Auto-Update: 2024-09-11T02:00:17.254709+00:00

This commit is contained in:
cad-safe-bot 2024-09-11 02:03:17 +00:00
parent 89f66dde2c
commit 62fc35d8b6
18 changed files with 329 additions and 21 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38028", "id": "CVE-2022-38028",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.067", "published": "2022-10-11T19:15:15.067",
"lastModified": "2024-05-23T18:12:17.383", "lastModified": "2024-09-11T01:00:01.227",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-04-23", "cisaExploitAdd": "2024-04-23",
"cisaActionDue": "2024-05-14", "cisaActionDue": "2024-05-14",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. ",
"cisaVulnerabilityName": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability ", "cisaVulnerabilityName": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability ",
"descriptions": [ "descriptions": [
{ {

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-23716",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:10.957",
"lastModified": "2024-09-11T00:15:10.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemIntPFNotify of devicemem_server.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-31336",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.023",
"lastModified": "2024-09-11T00:15:11.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "N/A"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38014", "id": "CVE-2024-38014",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-09-10T17:15:20.320", "published": "2024-09-10T17:15:20.320",
"lastModified": "2024-09-10T17:43:14.410", "lastModified": "2024-09-11T01:00:01.227",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-09-10",
"cisaActionDue": "2024-10-01",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Installer Privilege Escalation Vulnerability ",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38217", "id": "CVE-2024-38217",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-09-10T17:15:24.640", "published": "2024-09-10T17:15:24.640",
"lastModified": "2024-09-10T17:43:14.410", "lastModified": "2024-09-11T01:00:01.227",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-09-10",
"cisaActionDue": "2024-10-01",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-38226", "id": "CVE-2024-38226",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-09-10T17:15:25.267", "published": "2024-09-10T17:15:25.267",
"lastModified": "2024-09-10T17:43:14.410", "lastModified": "2024-09-11T01:00:01.227",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-09-10",
"cisaActionDue": "2024-10-01",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Publisher Security Feature Bypass Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40650",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.080",
"lastModified": "2024-09-11T00:15:11.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40652",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.140",
"lastModified": "2024-09-11T00:15:11.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In onCreate of SettingsHomepageActivity.java, there is a possible way to access the Settings app while the device is provisioning due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2909433f7d59dcdd0c74044b1c8e9f48927193dc",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40654",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.190",
"lastModified": "2024-09-11T00:15:11.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/f1d0079c91734168c150f839168544f407b17b06",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40655",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.243",
"lastModified": "2024-09-11T00:15:11.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In bindAndGetCallIdentification of CallScreeningServiceHelper.java, there is a possible way to maintain a while-in-use permission in the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/eeef54b37a362f506ea3aa155baddc545b6a909a",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40656",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.297",
