Auto-Update: 2024-08-28T18:00:18.030891+00:00

This commit is contained in:
cad-safe-bot 2024-08-28 18:03:16 +00:00
parent 6c7e0e1705
commit 632168d8cf
75 changed files with 3037 additions and 563 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-9842",
"sourceIdentifier": "security@opentext.com",
"published": "2017-05-23T04:29:01.837",
"lastModified": "2023-11-07T02:37:36.463",
"vulnStatus": "Modified",
"lastModified": "2024-08-28T16:07:50.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,10 +85,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:zlib:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.3.4",
"versionEndExcluding": "1.2.9",
"matchCriteriaId": "27DBF1B3-EBCE-4F4E-A83C-98DFE157D524"
"matchCriteriaId": "018FE9CE-4D44-4A7D-90DB-A2B1953B5B7F"
}
]
}
@ -147,8 +147,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
}
]
}
@ -366,123 +366,221 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2016/12/05/21",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/95131",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1039427",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1220",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1221",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1222",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2999",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3046",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3047",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3453",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201701-56",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202007-54",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/HT208112",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/HT208113",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/HT208115",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/HT208144",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4246-1/",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4292-1/",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-25099",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T05:15:06.007",
"lastModified": "2024-03-18T12:38:25.490",
"lastModified": "2024-08-28T16:35:00.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el m\u00f3dulo CryptX anterior a 0.062 para Perl, gcm_decrypt_verify() y chacha20poly1305_decrypt_verify() no verifican la etiqueta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/DCIT/perl-CryptX/issues/47",

View File

@ -2,13 +2,13 @@
"id": "CVE-2019-19824",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-27T18:15:12.960",
"lastModified": "2020-02-05T14:30:22.743",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T16:15:07.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0."
"value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2."
},
{
"lang": "es",
@ -330,6 +330,10 @@
"Third Party Advisory"
]
},
{
"url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities",
"source": "cve@mitre.org"
},
{
"url": "https://sploit.tech",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-12615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T13:15:06.820",
"lastModified": "2023-12-15T16:04:51.323",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T17:35:00.743",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1498",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T20:15:19.280",
"lastModified": "2024-05-17T02:18:10.733",
"lastModified": "2024-08-28T17:20:31.837",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -101,8 +101,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:responsive_hotel_site_project:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6725818B-1AEC-4448-B8F4-02078ADD04FD"
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42860",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:49.827",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-28T16:35:01.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213983",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48406",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-12-08T16:15:17.783",
"lastModified": "2024-03-12T21:15:56.447",
"lastModified": "2024-08-28T16:35:03.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49468",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T20:15:38.477",
"lastModified": "2023-12-30T21:15:44.010",
"lastModified": "2024-08-28T17:35:02.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7017",
"sourceIdentifier": "cret@cert.org",
"published": "2024-03-15T17:15:07.857",
"lastModified": "2024-03-17T22:38:29.433",
"lastModified": "2024-08-28T17:35:03.137",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El mecanismo de actualizaci\u00f3n de firmware de las cerraduras Sciener no autentica ni valida las actualizaciones de firmware si se pasan a la cerradura a trav\u00e9s del servicio Bluetooth Low Energy. Se puede enviar una solicitud de desaf\u00edo a la cerradura con un comando para prepararse para una actualizaci\u00f3n, en lugar de una solicitud de desbloqueo, lo que permite a un atacante comprometer el dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7085",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-03-18T19:15:06.160",
"lastModified": "2024-03-18T19:40:00.173",
"lastModified": "2024-08-28T16:35:05.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Scalable Vector Graphics (SVG) de WordPress hasta la versi\u00f3n 3.4 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/a2ec1308-75a0-49d0-9288-33c6d9ee4328/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7167",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-27T09:15:37.293",
"lastModified": "2024-02-27T14:20:06.637",
"lastModified": "2024-08-28T16:35:05.563",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Persian Fonts de WordPress hasta la versi\u00f3n 1.6 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/6a2eb871-6b6e-4dbb-99f0-dd74d6c61e83/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0015",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T19:15:08.153",
"lastModified": "2024-02-16T19:26:55.393",
"lastModified": "2024-08-28T17:35:03.353",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En convertToComponentName de DreamService.java, existe una forma posible de iniciar actividades protegidas arbitrarias debido a la redirecci\u00f3n de intenci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n del usuario necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0973",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-03-18T19:15:06.620",
"lastModified": "2024-03-18T19:40:00.173",
"lastModified": "2024-08-28T16:35:06.353",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Widget for Social Page Feeds de WordPress anterior a 6.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1273",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-03-11T18:15:17.900",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-08-28T16:35:07.013",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Starbox de WordPress anterior a 3.5.0 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a usuarios con un rol tan bajo como Colaborador realizar ataques de cross-site scripting"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1316",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-03-04T21:15:07.007",
"lastModified": "2024-03-05T13:41:01.900",
"lastModified": "2024-08-28T16:35:07.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Event Tickets and Registration de WordPress anterior a 5.8.1, el complemento Events Tickets Plus de WordPress anterior a 5.9.1 no impide que los usuarios con al menos el rol de colaborador filtren la existencia de ciertos eventos a los que no deber\u00edan tener acceso. (por ejemplo, eventos borrador, privados, pendientes de revisi\u00f3n, protegidos por contrase\u00f1a y eliminados)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1331",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-03-18T16:15:07.103",
"lastModified": "2024-03-18T19:40:00.173",
"lastModified": "2024-08-28T16:35:07.437",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Team Members de WordPress anterior a 5.3.2 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de autor y superior realizar un ataque de Cross-Site Scripting Almacenado"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20279",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:06.113",
"lastModified": "2024-08-28T17:15:06.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-cousmo-uBpBYGbq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-20284",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:06.893",
"lastModified": "2024-08-28T17:15:06.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
"source": "ykramarz@cisco.com"
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-20285",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:07.687",
"lastModified": "2024-08-28T17:15:07.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-653"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
"source": "ykramarz@cisco.com"
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-20286",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:08.400",
"lastModified": "2024-08-28T17:15:08.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
"source": "ykramarz@cisco.com"
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20289",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:09.117",
"lastModified": "2024-08-28T17:15:09.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device. \r\n\r\nThis vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-Lq6jsZhH",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20411",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:09.500",
"lastModified": "2024-08-28T17:15:09.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to execute arbitrary code as root on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-267"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20413",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:09.763",
"lastModified": "2024-08-28T17:15:09.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to elevate privileges to network-admin on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing application arguments from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to create new users with the privileges of network-admin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20446",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:09.997",
"lastModified": "2024-08-28T17:15:09.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20478",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-08-28T17:15:10.220",
"lastModified": "2024-08-28T17:15:10.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system.\r\n\r\nThis vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root.\r\nNote: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-priv-esc-uYQJjnuU",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21132",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.403",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T17:40:31.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
@ -39,10 +59,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:purchasing:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.13",
"matchCriteriaId": "56D8188F-3203-4D0C-B8BB-5AD9020359B5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21136",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.243",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T17:59:36.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,62 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:19.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3207145B-91F6-4785-BAE4-D0A195B422AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:20.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B59C3D5-61A4-468C-B5CC-4A6ED0BBEA8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:20.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C70D2D6A-98BE-4971-B8B2-AD478663EDD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:22.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F21BF7-051C-4D63-B301-AFA43DC5D1E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:23.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "18FD36BE-B692-498A-AF47-8C18A7B708D4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21141",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.230",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T17:58:43.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.20",
"matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21148",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.590",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:56:18.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
@ -39,10 +59,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.13",
"matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21161",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.930",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T17:00:38.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.20",
"matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21164",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.490",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T17:00:58.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.20",
"matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21165",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:19.700",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:43:23.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndIncluding": "8.0.37",
"matchCriteriaId": "6251DC2A-53C2-4FBF-9EC1-CAF0C7893F1E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21682",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-02-20T18:15:51.063",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-08-28T16:35:07.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://confluence.atlassian.com/assetapps/assets-discovery-3-2-1-cloud-6-2-1-data_center-1333987182.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23244",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.243",
"lastModified": "2024-03-13T23:15:46.480",
"lastModified": "2024-08-28T16:35:08.747",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Se abord\u00f3 un problema de l\u00f3gica con restricciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4. Una aplicaci\u00f3n de una cuenta de usuario est\u00e1ndar puede escalar privilegios despu\u00e9s de iniciar sesi\u00f3n como usuario administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23276",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.557",
"lastModified": "2024-03-14T20:34:18.527",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T16:35:09.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23288",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:50.070",
"lastModified": "2024-03-13T22:15:11.173",
"lastModified": "2024-08-28T16:35:09.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en tvOS 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24043",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T07:15:09.517",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-08-28T16:35:09.730",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24155",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:44:11.810",
"lastModified": "2024-02-29T13:49:29.390",
"lastModified": "2024-08-28T16:35:10.447",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Bento4 v1.5.1-628 contiene una p\u00e9rdida de memoria en AP4_Movie::AP4_Movie, analizando pistas y agreg\u00e1ndolas a la lista m_Tracks, pero mp42aac no puede eliminarse correctamente cuando recibimos un error de no encontrar pista de audio. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo mp4 manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/919",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24323",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-27T17:15:12.103",
"lastModified": "2024-02-28T14:06:45.783",
"lastModified": "2024-08-28T16:35:11.253",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en linlinjava litemall v.1.8.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros apodo, consignatario, orderSN, orderStatusArray del componente AdminOrdercontroller.java."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/lousix/exp/blob/main/CVE-2024-24323/CVE-2024-24323.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24328",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T15:15:09.487",
"lastModified": "2024-02-01T04:49:21.037",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-28T16:35:12.420",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25083",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T21:15:08.260",
"lastModified": "2024-02-16T21:39:50.223",
"lastModified": "2024-08-28T16:35:13.370",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25579",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-28T23:15:09.660",
"lastModified": "2024-06-12T01:15:49.137",
"lastModified": "2024-08-28T16:35:14.267",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en enrutadores LAN inal\u00e1mbricos ELECOM permite que un atacante adyacente a la red con privilegios administrativos ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU99444194/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25655",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T20:15:08.917",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-08-28T16:35:15.510",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El almacenamiento inseguro de contrase\u00f1as LDAP en la funcionalidad de autenticaci\u00f3n de AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS permite a los miembros (con acceso de lectura a la base de datos de la aplicaci\u00f3n) descifrar las contrase\u00f1as LDAP de los usuarios que se autentican exitosamente en la administraci\u00f3n web a trav\u00e9s de LDAP."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25655",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25859",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T20:15:41.900",
"lastModified": "2024-02-29T13:49:47.277",
"lastModified": "2024-08-28T16:35:16.347",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de path traversal en el directorio /path/to/uploads/ de Blesta anterior a v5.9.2 permite a los atacantes apoderarse de cuentas de usuarios y ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.blesta.com/2024/02/08/security-advisory/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25866",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T22:15:26.573",
"lastModified": "2024-02-29T13:49:47.277",
"lastModified": "2024-08-28T16:35:17.133",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en CodeAstro Membership Management System en PHP v.1.0 permite a un atacante remoto ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro email en el componente index.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26470",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:44:18.927",
"lastModified": "2024-02-29T13:49:29.390",
"lastModified": "2024-08-28T16:35:18.190",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en la funci\u00f3n de contrase\u00f1a olvidada de WebAPI Boilerplate v1.0.0 y v1.0.1 de FullStackHero permite a los atacantes filtrar el token de restablecimiento de contrase\u00f1a a trav\u00e9s de una solicitud manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28125",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T08:15:06.347",
"lastModified": "2024-03-18T12:38:25.490",
"lastModified": "2024-08-28T16:35:19.333",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Todas las versiones de FitNesse permiten que un atacante remoto autenticado ejecute comandos arbitrarios del sistema operativo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "http://fitnesse.org/FitNesseDownload",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28537",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T14:15:09.960",
"lastModified": "2024-03-18T19:40:00.173",
"lastModified": "2024-08-28T16:35:20.337",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromNatStaticSetting."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28640",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-16T06:15:14.613",
"lastModified": "2024-03-17T22:38:29.433",
"lastModified": "2024-08-28T16:35:21.193",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en TOTOLink X5000R V9.1.0u.6118-B20201102 y A7000R V9.1.0u.6115-B20201022 permite a un atacante remoto provocar una denegaci\u00f3n de servicio (D0S) a trav\u00e9s del campo de comando."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-34087",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-26T16:15:08.507",
"lastModified": "2024-08-26T19:10:18.890",
"lastModified": "2024-08-28T16:35:22.590",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer basado en SEH en el servidor HTTP BPQ32 en BPQ32 6.0.24.1 permite a atacantes remotos con acceso a la terminal web lograr la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una solicitud HTTP POST /TermInput."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://groups.io/g/bpq32",

View File

@ -2,85 +2,15 @@
"id": "CVE-2024-35325",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T17:15:50.390",
"lastModified": "2024-08-28T14:15:08.433",
"vulnStatus": "Modified",
"lastModified": "2024-08-28T16:15:08.417",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en libyaml hasta 0.2.5. La funci\u00f3n yaml_event_delete del archivo /src/libyaml/src/api.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una doble libertad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pyyaml:libyaml:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.2.5",
"matchCriteriaId": "2EC679D8-115E-4170-8038-0BCB93DFE1BA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/idhyt/pocs/tree/main/libyaml",
"source": "cve@mitre.org"
}
]
"metrics": {},
"references": []
}

View File

@ -2,99 +2,15 @@
"id": "CVE-2024-35326",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T17:15:50.490",
"lastModified": "2024-08-28T15:15:16.590",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2024-08-28T16:15:08.740",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call all of the required _initialize functions that are described in the LibYAML documentation."
