c6517,2024-07-03T02:01:47.583000 -CVE-2024-35512,0,0,825dd69eea00721f269736947db0dabb552de9aaee5d843af6ea9626743eb096,2024-05-29T19:50:25.303000 +CVE-2024-35512,0,1,b896e4527afcecfdf8ee8b9a5d8645a7997efcebb8181c42302f1215247b04ab,2024-08-22T21:35:05.483000 CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000 CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f171,2024-06-26T12:44:29.693000 CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000 @@ -253580,7 +253581,7 @@ CVE-2024-35656,0,0,b6fb99a75659a0b6cddb17e86374269e5493cd14bd9535b3dfd7ed1f6e679 CVE-2024-35657,0,0,b51c4e22c7c5f52f89b80edb48a52842853a592201112fcdbd807b87af974c40,2024-06-10T02:52:08.267000 CVE-2024-35658,0,0,02d603bb4833c826378dc2c7b4b6c158aa64f99f63e182d87141c499aba708ea,2024-06-12T17:50:55.227000 CVE-2024-35659,0,0,2651c0d3218fe1050c14ffaf3928003168756cb772b19ad449c9389f3dfde3e5,2024-06-10T02:52:08.267000 -CVE-2024-3566,0,1,d8adb5426b454694781dd5ab667311ecd90bc8a46fc99ba28a1f66dd045ba157,2024-08-22T19:35:35.700000 +CVE-2024-3566,0,0,d8adb5426b454694781dd5ab667311ecd90bc8a46fc99ba28a1f66dd045ba157,2024-08-22T19:35:35.700000 CVE-2024-35660,0,0,a85ff0a7822a14d165e5de7ed1919abb154a1de11c8215173a97f054ca1441ea,2024-06-10T02:52:08.267000 CVE-2024-35661,0,0,8b8332085c8053a42df002a98652102b5e05133894d3f36aab8949e0eb0e3128,2024-06-12T13:31:41.527000 CVE-2024-35662,0,0,43b492385b92b1fc942c99fc466dcd6547a4a7b780999e4b389c076e3ea39b15,2024-06-12T13:31:10.767000 @@ -254178,7 +254179,7 @@ CVE-2024-36264,0,0,14c280aba5df11c6b2ff8e262101089437d0333d307f52ff751b574a69563 CVE-2024-36265,0,0,3c8ae8461757f224b0e43678d6a3475afd39b129c52679abb832e768cb65918d,2024-08-02T04:16:59.920000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 -CVE-2024-36268,0,0,dff0467d290592509ee25f10c7bba0154491650d4cb39d7b286134a8cb057fcc,2024-08-02T12:59:43.990000 +CVE-2024-36268,0,1,043d5e00f7bba001fc819462941e5679cccbff624823c585768e8f325f4d2d8e,2024-08-22T20:35:12.037000 CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000 CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000 @@ -254277,14 +254278,14 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046 CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 -CVE-2024-36439,0,1,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000 +CVE-2024-36439,0,0,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 -CVE-2024-36440,0,0,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000 -CVE-2024-36441,0,1,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000 +CVE-2024-36440,0,1,b326a6820a4986176d290647e2ca4280ea1a45872937a97772f4d16e115926d6,2024-08-22T20:35:13.640000 +CVE-2024-36441,0,0,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000 CVE-2024-36442,0,0,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000 -CVE-2024-36443,0,1,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000 +CVE-2024-36443,0,0,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000 CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000 -CVE-2024-36445,0,0,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000 +CVE-2024-36445,0,1,fa564e1c9d1c227d129e726de305d057f0b73fb302963320d7035e07e6afee8d,2024-08-22T20:35:14.640000 CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000 CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 @@ -254366,7 +254367,7 @@ CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092 CVE-2024-36577,0,0,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000 CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000 CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000 -CVE-2024-36580,0,1,214697697bb80df3f9cca6a9df817f6d970b4b4eff9913528d0b988f85d755f8,2024-08-22T19:35:31.613000 +CVE-2024-36580,0,0,214697697bb80df3f9cca6a9df817f6d970b4b4eff9913528d0b988f85d755f8,2024-08-22T19:35:31.613000 CVE-2024-36581,0,0,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000 CVE-2024-36582,0,0,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000 CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000 @@ -254424,7 +254425,7 @@ CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb5 CVE-2024-36736,0,0,b20d2ef797aa6fbbca71cb0c7c6886935927b9ada97126f8e3cbe4efcdbdd655,2024-06-07T14:56:05.647000 CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000 CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000 -CVE-2024-36740,0,0,2119901e17f2acabf72e64a543d2aa59166a4d04cef9ebec63b859fb8418a1d5,2024-06-07T14:56:05.647000 +CVE-2024-36740,0,1,b8d6e8bca7b91dd7c523241570682574ea3e2e1025716afa76fbc7a7c4de936f,2024-08-22T20:35:15.900000 CVE-2024-36742,0,0,acb38f1b43ab4e7383495b3e1f06f162c75f285b1ef8caa005f6865ae9c13ef1,2024-08-01T13:53:15.053000 CVE-2024-36743,0,0,918adf8ca0ed469017b9c6faa54a88497274ae724212583479f2aa193c53be72,2024-07-03T02:03:35.050000 CVE-2024-36745,0,0,1c12c7bcc24ae5bb6a1ae8c5c800342ca4dc4e184f12e2bbc75666cd5cf9fdfd,2024-06-07T14:56:05.647000 @@ -254434,7 +254435,7 @@ CVE-2024-3676,0,0,8dc193c8609917b35ba91a632e73de4e92ed46289774a677f06060a8b04aac CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000 CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000 CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000 -CVE-2024-36773,0,1,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000 +CVE-2024-36773,0,0,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000 CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000 