"lastModified": "2024-09-11T00:15:11.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In handleCreateConferenceComplete of ConnectionServiceWrapper.java, there is a possible way to reveal images across users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/f3e6a6c02439401eb7aeb3749ee5ec0b51a625b9",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40657",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.350",
"lastModified": "2024-09-11T00:15:11.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In addPreferencesForType of AccountTypePreferenceLoader.java, there is a possible way to disable apps for other users due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/8261e0ade3b414fea61d7fe9d8bc6df7a3fc8603",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40658",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.397",
"lastModified": "2024-09-11T00:15:11.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In getConfig of SoftVideoDecoderOMXComponent.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/6d23fa05a40e5462d4b9bad28afa932e6e12a4f3",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40659",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.473",
"lastModified": "2024-09-11T00:15:11.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In getRegistration of RemoteProvisioningService.java, there is a possible way to permanently disable the AndroidKeyStore key generation feature by updating the attestation keys of all installed apps due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/RemoteKeyProvisioning/+/c65dce4c6d8d54e47dce79a56e29e2223a2354e6",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40662",
"sourceIdentifier": "security@android.com",
"published": "2024-09-11T00:15:11.530",
"lastModified": "2024-09-11T00:15:11.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/e7af00cafb52a25933ec4edb80c5111d42af0237",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-09-01",
"source": "security@android.com"
}
]
}

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-43491", "id": "CVE-2024-43491",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2024-09-10T17:15:36.427", "published": "2024-09-10T17:15:36.427",
"lastModified": "2024-09-10T17:43:14.410", "lastModified": "2024-09-11T01:00:01.227",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"cisaExploitAdd": "2024-09-10",
"cisaActionDue": "2024-10-01",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Update Remote Code Execution Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-09-10T23:55:17.317120+00:00 2024-09-11T02:00:17.254709+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-09-10T22:15:01.967000+00:00 2024-09-11T01:00:01.227000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,27 +27,41 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2024-09-10T00:00:08.658600+00:00 2024-09-11T00:00:08.654090+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
262484 262495
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `1` Recently added CVEs: `11`
- [CVE-2024-45597](CVE-2024/CVE-2024-455xx/CVE-2024-45597.json) (`2024-09-10T22:15:01.967`) - [CVE-2024-23716](CVE-2024/CVE-2024-237xx/CVE-2024-23716.json) (`2024-09-11T00:15:10.957`)
- [CVE-2024-31336](CVE-2024/CVE-2024-313xx/CVE-2024-31336.json) (`2024-09-11T00:15:11.023`)
- [CVE-2024-40650](CVE-2024/CVE-2024-406xx/CVE-2024-40650.json) (`2024-09-11T00:15:11.080`)
- [CVE-2024-40652](CVE-2024/CVE-2024-406xx/CVE-2024-40652.json) (`2024-09-11T00:15:11.140`)
- [CVE-2024-40654](CVE-2024/CVE-2024-406xx/CVE-2024-40654.json) (`2024-09-11T00:15:11.190`)
- [CVE-2024-40655](CVE-2024/CVE-2024-406xx/CVE-2024-40655.json) (`2024-09-11T00:15:11.243`)