},
{
"lang": "es",
"value": "libyaml v0.2.5 es vulnerable al desbordamiento de b\u00fafer. La funci\u00f3n yaml_emitter_emit del archivo /src/libyaml/src/emitter.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una doble libertad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/idhyt/pocs/tree/main/libyaml",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yaml/libyaml/issues/298",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yaml/libyaml/issues/302",
"source": "cve@mitre.org"
}
]
"metrics": {},
"references": []
}

View File

@ -2,90 +2,15 @@
"id": "CVE-2024-35328",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T16:15:11.037",
"lastModified": "2024-08-28T15:15:16.750",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2024-08-28T16:15:08.863",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libyaml v0.2.5 is vulnerable to a denial of service. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call required _initialize functions that are described in the LibYAML documentation."
},
{
"lang": "es",
"value": "libyaml v0.2.5 es vulnerable a DDOS. La funci\u00f3n yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/idhyt/pocs/tree/main/libyaml",
"source": "cve@mitre.org"
}
]
"metrics": {},
"references": []
}

View File

@ -2,35 +2,15 @@
"id": "CVE-2024-35329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-11T05:15:53.533",
"lastModified": "2024-08-02T03:15:51.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2024-08-28T16:15:08.980",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions."
},
{
"lang": "es",
"value": "libyaml 0.2.5 es vulnerable a un desbordamiento de b\u00fafer basado en mont\u00f3n en yaml_document_add_sequence en api.c."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yaml/libyaml/releases/tag/0.2.5",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38856",
"sourceIdentifier": "security@apache.org",
"published": "2024-08-05T09:15:56.780",
"lastModified": "2024-08-28T01:00:00.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T16:15:58.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-27",
"cisaActionDue": "2024-09-17",
@ -21,6 +21,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -55,22 +75,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.12.15",
"matchCriteriaId": "445F4EEE-8237-47E4-AB1C-729659C36A57"
}
]
}
]
}
],
"references": [
{
"url": "https://issues.apache.org/jira/browse/OFBIZ-13128",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://ofbiz.apache.org/download.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Product"
]
},
{
"url": "https://ofbiz.apache.org/security.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39930",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-04T16:15:02.277",
"lastModified": "2024-08-12T19:35:09.940",
"lastModified": "2024-08-28T16:15:09.077",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "cve@mitre.org"
},
{
"url": "https://www.vicarius.io/vsociety/posts/argument-injection-in-gogs-ssh-server-cve-2024-39930",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-3980",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.210",
"lastModified": "2024-08-27T15:52:01.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:32:20.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The product allows user input to control or influence paths or file\nnames that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are\ncritical to the application."
},
{
"lang": "es",
"value": "El producto permite que el usuario controle o influya en las rutas o nombres de archivos que se utilizan en las operaciones del sistema de archivos, lo que permite al atacante acceder o modificar archivos del sistema u otros archivos que son cr\u00edticos para la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
}
]
}
]
}
],
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@hitachienergy.com"
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-3982",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.557",
"lastModified": "2024-08-27T15:52:01.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:30:50.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker with local access to machine where MicroSCADA X\nSYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level\nis not enabled and only users with administrator rights can enable it."
},
{
"lang": "es",
"value": "Un atacante con acceso local a la m\u00e1quina donde est\u00e1 instalado MicroSCADA X SYS600, podr\u00eda habilitar el registro de sesiones que soporta el producto e intentar explotar un secuestro de sesi\u00f3n de una sesi\u00f3n ya establecida. De forma predeterminada, el nivel de registro de sesi\u00f3n no est\u00e1 habilitado y solo los usuarios con derechos de administrador pueden habilitarlo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-294"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
}
]
}
]
}
],
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@hitachienergy.com"
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41310",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-02T17:16:38.763",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T17:42:01.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "AndServer 2.1.12 es vulnerable a Directory Traversal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yanzhenjie:andserver:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.12",
"matchCriteriaId": "2CB0C220-D4E7-4805-9121-39E85B6E16A4"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Gppp23333/f915655ff17df9a0fd1d92e3e2096cb9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-41564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T17:15:10.693",
"lastModified": "2024-08-28T17:15:10.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EMI v.1.1.10 and before, fixed in v.1.1.11, contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in EMI mod for Minecraft, which allows in-game item duplication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://gist.github.com/apple502j/6d691b62c37fc37b03b0784917064df6",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/emilyploszaj/emi/blob/1.21/xplat/src/main/java/dev/emi/emi/network/FillRecipeC2SPacket.java",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-41565",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T17:15:10.903",
"lastModified": "2024-08-28T17:15:10.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JustEnoughItems (JEI) 19.5.0.33 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index in JEI for Minecraft, which allows in-game item duplication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://gist.github.com/apple502j/05123abb1d1c89c31afde15a9b34e2ae",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mezz/JustEnoughItems/commit/99ff43ba1009c44c6d935e2ab8a6c9292bb12873",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41657",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-20T21:15:13.687",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T16:13:35.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-697"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B75F3C-3552-48E9-87F8-B34056AA5A5E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/casdoor/casdoor/blob/v1.577.0/routers/cors_filter.go#L45",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41658",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-20T21:15:13.910",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-28T16:08:31.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B75F3C-3552-48E9-87F8-B34056AA5A5E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/casdoor/casdoor/blob/v1.577.0/web/src/QrCodePage.js",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-42698",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T16:15:09.210",
"lastModified": "2024-08-28T16:15:09.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Roughly Enough Items (REI) v.16.0.729 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in the Roughly Enough Items (REI) mod for Minecraft, which allows in-game item duplication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://gist.github.com/apple502j/7b1af0082449c9bfbf910e9a25ef3595",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/shedaniel/RoughlyEnoughItems/commit/e80ca84f1affb91d2388ddb298bfc6b141828cad",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42845",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-23T19:15:06.947",
"lastModified": "2024-08-26T12:47:20.187",
"lastModified": "2024-08-28T16:35:23.650",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n de evaluaci\u00f3n en el componente invesalius/reader/dicom.py de InVesalius 3.1.99991 a 3.1.99998 permite a atacantes ejecutar c\u00f3digo arbitrario cargando un archivo DICOM manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/invesalius/invesalius3",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-42900",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T16:15:09.443",
"lastModified": "2024-08-28T16:35:24.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://g03m0n.github.io/posts/cve-2024-42900/",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/y_project/RuoYi",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43915",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:29.360",
"lastModified": "2024-08-27T13:01:37.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T17:44:45.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zephyr-one:zephyr_project_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.3.103",
"matchCriteriaId": "8862B152-D6D9-4600-BAA9-2059B1758E63"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-102-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-4872",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.890",
"lastModified": "2024-08-27T15:52:01.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:25:02.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The product does not validate any query towards persistent\ndata, resulting in a risk of injection attacks."
},
{
"lang": "es",
"value": "El producto no valida ninguna consulta sobre datos persistentes, lo que genera riesgo de ataques de inyecci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
}
]
}
]
}
],
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@hitachienergy.com"
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6053",
"sourceIdentifier": "psirt@teamviewer.com",
"published": "2024-08-28T17:15:11.163",
"lastModified": "2024-08-28T17:15:11.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the clipboard synchronization feature in TeamViewer Full Client prior version 15.57 and TeamViewer Meeting prior version 15.55.3 can lead to unintentional sharing of the clipboard with the current presenter of a meeting."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@teamviewer.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@teamviewer.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1007/",
"source": "psirt@teamviewer.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-7744",
"sourceIdentifier": "security@progress.com",
"published": "2024-08-28T17:15:11.380",
"lastModified": "2024-08-28T17:15:11.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.\n\u00a0\n\nAn authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024",
"source": "security@progress.com"
},
{
"url": "https://www.progress.com/ftp-server",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-7745",
"sourceIdentifier": "security@progress.com",
"published": "2024-08-28T17:15:11.593",
"lastModified": "2024-08-28T17:15:11.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
},
{
"lang": "en",
"value": "CWE-304"
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024",
"source": "security@progress.com"
},
{
"url": "https://www.progress.com/ftp-server",
"source": "security@progress.com"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-7940",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:06.217",
"lastModified": "2024-08-27T15:52:01.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:24:07.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The product exposes a service that is intended for local only to\nall network interfaces without any authentication."
},
{
"lang": "es",
"value": "El producto expone un servicio destinado \u00fanicamente al nivel local para todas las interfaces de red sin ninguna autenticaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -47,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.2",
"versionEndExcluding": "10.6",
"matchCriteriaId": "5B9D0068-FDE8-4A91-B4A6-F498363223E5"
}
]
}
]
}
],
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@hitachienergy.com"
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-7941",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:06.467",
"lastModified": "2024-08-27T15:52:01.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-28T16:09:03.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An HTTP parameter may contain a URL value and could cause\nthe web application to redirect the request to the specified URL.\nBy modifying the URL value to a malicious site, an attacker may\nsuccessfully launch a phishing scam and steal user credentials."