CVE-2024-36775,0,0,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000 CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000 @@ -254448,11 +254449,11 @@ CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465 CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000 CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000 CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000 -CVE-2024-36800,0,0,7145d6f747aaada9716fb81bc8dfb45a6760f4d4c44d1923a8fcdfd4d6bf0704,2024-06-04T16:57:41.053000 +CVE-2024-36800,0,1,22057c82ea39171d646a3d69514bfe24d86c6abe66f6737dc702e3f1234458ca,2024-08-22T20:35:16.867000 CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83c50,2024-06-04T16:57:41.053000 CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000 CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000 -CVE-2024-36811,0,1,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000 +CVE-2024-36811,0,0,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000 CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000 CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000 CVE-2024-36821,0,0,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000 @@ -254462,11 +254463,11 @@ CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000 CVE-2024-3684,0,0,ef6904f473bb993a6bf9ca34fba021c50efb8f96f04049399eccb5be29999ef7,2024-04-19T16:19:49.043000 CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000 -CVE-2024-36843,0,1,4198bc8a9b485a9b6edbe36e6e06e96f5937d55d9694e4e4309439b88c915982,2024-08-22T18:35:15.457000 +CVE-2024-36843,0,0,4198bc8a9b485a9b6edbe36e6e06e96f5937d55d9694e4e4309439b88c915982,2024-08-22T18:35:15.457000 CVE-2024-36844,0,0,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000 CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000 CVE-2024-3685,0,0,dda0c71ef8f633473513e14b8b76ca4b9f78357b8af623185fa69818b961df70,2024-05-17T02:40:03.840000 -CVE-2024-36856,0,1,dcc09dd034e14f7209a49a89553bd06990a72cd8ab2f8f5d6e2d144a9d460281,2024-08-22T19:35:33.427000 +CVE-2024-36856,0,0,dcc09dd034e14f7209a49a89553bd06990a72cd8ab2f8f5d6e2d144a9d460281,2024-08-22T19:35:33.427000 CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e274,2024-08-14T20:35:15.433000 CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000 CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000 @@ -254649,7 +254650,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6 CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000 CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000 CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000 -CVE-2024-37066,0,1,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000 +CVE-2024-37066,0,0,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000 CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000 CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000 CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000 @@ -255985,7 +255986,7 @@ CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b744627 CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000 CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000 CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000 -CVE-2024-39211,0,1,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000 +CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000 @@ -256336,7 +256337,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000 -CVE-2024-39717,1,1,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000 +CVE-2024-39717,0,0,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 @@ -256361,6 +256362,7 @@ CVE-2024-39746,0,0,0e20ca81d9d325bdeee73b70da8ce4b47d626b09ef1d79c40ba99deb3dbd4 CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 +CVE-2024-39776,1,1,d375cf92d107deb4a4260c0cdd1844c7758bfad179a08835f00260dc4d40ef32,2024-08-22T20:15:08.750000 CVE-2024-39777,0,0,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170daf18,2024-08-01T16:45:25.400000 CVE-2024-39778,0,0,bb2539eb59e56cbeaf6e7ed7999fae0d5792d390eb9e1100733cc6f4b019e4fc,2024-08-19T16:20:52.980000 CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000 @@ -256498,7 +256500,7 @@ CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000 CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000 -CVE-2024-40096,0,0,d8754528addbe80fbf9f4d9648ed7183bc82944e53f9acdf3e8fc0aa5af1d9bc,2024-08-05T12:41:45.957000 +CVE-2024-40096,0,1,f4d93815f52e3c16c28040ba21795a35002b57c191156f911baad6e63290a17a,2024-08-22T20:15:09.340000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 CVE-2024-40101,0,0,fa05a141dcc36735ee72bbd0c3b7b1a769814f7631a0be292d4f64087437d8d6,2024-08-06T16:30:24.547000 CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000 @@ -256535,7 +256537,7 @@ CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000 CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000 -CVE-2024-40347,0,1,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000 +CVE-2024-40347,0,0,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000 CVE-2024-40348,0,0,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000 CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000 CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000 @@ -256601,7 +256603,7 @@ CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7 CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000 CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000 CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000 -CVE-2024-40535,0,1,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000 +CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000 CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000 CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000 CVE-2024-40540,0,0,812067b26dd7cd753b1d3089300f8704ff38af643d689f8a41629c2d3fffe24f,2024-08-01T13:57:39.867000 @@ -257159,14 +257161,14 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000 -CVE-2024-41572,0,0,ab40cf80c59b95a1ebd2f7b9ce0b0eac0ef9840c48fb790d9e4d27dbb6725659,2024-08-22T12:48:02.790000 +CVE-2024-41572,0,1,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000 CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000 -CVE-2024-41599,0,1,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000 +CVE-2024-41599,0,0,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000 CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000 -CVE-2024-41600,0,1,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000 +CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000 CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000 CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000 CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000 @@ -257236,8 +257238,8 @@ CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975 CVE-2024-41700,0,0,3462462fad0fddef375740da32d232c879628b29f2cdae5057660af90196a0e0,2024-08-20T15:44:20.567000 CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000 CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000 -CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000 -CVE-2024-41704,0,0,859a0932f984f671cffc12a925924b508ad9d462f16bdea412375c597ddcb036,2024-08-01T13:59:06.900000 +CVE-2024-41703,0,1,cf5695a5bf98c8d2693a5d1ac0fe1e0e7a87ab2451cdb300ec7fae87f74f10dc,2024-08-22T21:15:16.903000 +CVE-2024-41704,0,1,2bc018b99d38a9eaaef3e278b3999e228c9f0ef28a260142aea13990cbc48962,2024-08-22T21:15:17.050000 CVE-2024-41705,0,0,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000 CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f08765e,2024-08-01T13:59:08.790000 CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000 @@ -257700,6 +257702,7 @@ CVE-2024-42400,0,0,e23fa86955810ac61993a53dac28992470f4d4df1a643f460294725e3f989 CVE-2024-42408,0,0,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 CVE-2024-42411,0,0,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000 +CVE-2024-42418,1,1,ed1a91e2514a20155cb45746dd2dd22745796ef58e5d081f231343d5c83982e8,2024-08-22T20:15:09.470000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 CVE-2024-42434,0,0,9a2fab3c0bfcfe26ad4bc7e023423fbf9916073a1831f3237f47ba85a53a41b9,2024-08-14T17:49:14.177000 @@ -257799,7 +257802,8 @@ CVE-2024-42583,0,0,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c13 CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000 CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000 CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000 -CVE-2024-42598,0,1,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000 +CVE-2024-42598,0,0,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000 +CVE-2024-42599,1,1,af0c7758e4fae58f5f3fab3c39c9fe73a105a9457488ef47408afb1c1cb07d8a,2024-08-22T20:15:09.730000 CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000 CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000 @@ -257871,21 +257875,24 @@ CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d0 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 -CVE-2024-42767,1,1,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000 -CVE-2024-42768,0,1,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000 -CVE-2024-42769,0,1,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000 +CVE-2024-42761,1,1,42f4d93a23e5ceb7589a0a0a994eda8177750c796c64d1251492a032ce0c4fe4,2024-08-22T21:15:17.193000 +CVE-2024-42762,1,1,692b7e241af803e71a0199e9e1e9d231aedd9ddb0d50fcdbd1087b56440a7a53,2024-08-22T21:15:17.293000 +CVE-2024-42763,1,1,735e3da39deff34346e84ecd6fa3b45243704f42eb840457ded8ef73e6d196c6,2024-08-22T21:15:17.380000 +CVE-2024-42767,0,0,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000 +CVE-2024-42768,0,0,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000 +CVE-2024-42769,0,0,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 CVE-2024-42770,0,0,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000 -CVE-2024-42771,0,0,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000 -CVE-2024-42772,0,1,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000 -CVE-2024-42773,1,1,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000 -CVE-2024-42774,0,0,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000 -CVE-2024-42775,0,0,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000 -CVE-2024-42776,0,0,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000 +CVE-2024-42771,0,1,8a6776e936284bf431b85500960417f150ea6f356fbe5a41f7e8048c36e3a27c,2024-08-22T20:35:19.220000 +CVE-2024-42772,0,0,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000 +CVE-2024-42773,0,0,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000 +CVE-2024-42774,0,1,d6b497b74223592e0aaadab0ba1724b646e73c13f25cfe2c430987e37aa4b077,2024-08-22T20:35:20.297000 +CVE-2024-42775,0,1,18cbd0d1c764e7cf72a48985672f628f2f56479c5638cf3e733448c67269c381,2024-08-22T20:35:21.223000 +CVE-2024-42776,0,1,0f1b241b50bf4862f737c1887d1ca871138724163a8e58e8e94932d3b2fab0d1,2024-08-22T20:35:22.323000 CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000 CVE-2024-42778,0,0,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000 CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000 -CVE-2024-42780,0,1,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000 +CVE-2024-42780,0,0,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000 CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000 CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000 CVE-2024-42783,0,0,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000 @@ -258253,8 +258260,8 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000 CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000 CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000 -CVE-2024-43853,0,1,36efb4595067b56d7e5fcb48cb087d35edd1df5e2fba303124fad2de2b6dde32,2024-08-22T18:06:38.087000 -CVE-2024-43854,0,1,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000 +CVE-2024-43853,0,0,36efb4595067b56d7e5fcb48cb087d35edd1df5e2fba303124fad2de2b6dde32,2024-08-22T18:06:38.087000 +CVE-2024-43854,0,0,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000 CVE-2024-43855,0,0,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000 CVE-2024-43856,0,0,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000 CVE-2024-43857,0,0,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000 @@ -258406,16 +258413,17 @@ CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000 -CVE-2024-45167,0,0,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000 +CVE-2024-45167,0,1,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000 CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000 CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000 CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000 -CVE-2024-45191,0,0,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000 -CVE-2024-45192,0,1,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000 +CVE-2024-45191,0,1,6e362ad118273f4202bdc6854a76c33f6ead6f18b708e6e6c5e428cb771cc872,2024-08-22T21:35:06.397000 +CVE-2024-45192,0,0,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000 CVE-2024-45193,0,0,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 +CVE-2024-45201,1,1,3beba8e0e0c40151876f7bf97d547955727b1d2b25312099976993b69ba37344,2024-08-22T20:15:10.063000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 @@ -260764,7 +260772,7 @@ CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472 CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000 CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 -CVE-2024-7634,1,1,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000 +CVE-2024-7634,0,0,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000 CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000 CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000 CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000 @@ -260943,14 +260951,14 @@ CVE-2024-7965,0,0,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2d CVE-2024-7966,0,0,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000 CVE-2024-7967,0,0,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000 CVE-2024-7968,0,0,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000 -CVE-2024-7969,0,0,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000 +CVE-2024-7969,0,1,8acea45baac76f5e45d05acf8035608f405ec6038c8af4ab71dabd90619c2144,2024-08-22T20:35:26.473000 CVE-2024-7971,0,0,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000 CVE-2024-7972,0,0,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000 CVE-2024-7973,0,0,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000 CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000 CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000 CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000 -CVE-2024-7977,0,0,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000 +CVE-2024-7977,0,1,7f96e9ae91564fe788773f7fc620ef26ab3a10a3c58ea5396e14a68a3ee2a8b8,2024-08-22T20:35:28.140000 CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000 CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000 CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000 @@ -260967,4 +260975,10 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad CVE-2024-8041,0,0,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000 CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000 CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000 -CVE-2024-8088,1,1,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000 +CVE-2024-8075,1,1,7079b719572b53350db51e194b079bb027ed093b84ca2288274afcc9c61e18e9,2024-08-22T20:15:10.210000 +CVE-2024-8076,1,1,5422ff555378339e3db32bbb4b4a84b33933a93def5de9c6bbe2c92bdf4d6eb0,2024-08-22T20:15:11.017000 +CVE-2024-8077,1,1,dfda6dec69a8c0f0b52ef8c08df76e2bad192b6161a8d6308689618841f71875,2024-08-22T20:15:11.690000 +CVE-2024-8078,1,1,2411dc17166c6e2b6a2c4099cd4a7c0f52610cbc3a42ead6750f7228a1af594b,2024-08-22T21:15:17.603000 +CVE-2024-8079,1,1,4926967e2b3295baddb2321c216aff25029967f573a76b1e6e5c30e67c6da0d4,2024-08-22T21:15:17.910000 +CVE-2024-8080,1,1,b7396789c05f63952d87297908119d6db13570ae1754c0bf6c6b54a52e342c2d,2024-08-22T21:15:18.217000 +CVE-2024-8088,0,0,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000