- [CVE-2024-40656](CVE-2024/CVE-2024-406xx/CVE-2024-40656.json) (`2024-09-11T00:15:11.297`)
- [CVE-2024-40657](CVE-2024/CVE-2024-406xx/CVE-2024-40657.json) (`2024-09-11T00:15:11.350`)
- [CVE-2024-40658](CVE-2024/CVE-2024-406xx/CVE-2024-40658.json) (`2024-09-11T00:15:11.397`)
- [CVE-2024-40659](CVE-2024/CVE-2024-406xx/CVE-2024-40659.json) (`2024-09-11T00:15:11.473`)
- [CVE-2024-40662](CVE-2024/CVE-2024-406xx/CVE-2024-40662.json) (`2024-09-11T00:15:11.530`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `5`
- [CVE-2024-44815](CVE-2024/CVE-2024-448xx/CVE-2024-44815.json) (`2024-09-10T22:15:01.887`) - [CVE-2022-38028](CVE-2022/CVE-2022-380xx/CVE-2022-38028.json) (`2024-09-11T01:00:01.227`)
- [CVE-2024-38014](CVE-2024/CVE-2024-380xx/CVE-2024-38014.json) (`2024-09-11T01:00:01.227`)
- [CVE-2024-38217](CVE-2024/CVE-2024-382xx/CVE-2024-38217.json) (`2024-09-11T01:00:01.227`)
- [CVE-2024-38226](CVE-2024/CVE-2024-382xx/CVE-2024-38226.json) (`2024-09-11T01:00:01.227`)
- [CVE-2024-43491](CVE-2024/CVE-2024-434xx/CVE-2024-43491.json) (`2024-09-11T01:00:01.227`)
## Download and Usage ## Download and Usage

View File

@ -204450,7 +204450,7 @@ CVE-2022-38023,0,0,3c55fb453594178da8ba3d482f340896fae4490b4eba1e34874712902c89f
CVE-2022-38025,0,0,e444a61476717e2b1cbf74d4e18d9470c831462ecac7f56c5c3508bd3dc05db1,2023-12-20T20:15:15.140000 CVE-2022-38025,0,0,e444a61476717e2b1cbf74d4e18d9470c831462ecac7f56c5c3508bd3dc05db1,2023-12-20T20:15:15.140000
CVE-2022-38026,0,0,17d48edb2f4ddfe5ccb255236af59ca6c8a00681f205604b06d2114d05d8f4e7,2023-12-20T20:15:15.233000 CVE-2022-38026,0,0,17d48edb2f4ddfe5ccb255236af59ca6c8a00681f205604b06d2114d05d8f4e7,2023-12-20T20:15:15.233000
CVE-2022-38027,0,0,28af1db49fff74aadb41ab8af1bef1e42a511868bf0a0e33242cb178f2773950,2023-12-20T20:15:15.317000 CVE-2022-38027,0,0,28af1db49fff74aadb41ab8af1bef1e42a511868bf0a0e33242cb178f2773950,2023-12-20T20:15:15.317000
CVE-2022-38028,0,0,6a7b03a9a682d89dc6c5133fa141e7d824b7a14e545aad0777c64c3e1a767880,2024-05-23T18:12:17.383000 CVE-2022-38028,0,1,806b613a093e30647e8a5b34faa40d4e0ca0e0e9b8fa7551e1e0ba5979484d0c,2024-09-11T01:00:01.227000
CVE-2022-38029,0,0,19c79c2bbf5f2b397403292eead58b25e6e0a2ca37f9a9ce9c47417d4c06018b,2023-12-20T20:15:15.500000 CVE-2022-38029,0,0,19c79c2bbf5f2b397403292eead58b25e6e0a2ca37f9a9ce9c47417d4c06018b,2023-12-20T20:15:15.500000
CVE-2022-3803,0,0,ea976c3de717c67220c17a3ddaaa9b7e6b2ab0a31a0013625682fa57c546821c,2023-11-07T03:51:49.163000 CVE-2022-3803,0,0,ea976c3de717c67220c17a3ddaaa9b7e6b2ab0a31a0013625682fa57c546821c,2023-11-07T03:51:49.163000
CVE-2022-38030,0,0,270a35ba92b2646f610e305ab17b3543230d0c4f1479eb0dc3932296d87c7d18,2023-12-20T20:15:15.607000 CVE-2022-38030,0,0,270a35ba92b2646f610e305ab17b3543230d0c4f1479eb0dc3932296d87c7d18,2023-12-20T20:15:15.607000
@ -245543,6 +245543,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23716,1,1,4870aa8d7e96af13639b3139c8954733bf6a51589bc92bbb98e03b251a456704,2024-09-11T00:15:10.957000
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000 CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
@ -250932,6 +250933,7 @@ CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee
CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000 CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
CVE-2024-31336,1,1,ab364778351ba44b09e40898f8aaedd5cff82dfc1cf2679ed07b7f78b86451c2,2024-09-11T00:15:11.023000
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000
CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000
@ -255507,7 +255509,7 @@ CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a55
CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000 CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000
CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000 CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000
CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000 CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000
CVE-2024-38014,0,0,c3e6ceb0cee7e45f36bbca81f1d791775a74c6c328369f53b3a2bdd397fd846a,2024-09-10T17:43:14.410000 CVE-2024-38014,0,1,a658ae199e48d2216317c144ccf10e7616d6bd48992ccbcebbc19089557cd8ab,2024-09-11T01:00:01.227000
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000 CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000 CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
CVE-2024-38018,0,0,bbdc2dca451b5fddb37db9148885748272e887a947585b5768d3e4d030d44598,2024-09-10T17:43:14.410000 CVE-2024-38018,0,0,bbdc2dca451b5fddb37db9148885748272e887a947585b5768d3e4d030d44598,2024-09-10T17:43:14.410000
@ -255698,14 +255700,14 @@ CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000 CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000 CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000
CVE-2024-38216,0,0,9da2da64d36518c00c753f25b7c81a7149247eb0c35b8e9c2ae5ff39bc571f48,2024-09-10T17:43:14.410000 CVE-2024-38216,0,0,9da2da64d36518c00c753f25b7c81a7149247eb0c35b8e9c2ae5ff39bc571f48,2024-09-10T17:43:14.410000
CVE-2024-38217,0,0,d5a07a8fd54570e3967449a8db55247994bf5c989a9355915c502d537c8a25e1,2024-09-10T17:43:14.410000 CVE-2024-38217,0,1,75ac49419ed3491570ad07f1f323d76f6a627cd3e912f32a42f83c2ddb257522,2024-09-11T01:00:01.227000
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000 CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000 CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
CVE-2024-38220,0,0,75d1d2b4a4c084fa7a781cee5622397ece32cf08d890075be7f73458ef7b79aa,2024-09-10T17:43:14.410000 CVE-2024-38220,0,0,75d1d2b4a4c084fa7a781cee5622397ece32cf08d890075be7f73458ef7b79aa,2024-09-10T17:43:14.410000
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000 CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
CVE-2024-38225,0,0,9fef32ff53f02aa8c1358c50b31033ff2c3e33337edda025b0788ca47e24a0a2,2024-09-10T17:43:14.410000 CVE-2024-38225,0,0,9fef32ff53f02aa8c1358c50b31033ff2c3e33337edda025b0788ca47e24a0a2,2024-09-10T17:43:14.410000
CVE-2024-38226,0,0,5a7f89424ec93f1635617e83d43b6115a2df7d5cc79a20b6324717b6eaa61c87,2024-09-10T17:43:14.410000 CVE-2024-38226,0,1,b80d7c4f16019e718fdbddac08e8c534174dc43f77e8a3ab178af67b7f4fb444,2024-09-11T01:00:01.227000
CVE-2024-38227,0,0,530a8714fe4c2026ef544b351c789cbbe0c690cb06ac9afdae49238280f9af62,2024-09-10T17:43:14.410000 CVE-2024-38227,0,0,530a8714fe4c2026ef544b351c789cbbe0c690cb06ac9afdae49238280f9af62,2024-09-10T17:43:14.410000
CVE-2024-38228,0,0,ecd2eb588a86b904449a792d5d4a07ad323dee48eae1e800a6b0ff7710362f8d,2024-09-10T17:43:14.410000 CVE-2024-38228,0,0,ecd2eb588a86b904449a792d5d4a07ad323dee48eae1e800a6b0ff7710362f8d,2024-09-10T17:43:14.410000
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
@ -257048,7 +257050,16 @@ CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
CVE-2024-40650,1,1,6c3cc80f92519f70e36bf62879dd89773ca40a8f4f88db859b5428090ebf6be3,2024-09-11T00:15:11.080000
CVE-2024-40652,1,1,860ac8d35bd15da5b571f64f908c53ccc1c0ff1f627ae6d53990c5c2f4da927a,2024-09-11T00:15:11.140000
CVE-2024-40654,1,1,e20287e242febf3bfccfca4af8584f54393a91f8229966ebc86c9f93f22581fc,2024-09-11T00:15:11.190000
CVE-2024-40655,1,1,e5264766c0bc5631ab0fab58e4e9d3f401655fb7b4ab7ae611fdc04d0b58a2c1,2024-09-11T00:15:11.243000
CVE-2024-40656,1,1,91dad1272b865456a277c18007f24c8eff550f80b64e662feef3d6d4f3b1cee9,2024-09-11T00:15:11.297000
CVE-2024-40657,1,1,31a9d1d329d9e7c72fb1f802001487d4822a2a62530a35c918857821ba29ce14,2024-09-11T00:15:11.350000
CVE-2024-40658,1,1,9659c26fdc7cd4a3b7e04317ee07d27c758624ea2c232c3eb1bedd4c8919ab50,2024-09-11T00:15:11.397000
CVE-2024-40659,1,1,c757b258e14bab6f1cecaf94d0d3ec601cef0380e96d2358fb048812859bc662,2024-09-11T00:15:11.473000
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
CVE-2024-40662,1,1,6c8a297d3472954b37409b1473b4d0951c03fd3d2e5ad981778a67c4dcf035cb,2024-09-11T00:15:11.530000
CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000
CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000
CVE-2024-40680,0,0,41ab7b70c7ee12d084f1da220538cd376d47c73295a5e0bc20c807a666a18193,2024-09-09T13:03:38.303000 CVE-2024-40680,0,0,41ab7b70c7ee12d084f1da220538cd376d47c73295a5e0bc20c807a666a18193,2024-09-09T13:03:38.303000
@ -258770,7 +258781,7 @@ CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69
CVE-2024-43482,0,0,6e7c134aa469a60e780cabf13e44734b4c5f233def960d877a7b1678a97c618a,2024-09-10T17:43:14.410000 CVE-2024-43482,0,0,6e7c134aa469a60e780cabf13e44734b4c5f233def960d877a7b1678a97c618a,2024-09-10T17:43:14.410000
CVE-2024-43487,0,0,dea08ba1cfb3ff23b9368f43188bc90a9104601ab6b01d42181bcb8180caaef5,2024-09-10T17:43:14.410000 CVE-2024-43487,0,0,dea08ba1cfb3ff23b9368f43188bc90a9104601ab6b01d42181bcb8180caaef5,2024-09-10T17:43:14.410000
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
CVE-2024-43491,0,0,0beeb74a14e123341dd31104956dca431c35ed8971f77a61809e5e01fb39c656,2024-09-10T17:43:14.410000 CVE-2024-43491,0,1,09bd1dfd917904b61d404a3b1070a3481f2dbae5f8c211d599a6ebbbe646cff8,2024-09-11T01:00:01.227000
CVE-2024-43492,0,0,3dd12071c651e27e40ec4fb50ba07efcfac4fe4f70a8035620f06f9e51f7d211,2024-09-10T17:43:14.410000 CVE-2024-43492,0,0,3dd12071c651e27e40ec4fb50ba07efcfac4fe4f70a8035620f06f9e51f7d211,2024-09-10T17:43:14.410000
CVE-2024-43495,0,0,4562605b4a917b204e73ac08fedfd131430061e6ccf42153383db64c34a941ba,2024-09-10T17:43:14.410000 CVE-2024-43495,0,0,4562605b4a917b204e73ac08fedfd131430061e6ccf42153383db64c34a941ba,2024-09-10T17:43:14.410000
CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000
@ -259144,7 +259155,7 @@ CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d851461723
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
CVE-2024-44815,0,1,5cef67b7d65dcd183a4c302efb8cfcc48239537dffc219b3742868dc85124b61,2024-09-10T22:15:01.887000 CVE-2024-44815,0,0,5cef67b7d65dcd183a4c302efb8cfcc48239537dffc219b3742868dc85124b61,2024-09-10T22:15:01.887000
CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000 CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000
CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000 CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000
CVE-2024-44819,0,0,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8acc,2024-09-05T14:40:07.637000 CVE-2024-44819,0,0,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8acc,2024-09-05T14:40:07.637000
@ -259485,7 +259496,7 @@ CVE-2024-45592,0,0,a6da3331dabbde48afc9c09a6ca7109ae4814f4878288894284237183ee05
CVE-2024-45593,0,0,b530ea022f2e8e4aa156129a75961f9228743d411d4a1930e0d44cdca74a998e,2024-09-10T17:43:14.410000 CVE-2024-45593,0,0,b530ea022f2e8e4aa156129a75961f9228743d411d4a1930e0d44cdca74a998e,2024-09-10T17:43:14.410000
CVE-2024-45595,0,0,649b5475221eb6226048e280295a64f14525c165ac46abdbd9b86d52afbd2a88,2024-09-10T17:43:14.410000 CVE-2024-45595,0,0,649b5475221eb6226048e280295a64f14525c165ac46abdbd9b86d52afbd2a88,2024-09-10T17:43:14.410000
CVE-2024-45596,0,0,45821d3632755e50b9567a02008899ce310b65562369c77277b373a6169d2af1,2024-09-10T19:15:22.303000 CVE-2024-45596,0,0,45821d3632755e50b9567a02008899ce310b65562369c77277b373a6169d2af1,2024-09-10T19:15:22.303000
CVE-2024-45597,1,1,1d2481fc071ab72c04aeb3b4234c6b552f5038c15de12e28a47ec5c90364e670,2024-09-10T22:15:01.967000 CVE-2024-45597,0,0,1d2481fc071ab72c04aeb3b4234c6b552f5038c15de12e28a47ec5c90364e670,2024-09-10T22:15:01.967000
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000 CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-45615,0,0,b9c937a8f973f4733b0499e8694ffb8f8660ef2ac78b4a4d6df66b1c171491cf,2024-09-04T18:15:05.377000 CVE-2024-45615,0,0,b9c937a8f973f4733b0499e8694ffb8f8660ef2ac78b4a4d6df66b1c171491cf,2024-09-04T18:15:05.377000

Can't render this file because it is too large.