},
{
"lang": "es",
"value": "Un par\u00e1metro HTTP puede contener un valor de URL y podr\u00eda hacer que la aplicaci\u00f3n web redirija la solicitud a la URL especificada. Al modificar el valor de la URL de un sitio malicioso, un atacante puede iniciar con \u00e9xito una estafa de phishing y robar las credenciales del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
}
]
}
]
}
],
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@hitachienergy.com"
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-28T16:00:18.024756+00:00
2024-08-28T18:00:18.030891+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-28T15:46:39.613000+00:00
2024-08-28T17:59:36.023000+00:00
```
### Last Data Feed Release
@ -33,46 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261371
261387
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `16`
- [CVE-2024-34198](CVE-2024/CVE-2024-341xx/CVE-2024-34198.json) (`2024-08-28T15:15:16.503`)
- [CVE-2024-8195](CVE-2024/CVE-2024-81xx/CVE-2024-8195.json) (`2024-08-28T14:15:08.990`)
- [CVE-2024-20279](CVE-2024/CVE-2024-202xx/CVE-2024-20279.json) (`2024-08-28T17:15:06.113`)
- [CVE-2024-20284](CVE-2024/CVE-2024-202xx/CVE-2024-20284.json) (`2024-08-28T17:15:06.893`)
- [CVE-2024-20285](CVE-2024/CVE-2024-202xx/CVE-2024-20285.json) (`2024-08-28T17:15:07.687`)
- [CVE-2024-20286](CVE-2024/CVE-2024-202xx/CVE-2024-20286.json) (`2024-08-28T17:15:08.400`)
- [CVE-2024-20289](CVE-2024/CVE-2024-202xx/CVE-2024-20289.json) (`2024-08-28T17:15:09.117`)
- [CVE-2024-20411](CVE-2024/CVE-2024-204xx/CVE-2024-20411.json) (`2024-08-28T17:15:09.500`)
- [CVE-2024-20413](CVE-2024/CVE-2024-204xx/CVE-2024-20413.json) (`2024-08-28T17:15:09.763`)
- [CVE-2024-20446](CVE-2024/CVE-2024-204xx/CVE-2024-20446.json) (`2024-08-28T17:15:09.997`)
- [CVE-2024-20478](CVE-2024/CVE-2024-204xx/CVE-2024-20478.json) (`2024-08-28T17:15:10.220`)
- [CVE-2024-41564](CVE-2024/CVE-2024-415xx/CVE-2024-41564.json) (`2024-08-28T17:15:10.693`)
- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-08-28T17:15:10.903`)
- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-08-28T16:15:09.210`)
- [CVE-2024-42900](CVE-2024/CVE-2024-429xx/CVE-2024-42900.json) (`2024-08-28T16:15:09.443`)
- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-08-28T17:15:11.163`)
- [CVE-2024-7744](CVE-2024/CVE-2024-77xx/CVE-2024-7744.json) (`2024-08-28T17:15:11.380`)
- [CVE-2024-7745](CVE-2024/CVE-2024-77xx/CVE-2024-7745.json) (`2024-08-28T17:15:11.593`)
### CVEs modified in the last Commit
Recently modified CVEs: `45`
Recently modified CVEs: `57`
- [CVE-2024-23721](CVE-2024/CVE-2024-237xx/CVE-2024-23721.json) (`2024-08-28T15:35:15.520`)
- [CVE-2024-25354](CVE-2024/CVE-2024-253xx/CVE-2024-25354.json) (`2024-08-28T14:35:07.993`)
- [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-08-28T15:35:21.410`)
- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-08-28T15:35:21.617`)
- [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-08-28T15:35:21.843`)
- [CVE-2024-2625](CVE-2024/CVE-2024-26xx/CVE-2024-2625.json) (`2024-08-28T15:35:22.080`)
- [CVE-2024-26310](CVE-2024/CVE-2024-263xx/CVE-2024-26310.json) (`2024-08-28T15:35:16.490`)
- [CVE-2024-26503](CVE-2024/CVE-2024-265xx/CVE-2024-26503.json) (`2024-08-28T15:35:17.227`)
- [CVE-2024-27746](CVE-2024/CVE-2024-277xx/CVE-2024-27746.json) (`2024-08-28T15:35:18.103`)
- [CVE-2024-28339](CVE-2024/CVE-2024-283xx/CVE-2024-28339.json) (`2024-08-28T14:35:08.337`)
- [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-08-28T15:35:19.147`)
- [CVE-2024-28669](CVE-2024/CVE-2024-286xx/CVE-2024-28669.json) (`2024-08-28T14:35:09.157`)
- [CVE-2024-28682](CVE-2024/CVE-2024-286xx/CVE-2024-28682.json) (`2024-08-28T14:35:09.923`)
- [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-08-28T14:35:10.690`)
- [CVE-2024-29131](CVE-2024/CVE-2024-291xx/CVE-2024-29131.json) (`2024-08-28T15:35:19.953`)
- [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-08-28T14:35:11.473`)
- [CVE-2024-31811](CVE-2024/CVE-2024-318xx/CVE-2024-31811.json) (`2024-08-28T15:35:22.300`)
- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T14:15:08.433`)
- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T15:15:16.590`)
- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T15:15:16.750`)
- [CVE-2024-44083](CVE-2024/CVE-2024-440xx/CVE-2024-44083.json) (`2024-08-28T15:15:17.050`)
- [CVE-2024-45346](CVE-2024/CVE-2024-453xx/CVE-2024-45346.json) (`2024-08-28T14:35:12.640`)
- [CVE-2024-6879](CVE-2024/CVE-2024-68xx/CVE-2024-6879.json) (`2024-08-28T15:35:24.120`)
- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-08-28T14:35:14.160`)
- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-28T14:15:08.813`)
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-08-28T16:35:14.267`)
- [CVE-2024-25655](CVE-2024/CVE-2024-256xx/CVE-2024-25655.json) (`2024-08-28T16:35:15.510`)
- [CVE-2024-25859](CVE-2024/CVE-2024-258xx/CVE-2024-25859.json) (`2024-08-28T16:35:16.347`)
- [CVE-2024-25866](CVE-2024/CVE-2024-258xx/CVE-2024-25866.json) (`2024-08-28T16:35:17.133`)
- [CVE-2024-26470](CVE-2024/CVE-2024-264xx/CVE-2024-26470.json) (`2024-08-28T16:35:18.190`)
- [CVE-2024-28125](CVE-2024/CVE-2024-281xx/CVE-2024-28125.json) (`2024-08-28T16:35:19.333`)
- [CVE-2024-28537](CVE-2024/CVE-2024-285xx/CVE-2024-28537.json) (`2024-08-28T16:35:20.337`)
- [CVE-2024-28640](CVE-2024/CVE-2024-286xx/CVE-2024-28640.json) (`2024-08-28T16:35:21.193`)
- [CVE-2024-34087](CVE-2024/CVE-2024-340xx/CVE-2024-34087.json) (`2024-08-28T16:35:22.590`)
- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T16:15:08.417`)
- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T16:15:08.740`)
- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T16:15:08.863`)
- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-08-28T16:15:08.980`)
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-28T16:15:58.043`)
- [CVE-2024-3980](CVE-2024/CVE-2024-39xx/CVE-2024-3980.json) (`2024-08-28T16:32:20.957`)
- [CVE-2024-3982](CVE-2024/CVE-2024-39xx/CVE-2024-3982.json) (`2024-08-28T16:30:50.080`)
- [CVE-2024-39930](CVE-2024/CVE-2024-399xx/CVE-2024-39930.json) (`2024-08-28T16:15:09.077`)
- [CVE-2024-41310](CVE-2024/CVE-2024-413xx/CVE-2024-41310.json) (`2024-08-28T17:42:01.190`)
- [CVE-2024-41657](CVE-2024/CVE-2024-416xx/CVE-2024-41657.json) (`2024-08-28T16:13:35.140`)
- [CVE-2024-41658](CVE-2024/CVE-2024-416xx/CVE-2024-41658.json) (`2024-08-28T16:08:31.743`)
- [CVE-2024-42845](CVE-2024/CVE-2024-428xx/CVE-2024-42845.json) (`2024-08-28T16:35:23.650`)
- [CVE-2024-43915](CVE-2024/CVE-2024-439xx/CVE-2024-43915.json) (`2024-08-28T17:44:45.193`)
- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-08-28T16:25:02.097`)
- [CVE-2024-7940](CVE-2024/CVE-2024-79xx/CVE-2024-7940.json) (`2024-08-28T16:24:07.043`)
- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-08-28T16:09:03.693`)
## Download and Usage

View File

@ -92623,7 +92623,7 @@ CVE-2016-9838,0,0,8915e7a7760dab1b83ccc9fcf5714761065d956e576593ed79dbce273e9baa
CVE-2016-9839,0,0,56dd29d3d2add257a8ccbd99c526531df97870ecd1b87178196e5e22a1a37a37,2023-01-31T19:58:56.190000
CVE-2016-9840,0,0,c8cdfedcf9ba9d30c2e11a30c9ee1027f9c4943670cac0713400edb96b12ecbf,2023-11-07T02:37:35.780000
CVE-2016-9841,0,0,8461023f0b6af372abbc700df4bf248326f3d17885a444f7d4bf87fb75831d87,2023-11-07T02:37:36.093000
CVE-2016-9842,0,0,d67fed1be1f6e8159dfb3396159a58fa49ed8dc17f52d03827fd9c4112a2c093,2023-11-07T02:37:36.463000
CVE-2016-9842,0,1,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000
CVE-2016-9843,0,0,03bba8f361b4f311c57e6be0a8dca8d549e9547ec0826de5125cdde6ebac4654,2023-11-07T02:37:36.807000
CVE-2016-9844,0,0,00ba3ac318d524a060543298e92f49ba342658607b49204e522db0201c5e4e2a,2019-12-16T20:24:14.587000
CVE-2016-9845,0,0,00bb0b1bdce117249db0d0b791e75c832a7a8fdd6ba23a94074ca0696959dbbe,2020-11-10T19:23:05.543000
@ -121384,7 +121384,7 @@ CVE-2018-25095,0,0,6f4ec7520fe1e8e1137939a36d89eebffe41414142eb46d5c5f36cf386b6b
CVE-2018-25096,0,0,0f1a9d2fe0943450f70fc2f111ebfdebd2f2c63d07ffdb5b75cb7af27e02a352,2024-05-17T01:27:30.770000
CVE-2018-25097,0,0,b132b2c05ec96134ee21d6c1f5f845fb6d9b53254de5311e7c1f18ebf1a12d65,2024-05-17T01:27:30.893000
CVE-2018-25098,0,0,afd500b111d854a57f928388ff40ee517eeef41a47b8f0c70385aae8f8a38f95,2024-08-05T13:15:46.743000
CVE-2018-25099,0,0,586c7631a0b69d643c54a64a2d6b1e5bcbdf77958964a738487d2e947c8f6cc3,2024-03-18T12:38:25.490000
CVE-2018-25099,0,1,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000
CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000
CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000
CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000
@ -136789,7 +136789,7 @@ CVE-2019-19820,0,0,d3200ebc5d581b4755916a609fe50979edea5a15e0fc3a04ffa5f71613f4e
CVE-2019-19821,0,0,5d4ec7e2bffa15750c2939c0e7d2adea2bc3396ead4c3fc172fe464bc3578a28,2020-08-24T17:37:01.140000
CVE-2019-19822,0,0,f372437f800ae6340a6e164d4e09649bd7569c516be8f3889c8ec515ac663de0,2020-08-24T17:37:01.140000
CVE-2019-19823,0,0,3f6ad46dcab8a2c03d46210de505a5e9a1aaa92fdf0608ae333a991ddf15937a,2020-02-06T16:04:39.370000
CVE-2019-19824,0,0,59b351a45fa829535350144da6c60d4794ee8053c5a3ab8fc932ddcb8697aa6e,2020-02-05T14:30:22.743000
CVE-2019-19824,0,1,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000
CVE-2019-19825,0,0,04de0123f214687b69fe0b70940205a91ae0ecd6ff99d9fd325f56ef736a2f2b,2020-02-05T14:35:31.347000
CVE-2019-19826,0,0,2689ee020ae9e5e4ebe835dbcc0a88d036a8c5de49eae99421281d65c6938d42,2019-12-27T16:49:24.693000
CVE-2019-19829,0,0,3f73ae381fa8469b280488161d5fec22d571a4f6250d30f76b53103ab377bf65,2019-12-23T12:27:16.840000
@ -147483,7 +147483,7 @@ CVE-2020-1261,0,0,facd24f80876f2ac6682cd4ffcda5908f697f57ca36f3a6dbb2ed3896e7945
CVE-2020-12612,0,0,27c013661b38b08d73a9ed802a24540f4841a815e7c5477dd782dabe8437df9c,2023-12-15T16:24:27.337000
CVE-2020-12613,0,0,c95356c17bc093130235aa64aae86584b7d9b965bf99a8b709408a2aaf3f050c,2023-12-14T16:37:11.820000
CVE-2020-12614,0,0,847dc8f32da2d3c78a4e8ef365590ce7648ef554d7da2f4e7aa6d04370642371,2024-08-01T13:42:02.280000
CVE-2020-12615,0,0,36d741a8300c40d0907640fbe1b56e3d7d47937811858f27d7bb5e898c668199,2023-12-15T16:04:51.323000
CVE-2020-12615,0,1,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000
CVE-2020-12618,0,0,6597e2bb9a8de14b97fe7ce944c521c20b776df974886bc6ada82eff63e8acda,2021-07-21T11:39:23.747000
CVE-2020-12619,0,0,ee598b4bf1d4265af77d330472cf7b83e088560073a1c2a3d5a6cf8d6eb12600,2021-07-21T11:39:23.747000
CVE-2020-1262,0,0,21c4e042f0bae4f9c23017151de84d72ef7a045e9efdf2cc4d6cb16ca079a3e6,2021-07-21T11:39:23.747000
@ -205546,7 +205546,7 @@ CVE-2022-39332,0,0,477ba7648b2ff3efc7e15c35cd4f9a8063953643bd104d8fcf6e4123d4bd6
CVE-2022-39333,0,0,cae9628f620aeaa785bde614c3495c0a2350667e343b17114cdc498043380647,2022-12-01T17:39:03.577000
CVE-2022-39334,0,0,953bd45d6f15391408c3de4c9a67e9cc53b41429382ade33f7af626f41ee3551,2023-03-06T23:15:10.630000
CVE-2022-39335,0,0,338f7cecc4b22c17265bfd6917b9af12b92d4fcf78cd780c23b38825977fd2cc,2023-06-11T04:15:46.950000
CVE-2022-39337,0,1,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000
CVE-2022-39337,0,0,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000
CVE-2022-39338,0,0,df2a8a3e9084a1d1b2316940bbb923180459197a0b5b11dac656c6305cfdf18b,2022-12-01T20:43:10.727000
CVE-2022-39339,0,0,e54c18e4443dc47f306cd260e8ea3e02e1e318519ab443dbbf61c42136e20110,2022-12-01T20:43:02.263000
CVE-2022-3934,0,0,7ed77fa0bccfc3f3da1a7580185e2d2d09a7b3cc8b2502be4a6a5fc2baf3cbd9,2023-11-07T03:51:59.160000
@ -205864,7 +205864,7 @@ CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3
CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000
CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000
CVE-2022-39996,0,0,515d89341d75fc891c2495715479db343fbd6a795549afa8dc6e58128081b767,2024-08-27T21:35:01.140000
CVE-2022-39997,0,1,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000
CVE-2022-39997,0,0,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000
CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000
CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000
CVE-2022-40001,0,0,53944e40d3dc029fd806c75d13f9eb446512b7b5067631d8fcb6e9c0e4408b76,2022-12-19T16:23:53.913000
@ -213969,7 +213969,7 @@ CVE-2023-1494,0,0,fabe57685f9f065291cb73b5da5d58e55c63347ea4b821215e6a77cd8e6703
CVE-2023-1495,0,0,52d3a63f7531a21742127196634a25b8aac0e9134944b225f239008a7eb20fba,2024-05-17T02:18:10.487000
CVE-2023-1496,0,0,3ad20729adb8da7a942dfca3bf38af88fc6858bc7a66965d5ec257bb936aaa30,2023-03-24T01:52:42.833000
CVE-2023-1497,0,0,43a07682b47772aadc64da8126950dfea0d545240de7c9596bc9fee6200700c4,2024-05-17T02:18:10.633000
CVE-2023-1498,0,0,9eeeceff41634d9dbf8d03706cdae4e9acea19ed25c6b8ff143ac0284ca5312f,2024-05-17T02:18:10.733000
CVE-2023-1498,0,1,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000
CVE-2023-1499,0,0,8ff3854eaf9c82717c95e16a68fcb189e93074538f80edc381c1653810d6905e,2024-05-17T02:18:10.843000
CVE-2023-1500,0,0,3e6c08282f27193f563da01f48a334141476b60383b5180210ca9fe12b3b5de6,2024-05-17T02:18:10.947000
CVE-2023-1501,0,0,d6509f5f5f21ad6ed83987bcae6b52f819de1d497f3a8c7a59f97f9b53e05666,2024-05-17T02:18:11.043000
@ -219701,9 +219701,9 @@ CVE-2023-26319,0,0,3dd6441fbb2cf89b0e957e6f3f556dd38ea034f50ae932ae756d43f14248f
CVE-2023-2632,0,0,301898869b5a60457376f20e3b7ea036dcafa847ec705a351ca3cee971a25c85,2023-05-25T16:08:28.660000
CVE-2023-26320,0,0,ce18ada0dab81b6e3cbb23f236fe2120ff674b38177ae9eb5db23adbd1986f1c,2023-10-16T19:04:10.920000
CVE-2023-26321,0,0,b75b605fdb8ac99bba7cd33bc5a27b0464761915d8e051cc7391f87c31191bc9,2024-08-28T12:57:17.117000
CVE-2023-26322,0,1,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000
CVE-2023-26322,0,0,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000
CVE-2023-26323,0,0,484add0c04d4a78cede6c93a8c8952694f596119aecb48ac15eaa55dd3b75254,2024-08-28T12:57:17.117000
CVE-2023-26324,0,1,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000
CVE-2023-26324,0,0,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000
CVE-2023-26325,0,0,0815d0f5538437b0c1a37e2d30e66d4594a1f33bad8ba20cf36ef6d2f6c24077,2023-04-13T20:15:09.657000
CVE-2023-26326,0,0,7a94421fc97dc2e69220f52c8149f79ba5e3f607156d057693f823cb0ba1ecd2,2023-03-03T16:46:29.717000
CVE-2023-26327,0,0,1cc55ebadf8900607cbb779734840e485cf992ab645ea88d7f35d67b7049a018,2023-04-03T18:42:37.320000
@ -232328,7 +232328,7 @@ CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458
CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000
CVE-2023-42858,0,0,3cde77cff878b7bb98d08b0160f9736789daeec37f86aa56fd544ce01873eae4,2024-02-22T19:07:27.197000
CVE-2023-42859,0,0,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000
CVE-2023-42860,0,0,cb68b7c82514ef900a7acd7613121b5f748ef4ff4bdc9490298810a61c3cc7e3,2024-02-22T19:07:27.197000
CVE-2023-42860,0,1,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000
CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000
CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000
CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000
@ -232351,7 +232351,7 @@ CVE-2023-42887,0,0,6a183a6bbbb784cf3ff7a27ca6dc2d91b7b7c3f3cb1bda7867c2939a5f618
CVE-2023-42888,0,0,b067218531e45be7cc34fa1275d3c2b57f0925c26eb93740839a000d9953633b,2024-01-26T20:53:27.637000
CVE-2023-42889,0,0,1649dc73df9490d9ce669184ee1d4b8722c3b17f66d00680b3c3c34df498b755,2024-02-22T19:07:27.197000
CVE-2023-4289,0,0,97e9dbfb002f991c9b0c7bb56513ad2ad7a34e2cc2f1908f40b15808fc4c7b13,2023-11-07T04:22:25.410000
CVE-2023-42890,0,1,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000
CVE-2023-42890,0,0,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000
CVE-2023-42891,0,0,9e832a9c79650ad0321f807def388413064ff2ab68c6ecbf9bb18e2496c75004,2023-12-13T17:46:10.560000
CVE-2023-42892,0,0,45868be9e713d43fbe1857fd521e7819eff03e6332a2f62faa55e58f6a79244c,2024-08-21T23:35:00.660000
CVE-2023-42893,0,0,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000
@ -234678,7 +234678,7 @@ CVE-2023-46422,0,0,9828db1651145e55303f7c90e9b80d9152a0babe8f2b6bf7c6211e8345b27
CVE-2023-46423,0,0,fae9f7621f04eecce4ee8c67ae3cb477991a1d96e9608dd2d417468ee933e47e,2023-11-01T16:37:41.027000
CVE-2023-46424,0,0,50d5b8cffd7312c685b7f6280f3573716a877c1580c703fe9f896ec5081cf2ad,2023-11-01T16:37:51.027000
CVE-2023-46426,0,0,095958b9525a539d6bad1510a5c4a9bb3f3e81ffc03067e72a3a22c99ed7e1b9,2024-08-05T20:35:01.333000
CVE-2023-46427,0,1,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000
CVE-2023-46427,0,0,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000
CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000
CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000
CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000
@ -234692,7 +234692,7 @@ CVE-2023-4645,0,0,080630aaab2615758e1b4d6f50d89291c19a67c7887d417a836246d5119706
CVE-2023-46450,0,0,9eedfca9fc0f26e4373fe52fcdff22340a7718bcd00536967f1e45fb1ec952e0,2023-10-30T15:55:16.417000
CVE-2023-46451,0,0,b7c650f5171568ff66e636d2cc25afe576e379cc753300c14a6647b49ae59d53,2023-11-06T18:15:09.143000
CVE-2023-46454,0,0,3dbd1be3466e652b6244f86c6f23f5226b664c9ce63ddb43f7325d4e0e6c7c6d,2023-12-14T19:33:14.070000
CVE-2023-46455,0,1,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000
CVE-2023-46455,0,0,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000
CVE-2023-46456,0,0,c4dfd3d82ae14a8b837bb61f8d23f14c4d0fc689e9b777f969e34fde85a437e8,2023-12-14T22:49:19.163000
CVE-2023-4646,0,0,8b7e316f7875d1dd1b48005b399d9b0cf2d7921bd690ed55ff013ac594bec756,2023-11-07T04:22:48.910000
CVE-2023-46467,0,0,8054488fd0132f7e27914107b3db54b56d981952490fdc3e16c9ef4f66fb3574,2023-11-07T15:08:59.640000
@ -235490,7 +235490,7 @@ CVE-2023-47575,0,0,30cf6be65abd61448a4a89a9b72de85e929953eb93306b378cfacaff6d87c
CVE-2023-47576,0,0,b658502efe54d9b05c4f426be235a8b40d293e00fdab9f01c40b60b57e7ef3f8,2023-12-18T15:01:53.273000
CVE-2023-47577,0,0,c0f13ddb15e49455530054095cc0266851552b5d13fc042a223643cd9df0b789,2023-12-18T15:08:42.737000
CVE-2023-47578,0,0,8bf0aae804a5d895a13b8eaa8706ff025054dd6e316ca1b2834837b692a8f7bf,2023-12-18T15:09:42.753000
CVE-2023-47579,0,1,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000
CVE-2023-47579,0,0,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000
CVE-2023-4758,0,0,713db879644d26febfa528fa3b5a32eaa4d032e64a180d47e3477adfad42aa0a,2023-09-06T20:43:43.440000
CVE-2023-47580,0,0,1046d1b7ec521db48bb6fc1bed5767243c03c220591fb511a40a277d8666b4e6,2024-08-14T19:35:12.147000
CVE-2023-47581,0,0,5103c8a44f66e69718053305c6d841267ec2f6ba489578cb95ee5adf75321cf4,2024-08-12T15:35:03.167000
@ -236037,7 +236037,7 @@ CVE-2023-48402,0,0,4c809f2dd5e8dcfff010aa543a6c6f045768b178ca00ba8754b6c8edf6ecc
CVE-2023-48403,0,0,4adc068ba69d93e217814aa03ab06c64d37d4e6f1f5b9e967d203dad5b01ccd6,2024-03-12T21:15:56.243000
CVE-2023-48404,0,0,678d899eed5c458b58da3464689532ca0142c650f2cd178cdc3f7827df0120ca,2024-03-12T21:15:56.300000
CVE-2023-48405,0,0,1184ca00738252a4a1fbfd7c535695d37028df78fe87d5aaaa04a1bc365c4159,2024-03-12T21:15:56.373000
CVE-2023-48406,0,0,b330092f99e86d2edcd1d228620e5c48e2defe79dfd91e54db7fffe08c3396da,2024-03-12T21:15:56.447000
CVE-2023-48406,0,1,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000
CVE-2023-48407,0,0,878114c674344ec771789050e93c4a630dfc18deac136706916dedaddc59d9b4,2024-03-12T21:15:56.517000
CVE-2023-48408,0,0,685d630782a479a80a275f86cfe75523d6e24bb2a663d7b093992d79e473f5dd,2024-03-12T21:15:56.573000
CVE-2023-48409,0,0,34f77accc0b2ac79d7dec98b91bbcd5fa76dbfd08a55d334eff38c7b0b7cd036,2024-03-12T21:15:56.647000
@ -236888,7 +236888,7 @@ CVE-2023-49463,0,0,3997f0c76b75718e8d7fddf13118ae3adfe6e7b8a1e026bbdd8c02aa82ae2
CVE-2023-49464,0,0,6558ffdc5c503d25be5dd218daff18765b512708dd37d505c33fce4d88f34e1f,2023-12-11T17:31:56.900000
CVE-2023-49465,0,0,3295dd761e06a7bab659329b7dd55f865f3505849f65d110e023c01328124ac4,2023-12-30T21:15:43.877000
CVE-2023-49467,0,0,7f3716a39cf738913c36e4fa2859efa373c3aaf2bd666ae6754d1492097f8159,2023-12-30T21:15:43.957000
CVE-2023-49468,0,0,bfb71ddc96fc61c25389cb277f3607453a350af6a19b799eacb4a3c375f3b229,2023-12-30T21:15:44.010000
CVE-2023-49468,0,1,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000
CVE-2023-49469,0,0,cbc193cf36e9355f9d67ec1bc5dc157b2a50fd7106252de12cbfb6ed4ef2ef76,2024-01-04T17:14:07.600000
CVE-2023-4947,0,0,8df0a8e59512a342c1480f6e8ba47140e8a497588a05b9e649ab29c7e1e4eb1b,2023-11-07T04:23:12.703000
CVE-2023-49471,0,0,0f7e53b0476caf611046a94136cc7f6de729f116f183f5bc0ae510c9611e40ac,2024-01-17T13:41:42.813000
@ -236917,7 +236917,7 @@ CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec2
CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000
CVE-2023-49546,0,1,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000
CVE-2023-49548,0,0,34b77376d27ee723d3ac14898631fa76b657dfe4cf5b3276c3299d37e41dd1fc,2024-08-08T20:35:02.323000
CVE-2023-49549,0,0,2421b127f456be0fc67abfad0a3b1f8926786d5d65fc8c1f3d22621b1f55fe3e,2024-01-09T16:18:48.520000
@ -237237,7 +237237,7 @@ CVE-2023-49985,0,0,48621d95c58dd65f642543dd394ac7e9d6daa5b1663d066d6d97b86f6ff66
CVE-2023-49986,0,0,0bfa07ebd9dbe1f0457cbd00aed62c65d63f7c4a056604f06d8368c48ba916b7,2024-08-05T16:35:03.407000
CVE-2023-49987,0,0,6666894146cb92f75fc70a6c668cf409191be8d05d66fdbc2b6973b27220807d,2024-03-07T13:52:27.110000
CVE-2023-49988,0,0,af3f01af8abbd20907ca3d22a8fb2f0ce6ca13f1af6f9bf92429d44550b8b49a,2024-08-16T18:35:02.507000
CVE-2023-49989,0,1,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000
CVE-2023-49989,0,0,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000
CVE-2023-4999,0,0,a9caefdd4df7e960da2284d3ca94a538ae47e3d7f39d9ecb83734266ebc3a13e,2023-11-07T04:23:17.550000
CVE-2023-49990,0,0,1e5e5df2253f1be938172770085e3c41be08a9bc49fb8adca7ab6f2eb4169092,2024-01-19T04:15:08.763000
CVE-2023-49991,0,0,bd97a9ee7ae0f1cc74ef24bcda4231f713b9e1b0d8fdff1d77ef1e74196f05c6,2024-01-19T04:15:08.870000
@ -237991,7 +237991,7 @@ CVE-2023-51381,0,0,dae38e2969db35298f7bb53595e944e9233b54858e286dfa2789b9cc64727
CVE-2023-51384,0,0,ec284ced8a028c80f45570d0f48e893a628f0d7f6a64a78835100e3773167767,2024-05-16T20:05:04.420000
CVE-2023-51385,0,0,851b9cad7a3a79109e0c97cd30aedcae9c6f131217d805171f55cda1951222c6,2024-03-13T21:15:55.100000
CVE-2023-51386,0,0,4989bef2423d43e06599dc7ab49fc1d8a0bef0f8e3a284aff6f4a4e0683c2314,2024-01-04T19:16:10.103000
CVE-2023-51387,0,1,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000
CVE-2023-51387,0,0,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000
CVE-2023-51388,0,0,2e3ad8da9f38d091cbd8c98cd1a3aabae546f5511bbdfeff688c563085b3097e,2024-02-22T19:07:27.197000
CVE-2023-51389,0,0,c8183e674f9d5219872a33e92b5a1fdc0eae3b4f316b3eb093c7a493c5e168c0,2024-02-22T19:07:27.197000
CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159a8,2024-01-21T01:44:13.437000
@ -238263,7 +238263,7 @@ CVE-2023-51637,0,0,9dd5b13b347418006a53b7d73382dc77bb92ad47f1cbb8db408529d421275
CVE-2023-5164,0,0,b96e66d5438a1cd840a20c13041943d6f222ecbeaac68c7c2ffd9b6ed64d4331,2023-11-07T20:09:50.093000
CVE-2023-51649,0,0,70538420b22ae7c1ec835f6d0f9cf2b1648e5b5b1c043bf313fd06206fe66366,2024-01-03T20:05:01.863000
CVE-2023-5165,0,0,f7a9615603b2683ca9f4a9791f442b32b6c76896818992c01d44336b1364689e,2023-09-26T15:50:49.217000
CVE-2023-51650,0,1,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000
CVE-2023-51650,0,0,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000
CVE-2023-51651,0,0,67d2a3bf08f4d907e981e638fa0d5228e436cc7d71dbb46f1110ed924b67b0d6,2024-01-03T18:32:41.760000
CVE-2023-51652,0,0,39d217c9de6d0571e49c9aba349c3d8cf90b339902c56edcd4df3013a87c71f5,2024-01-08T19:35:18.890000
CVE-2023-51653,0,0,340dbcfc1bdb4753b236d00e4b63c6786e60d215a986fbe2b29b43277f9525e4,2024-02-22T19:07:27.197000
@ -240877,7 +240877,7 @@ CVE-2023-7013,0,0,752e84fc788817f789f383d9b4727a6a371c7a1c500c5d0ed88cf4177f1382
CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000
CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000
CVE-2023-7016,0,0,010884b21a27fa66d833a70681dd186e397f473cbb0b90536483fba7b0d7269d,2024-02-27T14:19:41.650000
CVE-2023-7017,0,0,d43bb3d02f436ac3feae16f37cb770aded8869c7c92b22169a5874f87e286ae1,2024-03-17T22:38:29.433000
CVE-2023-7017,0,1,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000
CVE-2023-7018,0,0,9438a9ef02cb6b14eeff26492e18c6b4314ac91317f5ba8b28b4a172250c35b2,2023-12-30T03:13:12.367000
CVE-2023-7019,0,0,25421d5b7b02bc2542949247708020c3ce3a00d66a261d8b3c79bad4af5b1cd1,2024-01-17T22:28:36.323000
CVE-2023-7020,0,0,7d3304d8f230cb46404a5f4e0c7dfc242c13c646702476b3fd55147c8232dd5a,2024-05-17T02:34:03.503000
@ -240944,7 +240944,7 @@ CVE-2023-7081,0,0,b94c538c220abbbf5d50ca8a2904f1fe370fbb1f80a5e1f3321f9af9bffbc7
CVE-2023-7082,0,0,500d0f2d877d9984b63decc202acb4ee4bb46b23d005a29465c40aa2ce7d0bca,2024-01-26T19:48:56.570000
CVE-2023-7083,0,0,cb22c9eca48a356f4e09d670d9f560809daf8ed155fa4fd28ed59b232188d26d,2024-01-19T14:54:30.993000
CVE-2023-7084,0,0,4632f03cec16c49d84207124ebe67a266da26c671bc47e64aa3e00e71deebb1b,2024-01-19T14:54:24.987000
CVE-2023-7085,0,0,da4e24c322f876c0f94209a6ada5b031f39fe51c4da1fcc26d3e0f2743831f74,2024-03-18T19:40:00.173000
CVE-2023-7085,0,1,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000
CVE-2023-7089,0,0,de15bf10cbbafe87d399a0ec4c918efb24631900a27c9c1192eff372993ed731,2024-02-03T00:27:31.313000
CVE-2023-7090,0,0,a5b4a70cda853965b97ddccc4bf6511943919b8d4fb98b9077b8f1637ede54e4,2024-02-08T10:15:13.540000
CVE-2023-7091,0,0,d58faa483178a62c20472bf1bded86f6b329c385b83c74a05c3e1f3b3b217008,2024-05-17T02:34:08.657000
@ -241015,7 +241015,7 @@ CVE-2023-7163,0,0,54f5e7a55d48eb95c47fe9ab2bd934c769b28ba59ea5fbda349ed798a02bdb
CVE-2023-7164,0,0,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000
CVE-2023-7165,0,0,9579de52ee223f320f228c1ef75c7d093c7dd9bb72a0fc1f5802e6bcb3ff7ba2,2024-08-09T19:35:02.617000
CVE-2023-7166,0,0,6cedf7ff09611c5f6f6894ca5635265e9233fca36dede244b351d519590f0234,2024-05-17T02:34:15.110000
CVE-2023-7167,0,0,88ba53fe30221ae79ab66946da9ed586fa8d09e6fce2dd10ec5e0586182d0a78,2024-02-27T14:20:06.637000
CVE-2023-7167,0,1,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000
CVE-2023-7169,0,0,ab91bd41244dde388327206c23937e5dca7ce4b0de2116a1c3757d023bfdbdc4,2024-02-15T02:29:40.877000
CVE-2023-7170,0,0,c09ccb7568e9a7781a5b4886b0c86c25c0a32c50adfe4049560ce5dfc4fe85bc,2024-01-26T21:05:46.627000
CVE-2023-7171,0,0,ca5e0c79c1ad7ffbcf6087eb7053f4be605bc976e841898426c6792174a905d1,2024-05-17T02:34:15.343000
@ -241107,13 +241107,13 @@ CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c
CVE-2024-0010,0,0,0619a8beffc460e406861d5436887a98d4820a4ca409aea20f604a00879fcec0,2024-02-15T06:23:39.303000
CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50ac,2024-02-15T06:23:39.303000
CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000
CVE-2024-0015,0,0,81cd08444b6aef5834e4eb427fcb32b84cfcb9c43ccd80385d5b532e537d2ea5,2024-02-16T19:26:55.393000
CVE-2024-0015,0,1,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000
CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000
CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000
CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000
CVE-2024-0021,0,1,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000
CVE-2024-0021,0,0,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000
CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000
CVE-2024-0023,0,0,0ae19107c0f009088c14cc9607c2fcb734bab1e5ea02d37a78e27ee1213b97f1,2024-08-21T20:35:01.700000
CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000
@ -241126,7 +241126,7 @@ CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914
CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf814,2024-02-16T13:37:55.033000
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000
CVE-2024-0035,0,1,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000
CVE-2024-0035,0,0,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000
CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000
@ -241671,7 +241671,7 @@ CVE-2024-0669,0,0,c742feb186482c5b850f8f47a8ad21b0a116882aa950f3b591c682f1d00d2f
CVE-2024-0670,0,0,d7af230e4a779f07d41ef710c5466f9f1f09f5eed836a0b4fda43c6f633ecf53,2024-03-13T23:15:45.750000
CVE-2024-0671,0,0,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000
CVE-2024-0672,0,0,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000
CVE-2024-0673,0,1,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000
CVE-2024-0673,0,0,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000
CVE-2024-0674,0,0,2202c0e4a57a8020cd97aff2c1a5d1a1df2bd5f61035f83890c80e50cc47048f,2024-02-08T16:39:59.450000
CVE-2024-0675,0,0,31b4e65d3d10777ce13189dafebdfb82e520a928a3d9c7e18ba8db99a930c11a,2024-02-08T16:39:42.950000
CVE-2024-0676,0,0,435ecea72a5bce3bb04c7988a29d806f61fbeed7ad45e02290781eeac120a465,2024-02-08T16:39:00.907000
@ -241950,7 +241950,7 @@ CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368
CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000
CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000
CVE-2024-0972,0,0,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000
CVE-2024-0973,0,0,e5fb6b4d7ce253b144fdf362ec0f968de6ca466dcd6c3adca143df6bc6e05926,2024-03-18T19:40:00.173000
CVE-2024-0973,0,1,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000
CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000
CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000
CVE-2024-0976,0,0,cc7f106853c76332cf2c1434fc9c2b994b6bd96e33b062831e11057ccad8d2cf,2024-03-13T18:16:18.563000
@ -242233,7 +242233,7 @@ CVE-2024-1267,0,0,0ac3a4ad3c33b1de1cb6d3c82dc409665a58abf06843c3ddfdea13f760f08d
CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b804c,2024-05-17T02:35:22.040000
CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000
CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000
CVE-2024-1273,0,0,77e426e491189decb08be6f5f41b23b0e6b37212aa753cdfd723b534f74aeb9c,2024-03-12T12:40:13.500000
CVE-2024-1273,0,1,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000
CVE-2024-1274,0,0,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000
CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000
CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000
@ -242273,7 +242273,7 @@ CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15
CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000
CVE-2024-1313,0,0,e178cffe6aa77a4f0d6d1f0bc0814c15387ceb02accf822d00ca94cf3dcbb92c,2024-06-10T18:15:24.947000
CVE-2024-1315,0,0,25a55ec7d2eabca19718f4f801048334cc1cea56ed0621182dceeddb8f9f2d51,2024-04-10T13:24:00.070000
CVE-2024-1316,0,0,8219ebc553a9077664f3f7c46bd8d84684203b334ed147394b768c21ba00910d,2024-03-05T13:41:01.900000
CVE-2024-1316,0,1,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000
CVE-2024-1317,0,0,e6b73971b8fadcf515a25ac1e50eb31e33a60418d7d45cd3d52420834e679d55,2024-02-29T13:49:29.390000
CVE-2024-1318,0,0,5ba6af40f86ed8ef42439c311587e2b7fcfc352f41e84ea7a6e6cadfbc71379b,2024-02-29T13:49:29.390000
CVE-2024-1319,0,0,903406ad02ffa43d0d568c21b4803da244dc9d7ce0c7f684b31acb02d2ec9380,2024-03-05T13:41:01.900000
@ -242288,7 +242288,7 @@ CVE-2024-1327,0,0,ae9f5cba237be94589254d7283daa73f7fafabd33cfebb17147581f2cee609
CVE-2024-1328,0,0,7073f5514db5b26279568b528e71529068f45e6ad24d9e6819ac92a07723ef47,2024-03-12T12:40:13.500000
CVE-2024-1329,0,0,2cd50cabd5bf81a4f9539c2a3a992a874338213f75ad414ccf75d557c037546e,2024-02-15T18:27:28.837000
CVE-2024-1330,0,0,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000
CVE-2024-1331,0,0,6c977f20f6f7bde4755773555c00e763bf8e9a163fc61da4ae97f1dd32b908a9,2024-03-18T19:40:00.173000
CVE-2024-1331,0,1,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000
CVE-2024-1332,0,0,b1d0012a9e40c173cc8f28116508227ff7724ad8f4f969c3dc5f4b0e2f08d038,2024-05-24T13:03:05.093000
CVE-2024-1333,0,0,bd53e9cdde226b8c165843c67dcea5ab4ff36ead472bf29231b1c2f3f1abcb85,2024-08-27T21:35:07.153000
CVE-2024-1334,0,0,fe4c6be53440216c757c2bf51b270a3930f5c7dd35674ef18ead1fe70ed3fa7c,2024-02-29T13:49:29.390000
@ -242593,7 +242593,7 @@ CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a0
CVE-2024-1666,0,0,1f8333a8347ccf0940f5f18eb72bff97cea1045d2d21b82516336ffe9989709b,2024-04-16T13:24:07.103000
CVE-2024-1668,0,0,5d777dacf70894c13bb98378761ebbab538d2f58e3be366f3dd859cfdec3a507,2024-03-13T18:15:58.530000
CVE-2024-1669,0,0,7051f11d6175af0afa7adcb8852b15d12f5bb44802faedbbae321e1477b73fea,2024-02-26T16:27:52.577000
CVE-2024-1670,0,1,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000
CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000
CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000
CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000
CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000
@ -242871,7 +242871,7 @@ CVE-2024-1958,0,0,947fad07d36c41a06040aff36ab5d050d343db5e82c876a243f2fa9452dd0f
CVE-2024-1959,0,0,20773b09a03765316a8a30eab375cea71fea1425346dc1ce35f18b661dfaac63,2024-05-02T18:00:37.360000
CVE-2024-1960,0,0,c755cb8cb954b0b1fd45e3b2b2de1bed153c08b47450f36752ad68952963c3e6,2024-04-10T13:23:38.787000
CVE-2024-1961,0,0,dc2f9d3f3b67fb9e1c6125531b0d8e4d845cdbbf4294ea07c79e7fd65b2f59e9,2024-04-16T13:24:07.103000
CVE-2024-1962,0,1,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000
CVE-2024-1962,0,0,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000
CVE-2024-1963,0,0,497da3e0c849986f6d35bf596bea7f2a65b5687d8cd64468172b927cfb094a60,2024-07-18T19:46:01.863000
CVE-2024-1965,0,0,5cf0344d0ba6ffdf46e178c3a3f0a22dafc37cdaf493620506aae0773081ac04,2024-02-28T14:06:45.783000
CVE-2024-1968,0,0,5d386d638a6745d5972e3da785c6fa3ef4f25b00eef921490d278858d9e57670,2024-05-20T13:00:04.957000
@ -243031,11 +243031,16 @@ CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bb
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000
CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000
CVE-2024-20279,1,1,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000
CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000
CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000
CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000
CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000
CVE-2024-20284,1,1,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000
CVE-2024-20285,1,1,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000
CVE-2024-20286,1,1,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000
CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000
CVE-2024-20289,1,1,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000
CVE-2024-2029,0,0,354f931e93072109dced3bc73857c32e7a282fc5266016d20bde6f1070f10b9d,2024-04-10T19:49:51.183000
CVE-2024-20290,0,0,95fa55047489b4a2ee370988084e137cebac8acab30010c47f69339f30b23cb9,2024-02-15T15:43:27.240000
CVE-2024-20291,0,0,c2ed04ab4eaaddf8b1bcc5dc083481f305536f5151be36cfe21c14f02472ee22,2024-02-29T13:49:29.390000
@ -243124,6 +243129,8 @@ CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20411,1,1,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000
CVE-2024-20413,1,1,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
@ -243133,6 +243140,7 @@ CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
CVE-2024-20446,1,1,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
@ -243140,6 +243148,7 @@ CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f7
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
CVE-2024-20478,1,1,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
@ -243659,23 +243668,23 @@ CVE-2024-21129,0,0,46efd627f8b87e045268cbee292986282d76e8b338e8626a07344d3f76a5e
CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000
CVE-2024-21130,0,0,c5d206e6fb887c84baa9c493ebc7d93f2ba4e2f0bacd858d2d5741cf02d71f96,2024-07-17T13:34:20.520000
CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
CVE-2024-21132,0,0,a847eec6e39593d2e3be335daccbaa7566fca94a3cea944f277ae6077eb8c167,2024-07-17T13:34:20.520000
CVE-2024-21132,0,1,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
CVE-2024-21133,0,0,9a1197ce9530b48696d53f4b8d6c0bb018d1a324656fccf337eedb1d5dc8a23b,2024-07-17T13:34:20.520000
CVE-2024-21134,0,0,631920bbbb3f0a2e285eb8830426e0d345e96a6482baa287298491b83a91756a,2024-07-17T13:34:20.520000
CVE-2024-21135,0,0,9aadd6ca5a38f239443e4aa9211c7acd69c8becfda2781dc6ecf3e89d27baedd,2024-07-17T13:34:20.520000
CVE-2024-21136,0,0,ad8ed641eb9e0dfe773d7b453ce1a777791004300592ffcb4b9aeccb6189d2b8,2024-07-17T13:34:20.520000
CVE-2024-21136,0,1,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
CVE-2024-21137,0,0,8b1ccafbde54d689b232a5ba4da880526c6b578bae146f59db158760bdc4f414,2024-07-17T13:34:20.520000
CVE-2024-21138,0,0,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000
CVE-2024-21139,0,0,ac1e7874c883d227974696e6da1f4ea74ebc9ccd7cdf45b6f9f9065cbabb6c27,2024-07-17T13:34:20.520000
CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3d60,2024-08-01T13:46:27.193000
CVE-2024-21141,0,0,a46fdd63fb31ff99b4780cb153ac9f2ae29000b590679f43cbb64095a7fb0c47,2024-07-17T13:34:20.520000
CVE-2024-21141,0,1,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
CVE-2024-21148,0,0,7bc96a76ce0077505eae8d68abc8206f3ba6f186267ade9b3eedb49371d494f1,2024-07-17T13:34:20.520000
CVE-2024-21148,0,1,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
CVE-2024-21150,0,0,8bf7ad156aade7fa3f13e2261e319a8085198969642f90d90774096fb77f35b3,2024-07-17T13:34:20.520000
@ -243689,11 +243698,11 @@ CVE-2024-21158,0,0,abd2177430b15289f1dafe8369befc77334519d6a9221a02b1f5bfbbc009d
CVE-2024-21159,0,0,2ff4efcbe3aa08e46da9e0946901b69656a8a1ad9976fd197b8e18d6231382c7,2024-07-17T13:34:20.520000
CVE-2024-2116,0,0,db5680b78c73e9ed7444fef2da21a0c5bcac8a3e521c07413a62cc0c6dfac6ff,2024-03-29T12:45:02.937000
CVE-2024-21160,0,0,20f8ad0ce54327b1482f0174779d6b8936bf9313ce550cb111b84c1a3729be73,2024-07-17T13:34:20.520000
CVE-2024-21161,0,0,612c4884deeafecd7580dfdbda30fa8bdd1ab1716fdba44ef79465dbc125b3e1,2024-07-17T13:34:20.520000
CVE-2024-21161,0,1,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000
CVE-2024-21162,0,0,6599b8c3e8d4ce2bd56d758955204dc60835461542055bd440e060f275edef92,2024-07-17T13:34:20.520000
CVE-2024-21163,0,0,1c218c6447f5bc6b8f4a4bcf8e9b987dd785d628ca9f5052cf582edba99f160a,2024-07-17T13:34:20.520000
CVE-2024-21164,0,0,409d31e6725bddcbc7809866c9718b7fe29398e89ea9c04f4ddf0f02e0b7f477,2024-07-17T13:34:20.520000
CVE-2024-21165,0,0,20993784304d7762a8021f9b16e9507bbf65223455c94632351bf958464a2463,2024-07-17T13:34:20.520000
CVE-2024-21164,0,1,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000
CVE-2024-21165,0,1,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000
CVE-2024-21166,0,0,ede3b755f5804621a8ef25d79d9679055f7e04ae20b8138869340e09adf91227,2024-08-01T13:46:33.843000
CVE-2024-21167,0,0,68c8f227666c06298257f7b468706125c2676562df674ce8154b7de7b4496211,2024-07-17T13:34:20.520000
CVE-2024-21168,0,0,c69572c1110a4cc480c0e5afb70d08f9984a6bb55f4f3c55f471c687df059b4a,2024-07-17T13:34:20.520000
@ -244065,7 +244074,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6
CVE-2024-21677,0,0,172011c5d5a06c0e2ca2f356ecd05cb171d9f8cbcabb5b389ad48344d43d1ad1,2024-03-20T13:00:16.367000
CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc778397e,2024-02-20T19:50:53.960000
CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000
CVE-2024-21682,0,0,ea94962fb19bc771b1e7e5a4a1b57027a5c5c8b332b79d32007472ab6d5177d5,2024-02-20T19:50:53.960000
CVE-2024-21682,0,1,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000
CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000
CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
@ -244096,7 +244105,7 @@ CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc
CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000
CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000
CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000
CVE-2024-2174,0,1,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000
CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000
CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000
@ -244421,7 +244430,7 @@ CVE-2024-22182,0,0,b8c6625a5282a72f76fb60314413b773d9f3fb9c9d9f485e5d536e19dd0bf
CVE-2024-22184,0,0,e3b13ffe675f8579db3776363f4670ba9137f26137c3f424c46d120f2b78c4bf,2024-08-14T17:49:14.177000
CVE-2024-22186,0,0,59ecddd100ddcae06a7ecf9fc641630f9ab4f57ca25d5313e480ef6c07a40e52,2024-05-28T17:15:09.680000
CVE-2024-22187,0,0,764c633f29a9b7a4988eca707a5f5a20cd222e9e3850a0ea108932eed046a25b,2024-06-10T18:15:25.660000
CVE-2024-22188,0,1,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000
CVE-2024-22188,0,0,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000
CVE-2024-22189,0,0,fea0be1a5a7409c880f87752eeb084fafd5b6d1284d3177e6521b5c7516d6ecd,2024-04-04T16:33:06.610000
CVE-2024-22190,0,0,e6ac33b356ba6a74674e45bf7cdf7d2f2e69f941856b85a391b927bae4fad4a8,2024-01-18T13:48:07.553000
CVE-2024-22191,0,0,f7f1b03cf67feaead11389a4af47a24ff41e590c594aa0c037973685b4253fd3,2024-01-24T18:13:53.947000
@ -245030,7 +245039,7 @@ CVE-2024-23212,0,0,f80d0116e96d75ecefd545c3526dcd4d5f88bcbed5b339e1c95b1820f7413
CVE-2024-23213,0,0,3accb2e6ca7cc402e236c9474680e18edadbd0d691e602685b9c7a01131e56df,2024-06-12T10:15:29.957000
CVE-2024-23214,0,0,33119634a46fa5c4e530acd0e9c618db34847fde568cfa47bd7b42b58ac780ef,2024-06-12T10:15:30.080000
CVE-2024-23215,0,0,33fc650ebd8d97f7539b32750e085a2fd8b81965edd8ee0561acd57fa017b4eb,2024-01-30T16:17:32.130000
CVE-2024-23216,0,1,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000
CVE-2024-23216,0,0,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000
CVE-2024-23217,0,0,22b8aabc2c537f06727d28ccece5638ac7f57c64b05d618b0085cec7c37d61be,2024-03-13T22:15:09.273000
CVE-2024-23218,0,0,764d9591d3c5e993d8e4b9e38693ec8072deb6341bcae3b3215d2e62a14277ea,2024-03-13T23:15:46.027000
CVE-2024-23219,0,0,478ca77553ffcd9677d8ceaf589ef8d6cf6bae32d2a8df76b85c410ad74b3348,2024-01-30T14:36:42.017000
@ -245058,7 +245067,7 @@ CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0
CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000
CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000
CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000
CVE-2024-23244,0,0,455d9fe185a5ba98c85be5a60bcc93f0c8059eb317391f8af99e553d44b61dc5,2024-03-13T23:15:46.480000
CVE-2024-23244,0,1,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000
CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000
CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000
@ -245093,7 +245102,7 @@ CVE-2024-23272,0,0,862f7d259a6cfce25fc04a6db8d5e2417105b7f51cabfc9af10955b3e49ce
CVE-2024-23273,0,0,8ea5a132f7f9599d563a8466af6d69a139c2be77bdbd7e0c7a2fee86dd445737,2024-03-14T19:54:26.287000
CVE-2024-23274,0,0,d63dec58c682291f417ab20be0e0fbb2c8ea2b0b1f5246aeb4f66431c08118d0,2024-08-01T13:47:13.570000
CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8dfedf,2024-03-14T20:34:02.077000
CVE-2024-23276,0,0,6f3b52f749f8311c4232b3c82ff3f246f15d88c45d906f1a4e0e3bdde6ac41e7,2024-03-14T20:34:18.527000
CVE-2024-23276,0,1,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
@ -245106,7 +245115,7 @@ CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdf
CVE-2024-23285,0,0,5a0d4d7d553005e90735503704fdc16408a5286a022afa1dff47851a5d56c396,2024-08-27T21:35:09.383000
CVE-2024-23286,0,0,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000
CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000
CVE-2024-23288,0,0,26b1136d0d4444408c9f51d02208acadeac0b309c2fd8cd24b38e5f71e3d14bf,2024-03-13T22:15:11.173000
CVE-2024-23288,0,1,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000
CVE-2024-23289,0,0,88178045365eb11e89ccefeb5771451d6b6166955f5f6c5f6a64f2f080826233,2024-03-13T22:15:11.227000
CVE-2024-2329,0,0,11e6f1e43e05cca18867c7d5c048956c7fecd23b0254816ac97fead1b2517ae0,2024-05-17T02:38:10.443000
CVE-2024-23290,0,0,c464194e225931bf0d2137cac165c36f9146fd1d9e1ad3c4a6426c7b4df4b92d,2024-03-13T22:15:11.280000
@ -245437,7 +245446,7 @@ CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
CVE-2024-23721,0,1,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000
CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000
@ -245683,7 +245692,7 @@ CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000
CVE-2024-24043,0,0,e1968910fbe3303046e08aad0f620638588dfecc0e402ebdf747bad91bf95f6f,2024-03-19T13:26:46
CVE-2024-24043,0,1,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000
CVE-2024-24050,0,0,d8a497c77556b4efbe72dd469fd71e81b74bd8a1e54cb63f7dab3892d7471943,2024-03-21T12:58:51.093000
CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000
@ -245730,7 +245739,7 @@ CVE-2024-24148,0,0,a02156e49f720741f5d47ffecf3d295f680f99f45fd5e722459fdf6b3749f
CVE-2024-24149,0,0,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee0a5,2024-08-13T19:35:04.837000
CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000
CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000
CVE-2024-24155,0,0,2c63d7924f0cfbcec05c8391f1806e0f50aabfd2ca7e4c7b5af6f390f137d171,2024-02-29T13:49:29.390000
CVE-2024-24155,0,1,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000
CVE-2024-24156,0,0,4d905495fcc21ea03b392e5dcfb4049afb36c88ec6395d026fb3a826675269b3,2024-08-19T20:35:03.650000
CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000
CVE-2024-2416,0,0,509b47b2b38dd8150594dfd075dd7f079b3bbd22e8420f2d63fb8a39e8d3ccb0,2024-03-13T12:33:51.697000
@ -245801,12 +245810,12 @@ CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583
CVE-2024-2432,0,0,57240eece5c1b31c057486728f6363c9217250d91f3d10c0c941fdad51a7f6e5,2024-03-13T18:15:58.530000
CVE-2024-24320,0,0,a5847bec026f9a38211f5c0373776488eb6f7d35353beef2a24ffd1ecc8d8864,2024-08-21T14:35:04.240000
CVE-2024-24321,0,0,88c98cb76542c8acb076726441dae70ba16682bd2171c6fbca3804855a845a0c,2024-02-15T05:02:58.427000
CVE-2024-24323,0,0,87c9f21a2b792326c3395038aca05fa9c659ed3affd70ad21bad1ba52479ce4a,2024-02-28T14:06:45.783000
CVE-2024-24323,0,1,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000
CVE-2024-24324,0,0,e65b7320bc70eb87aafe69f87ce443d4231ab35603a9991590cdc2a337dea76b,2024-02-01T04:49:29.220000
CVE-2024-24325,0,0,c48bdb59f66fc453df8a65a409e26ae0fc9e608ab91641625410877a482dad6a,2024-02-01T04:49:27.410000
CVE-2024-24326,0,0,ffd176ee9cc205937cd1eaded7dc4a650316e43005277f1af89616e40875e18b,2024-02-01T04:49:24.940000
CVE-2024-24327,0,0,b496192967607b64939b46dfafe2c91cb919e1f1a3928b7c8c6e7165f4559273,2024-02-01T04:49:22.830000
CVE-2024-24328,0,0,6ead54e0ed7aac5b64071a50f85f248cebff3b6d5e997fc6c92b63dc8aee1aa4,2024-02-01T04:49:21.037000
CVE-2024-24328,0,1,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000
CVE-2024-24329,0,0,cd2cef58182ccada9d789908a0715e06b22ee8c2346a6ad57e7666e3ca17fc5f,2024-02-01T04:49:18.867000
CVE-2024-2433,0,0,af22ac085d1109b732837345c936d39f0c3c18741ae1714b3ff1934488777262,2024-03-13T18:15:58.530000
CVE-2024-24330,0,0,6f4394e82ffdaddc9904fbc3397bf25ed86fab2a1cc87acc40260a4358ba28b7,2024-02-01T04:18:43.927000
@ -246275,7 +246284,7 @@ CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd8
CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000
CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000
CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000
CVE-2024-25083,0,0,9d2f407cabf3a12bbd22cd36b42859a90ce2fc840877d4b234c6f6f10f6ee54c,2024-02-16T21:39:50.223000
CVE-2024-25083,0,1,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000
CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
@ -246449,7 +246458,7 @@ CVE-2024-25344,0,0,db69ab30d7794b839b183db3e507228c9f3f45497af2375243b3fe88a539e
CVE-2024-2535,0,0,1d4fc1154e21273a7c74f61b7c8874d973288768c48e8247cc99c965af9b7c7f,2024-05-17T02:38:18.023000
CVE-2024-25350,0,0,3eadafce3b2244ddf5f3884efc711bcacedce55f760934f937927ed6e35502b0,2024-08-01T13:47:41.340000
CVE-2024-25351,0,0,799dbc66bff5fa6efdf5aa91495ce5a0210c4cb89c79f9796068de8220467c77,2024-08-26T20:35:14.720000
CVE-2024-25354,0,1,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000
CVE-2024-25354,0,0,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000
CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000
CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6ca08,2024-08-02T20:35:24.740000
CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000
@ -246567,7 +246576,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
CVE-2024-25576,0,0,1298eb71baf232c73dfc082da86c1a427fcac3907201ddd5e757f1be26775922,2024-08-14T17:49:14.177000
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,3ce7817b4efbfe814fc7f2f138ef6147015c649f3e26a4e4549fa9163410577a,2024-06-12T01:15:49.137000
CVE-2024-25579,0,1,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8cc67,2024-03-27T12:29:30.307000
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
@ -246640,7 +246649,7 @@ CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
CVE-2024-25655,0,0,e15adc8eac4466bc206ecbf344e823f2dc60c695c8e2b528f93955091c188195,2024-03-19T13:26:46
CVE-2024-25655,0,1,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
@ -246747,11 +246756,11 @@ CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fa
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
CVE-2024-25854,0,0,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000
CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000
CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000
CVE-2024-25859,0,1,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000
CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000
CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000
CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000
CVE-2024-25866,0,0,9800d1d73cf4e02f2835e7808c820220d82c6c39d582e9178e2e2aa396a9c576,2024-02-29T13:49:47.277000
CVE-2024-25866,0,1,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000
CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000
CVE-2024-25868,0,0,8468e8c7cd26d2e5838f8da558add0a0ea34e7d6538ad367885aebb852006e2e,2024-08-27T20:35:15.173000
CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000
@ -246919,7 +246928,7 @@ CVE-2024-26045,0,0,0acb4c430eb04b486f9fde8afbebe04bb30c7a2da9501b59437c922e62ac2
CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000
CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000
CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000
CVE-2024-2605,0,1,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
CVE-2024-26050,0,0,a01e15c84b45a65b3bc336a569ca46f534ec28925a3745536846dbd737880774,2024-03-18T19:40:00.173000
CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000
CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000
@ -246963,7 +246972,7 @@ CVE-2024-26086,0,0,ae34cc70c1fb5245418ea1021c46e145477ed2510ed19be388b0597933b58
CVE-2024-26087,0,0,886690623538c9b67d73b3140abb23679c4e72a1155e44ccb96173e256c726c6,2024-04-10T13:23:38.787000
CVE-2024-26088,0,0,aed72cfe3c05269ae6fa7444f7478df5bb7d6d6fd37a95c7c481f7f0efb015d9,2024-06-14T20:10:01.653000
CVE-2024-26089,0,0,87f38a9968c3e4028ac78d2f547942af5af438b7e5b9b22788cce73b35aca8df,2024-06-17T20:32:03.657000
CVE-2024-2609,0,1,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000
CVE-2024-2609,0,0,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000
CVE-2024-26090,0,0,ed98f35d571423c5ef53e825d7ea9212d7ca429e14c4d90b79333d7179f2c1a9,2024-06-17T20:32:18.073000
CVE-2024-26091,0,0,432c29cd1da1e6c9f8652a2bc2bfacfd01862e5bf100718ad43ba6760143b36d,2024-06-17T20:32:37.817000
CVE-2024-26092,0,0,67476159c2a94aa6c3caf2c7ea973d42f985c77e89e69f10705b74d3b72d9b65,2024-06-14T19:55:31.347000
@ -247023,7 +247032,7 @@ CVE-2024-26146,0,0,554fce310a1cb01edbb3b3f06f7dd6d6c768a6125a05ad6a5f05315540519
CVE-2024-26147,0,0,31938bfd609e440a2f1803807cf5ed67ed95c5f9b331c66db59a00a1433a779e,2024-02-22T19:07:27.197000
CVE-2024-26148,0,0,db984f5e17193fef4f237cfc03c668c1be3c9c198ae40220b6dfc6aeb32d7d9f,2024-02-22T19:07:27.197000
CVE-2024-26149,0,0,cdd4ff9e035195557225db24049cf1e570f0b2e25d95a9e4fdf8b2509a4f3d3a,2024-02-26T22:10:40.463000
CVE-2024-2615,0,1,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000
CVE-2024-2615,0,0,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000
CVE-2024-26150,0,0,724a23f6f5cd2b08e078faf9766b70ef43f45650f38390687bb0597c880332b3,2024-02-23T19:31:25.817000
CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639eb1,2024-02-23T02:42:54.547000
CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000
@ -247122,7 +247131,7 @@ CVE-2024-26245,0,0,d8e7715693a4c17db96124229016576d132c978af86f165ed843021cc0e24
CVE-2024-26246,0,0,281c00482b3c35bb6fb58282b68f55f76ce6bc574686f37dcb024dae18841f5f,2024-06-11T16:15:22.197000
CVE-2024-26247,0,0,2e08eb3ba6b627c10ba27bd8963a5aabfaab07773e08696de8ef39c9e2d29c88,2024-06-11T16:15:22.333000
CVE-2024-26248,0,0,1d69ec410d789e5cecdce5ca5f00f4cb4dc73522c17a80577a09df4303fbce8e,2024-04-10T13:24:00.070000
CVE-2024-2625,0,1,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000
CVE-2024-2625,0,0,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000
CVE-2024-26250,0,0,361a4a598e17b5e0caa4dfe07f1d82a4b2b3caf0473c9778a9a5173e920f20ed,2024-04-10T13:24:00.070000
CVE-2024-26251,0,0,752d1c2a1c430ddddba02d64b195b606d79a2c3854c081fbabcf7b1750edf415,2024-04-10T13:24:00.070000
CVE-2024-26252,0,0,a16ea7a04b440699076d4a90d57b94e69adc561ff365215a47bfe0edfb85ff13,2024-04-10T13:24:00.070000
@ -247178,7 +247187,7 @@ CVE-2024-26307,0,0,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592
CVE-2024-26308,0,0,b4d73560210ad1a249254bb49e208942ee75ee7f41147c3b9e47cd68fff84e87,2024-03-21T19:54:03.230000
CVE-2024-26309,0,0,2640b5966073fd3d518fa5abac6bf90144529b272adda5f9f180e91c567c3f6b,2024-03-08T14:02:57.420000
CVE-2024-2631,0,0,c40f6cd20ef48d6d5340c38d8cfe42cec4782b3ae9f2af1e0914d012954c4b8c,2024-04-01T15:23:45.590000
CVE-2024-26310,0,1,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000
CVE-2024-26310,0,0,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000
CVE-2024-26311,0,0,28ff8a1b0384f422415c01ccf263a2e9d55cfdafba39542393811f1550f890d2,2024-02-22T19:07:27.197000
CVE-2024-26312,0,0,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000
CVE-2024-26313,0,0,f4cc2c8a31f2a657cb8e56530069fdda1b7331701b9b323e9b20a0d62c414aa3,2024-03-08T14:02:57.420000
@ -247229,7 +247238,7 @@ CVE-2024-26467,0,0,f852e96e7aa9bd31104a7a5efbb92bf78ab3732b64936f49fadf5127e2447
CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ececaf,2024-02-26T16:32:25.577000
CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000
CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000
CVE-2024-26470,0,0,c7b5d7dc6fff2b462a4e7b75eff02406620bfb4a3f9caec2a7328aed1e8f840f,2024-02-29T13:49:29.390000
CVE-2024-26470,0,1,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000
CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000
CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000
@ -247247,7 +247256,7 @@ CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee3
CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000
CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000
CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000
CVE-2024-26503,0,1,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000
CVE-2024-26503,0,0,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000
CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000
CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000
CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000
@ -248294,7 +248303,7 @@ CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663
CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000
CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000
CVE-2024-27744,0,0,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000
CVE-2024-27746,0,1,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000
CVE-2024-27746,0,0,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000
CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000
CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000
CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000
@ -248622,7 +248631,7 @@ CVE-2024-28120,0,0,31f0663194c3ae59508b649362ee2d5539147691a5912e9e045c000f7246f
CVE-2024-28121,0,0,5d765bddd1522ef772672d7c5b7d192742701db6f681e7efbb273dbd45669d62,2024-03-13T21:16:00.460000
CVE-2024-28122,0,0,84073f6c96d7936717c065299f48850cb9a25df36eb3f8060c8dc4aa02997344,2024-03-11T01:32:39.697000
CVE-2024-28123,0,0,1f90dd93aca0d11a73a18e1eb6b5cda27a407eb4db9e34eaa0e325666a8f1c24,2024-03-21T12:58:51.093000
CVE-2024-28125,0,0,d05b4beef18ff94cb171b45d1bff2e0f308181a912ef6501300c9c027e77556c,2024-03-18T12:38:25.490000
CVE-2024-28125,0,1,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000
CVE-2024-28126,0,0,81385e85c5a93c53bb47fe916edfff61f701ac34a4427a9e5bf459631bdea34d,2024-03-26T12:55:05.010000
CVE-2024-28128,0,0,ff9121c55a5d465f19f3056b6278dc961489b664c0de60bae39143ce763e9dc9,2024-03-18T12:38:25.490000
CVE-2024-2813,0,0,d92b59c3edc51ec01f06a151ea9186c3488c58069c0b5769bb5f8edad6a74d59,2024-05-17T02:38:31.770000
@ -248767,7 +248776,7 @@ CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000
CVE-2024-28339,0,1,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
CVE-2024-28344,0,0,07e206e8ae7b1052e93419db971a4a320fe24d9f630cd6feb731f0be928f9073,2024-07-03T01:51:39.137000
@ -248832,10 +248841,10 @@ CVE-2024-28515,0,0,a1e2389b4555eab5e18310c7e283a6a35bc4bcaedf003e200c7e78de4e2e3
CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000
CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000
CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000
CVE-2024-28521,0,1,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000
CVE-2024-28521,0,0,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000
CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000
CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000
CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000
CVE-2024-28537,0,1,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000
CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000
CVE-2024-28545,0,0,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000
CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd135e7,2024-08-15T17:35:04.350000
@ -248888,7 +248897,7 @@ CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a4
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
CVE-2024-28639,0,0,add78e1164c8df42f8993d3ec4e8bcc5efcf9c67ce1cf3d76c2a38423013e9f5,2024-03-17T22:38:29.433000
CVE-2024-2864,0,0,0b7092f6657eda771a1a9211b6ecdc80d9c4229cfeb8d1413066da331f243b95,2024-03-25T13:47:14.087000
CVE-2024-28640,0,0,106c587776d7eaa30d047f09c3864bea29de634863ccad6bc6dabf8d3997046e,2024-03-17T22:38:29.433000
CVE-2024-28640,0,1,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000
CVE-2024-2865,0,0,55e62f341bb00366e8e43c3aae92bec34f13cdc149d9c58605d949f8282b8ec7,2024-03-25T16:43:06.137000
CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000
CVE-2024-28662,0,0,dab9197cc819aeac0bf0ea06401058d5cc75e9a0ba3a4ce1ecd76d7bcd7e31f2,2024-03-14T12:52:16.723000
@ -248896,7 +248905,7 @@ CVE-2024-28665,0,0,1bcb843df69123849882283a8f9fca9c4abb51adf88a0a7fc25bcd7f8392f
CVE-2024-28666,0,0,9909b1d8b42ce81db5680c2cff308836e3dc86a07602ebc3692c51a5608b0d49,2024-08-02T21:35:23.507000
CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371374,2024-08-05T19:35:10.487000
CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000
CVE-2024-28669,0,1,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000
CVE-2024-28669,0,0,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000
CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000
CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000
@ -248910,7 +248919,7 @@ CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
CVE-2024-28682,0,1,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000
@ -248948,7 +248957,7 @@ CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e9
CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000
CVE-2024-28755,0,0,a971352ccfd1d9312c8fc951387a64198c3d2967458d020bfed491bd6af81566,2024-04-03T12:38:04.840000
CVE-2024-28756,0,1,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000
CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000
CVE-2024-2876,0,0,96b96473aca77aa576cfbfd4fdd62bd6bbdb12d76f0bee3d312855d2e34a9cd3,2024-05-02T18:00:37.360000
@ -249257,7 +249266,7 @@ CVE-2024-29128,0,0,77fce425c49ac339ee33e12f1b3878cbdddd513fcac87acb1ce6cb06f4726
CVE-2024-29129,0,0,022433b928b77b4e11df8137329a8e805ce777a51e5c390569874776ed9f1d92,2024-03-19T14:31:27.883000
CVE-2024-2913,0,0,f13b68719789b0ec1d0ac3f00293efe13ae2d2476f7393cb029a386c10b9d5fb,2024-05-07T13:39:32.710000
CVE-2024-29130,0,0,3c5ab042ef8fedd1c9b8f15ab543cc07d9c157ccb5fa600e78e62121be1aee44,2024-03-19T14:31:27.883000
CVE-2024-29131,0,1,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000
CVE-2024-29131,0,0,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000
CVE-2024-29133,0,0,36561ecc1d25beeebffdfe71774843942f6f7498bb13fffd291f6157a4b0ff67,2024-05-01T17:15:31.283000
CVE-2024-29134,0,0,64d7104dca1a7039d75ee2143ca2d6681014df1f5270f4434e5925abd69f5cba,2024-03-19T14:31:27.883000
CVE-2024-29135,0,0,82b1b4a3f7dec94f8bbc60ae3c283e311437a5e9bda89959429180db805aaa10,2024-03-19T14:31:27.883000
@ -249368,7 +249377,7 @@ CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b
CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000
CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000
CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d38b,2024-05-17T02:38:37.557000
CVE-2024-29271,0,1,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000
CVE-2024-29271,0,0,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000
CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000
CVE-2024-29273,0,0,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65fffd8,2024-08-27T21:35:20.250000
CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000
@ -251064,7 +251073,7 @@ CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda82
CVE-2024-31809,0,0,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000
CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000
CVE-2024-31810,0,0,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000
CVE-2024-31811,0,1,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000
CVE-2024-31811,0,0,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000
CVE-2024-31812,0,0,e59d4fa5975f0119da4cfd4900343a38d484d0506f79ca6ee0996d32731f70d0,2024-08-01T13:51:11.397000
CVE-2024-31813,0,0,29e23c3e48f06162164aa0d6475a9681cc76184b2c7d19a6059995c0e6dd7e35,2024-04-08T18:48:40.217000
CVE-2024-31814,0,0,9e4411c92895e7b973cb8cdaa5d063ce91670d843374d0de8b17a9f579b1c377,2024-08-01T13:51:12.177000
@ -252662,7 +252671,7 @@ CVE-2024-34083,0,0,be7ff33683a966fd2e2a91bd6e6ef912f3af6f70d27ba06b83f6ba7e43054
CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1796,2024-05-07T20:07:58.737000
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
CVE-2024-34087,0,0,5426f4aa57991d63a28f5e8b07028c60fe5b8f0b154c31b4e8cd3001af26d0dc,2024-08-26T19:10:18.890000
CVE-2024-34087,0,1,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
CVE-2024-34090,0,0,4dc7a0402f56619348ec9c3e24642b60cff8f706f450ee8cc2f0663fc31edfc2,2024-05-06T19:53:38.797000
@ -252737,7 +252746,7 @@ CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233
CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
CVE-2024-34198,1,1,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000
CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000
@ -253452,10 +253461,10 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b
CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000
CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000
CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000
CVE-2024-35325,0,1,4b80666b63fc2d080ad0ef78d60bca54774976fcbb99e3bbc447d091344fce9e,2024-08-28T14:15:08.433000
CVE-2024-35326,0,1,785b7c0f0611cee707ab55e4e91e7281ee39cefedfaae81dcfde51906229e1f9,2024-08-28T15:15:16.590000
CVE-2024-35328,0,1,e32cbb90dfa97693b919430d56bab63542e4093ad25a37c20d599be5a44e71ea,2024-08-28T15:15:16.750000
CVE-2024-35329,0,0,4d7aa78fa054a9381ac03b56ef696af98c93a3855ee38f8a31593aacb03aa73e,2024-08-02T03:15:51.520000
CVE-2024-35325,0,1,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000
CVE-2024-35326,0,1,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000
CVE-2024-35328,0,1,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000
CVE-2024-35329,0,1,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000
CVE-2024-35338,0,0,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000
@ -255876,7 +255885,7 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,0,b96edffa3c5d3c056b0b683b5901b7d1b42d5c04f23c921a537c2a85ba0d9c15,2024-08-28T01:00:00.950000
CVE-2024-38856,0,1,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
@ -256420,7 +256429,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
CVE-2024-3980,0,0,49f4e2a123078274984196ef63d2506b6e8e655b0a6bda271789de0fb7938b36,2024-08-27T15:52:01.317000
CVE-2024-3980,0,1,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000
CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000
@ -256428,7 +256437,7 @@ CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2
CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000
CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
CVE-2024-3982,0,0,a0de489e3433ce3a86a9c4e65d10b7ac468577660531b6c8501a0094ff1cccce,2024-08-27T15:52:01.317000
CVE-2024-3982,0,1,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
CVE-2024-39822,0,0,cb2d1986932d128ad1eb7e7cc883dcc2562e93b2f186e64c96f02bfcb19b2244,2024-08-14T17:49:14.177000
@ -256514,7 +256523,7 @@ CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae345056
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
CVE-2024-39930,0,0,7b1072f578db5486acad330ef551c9af3d89161af147b6932a05219f09829b8e,2024-08-12T19:35:09.940000
CVE-2024-39930,0,1,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000
CVE-2024-39931,0,0,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000
CVE-2024-39932,0,0,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000
CVE-2024-39933,0,0,b6d32209bff3b62be34bd9bfc29ae3793bbd5d0463ddb473f2add5c3bc3eb1dd,2024-07-12T16:11:56.423000
@ -257155,7 +257164,7 @@ CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
CVE-2024-41310,0,0,411e679a4d87025cfbd714a6e1af5ab48738e4397cbbc5202ae220b932f1975c,2024-08-05T12:41:45.957000
CVE-2024-41310,0,1,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000
@ -257223,6 +257232,8 @@ CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a8
CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b51898fb,2024-08-01T13:58:53.253000
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-41564,1,1,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000
CVE-2024-41565,1,1,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
CVE-2024-41572,0,0,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000
@ -257257,8 +257268,8 @@ CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d
CVE-2024-41651,0,0,57f3cb7d00e7e9511d0d03f9437ce1a28380d574f08dab4c3cea3241ce2f7fe3,2024-08-14T21:35:07.780000
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
CVE-2024-41657,0,0,482cc991d05bcd3eb066c0c56d874cc7b42b646258450f155c57d61a96a8fda1,2024-08-21T12:30:33.697000
CVE-2024-41658,0,0,7b1c1c3712bae12126c9b8d3964c233fb804348f9c0993c62ac378019e83523e,2024-08-21T12:30:33.697000
CVE-2024-41657,0,1,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
CVE-2024-41658,0,1,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000
CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
@ -257944,6 +257955,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
CVE-2024-42698,1,1,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
@ -258008,7 +258020,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
CVE-2024-42818,0,0,95f0b34855c9e871f13f61a27d7d6c078da48a4416445325f9775ca851de2f13,2024-08-26T19:10:18.890000
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
CVE-2024-42845,0,0,41f949a7278b40e93c96bce086a04dddafae3cccde3fe1baa3e17a4aa01d20bb,2024-08-26T12:47:20.187000
CVE-2024-42845,0,1,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28
@ -258018,6 +258030,7 @@ CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c26
CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
CVE-2024-42900,1,1,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000
@ -258481,7 +258494,7 @@ CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c7
CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000
CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000
CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000
CVE-2024-43915,0,0,527eaabdc21342738de4963484c9dc8224b73fd991fc0a05e81028cc4df2773a,2024-08-27T13:01:37.913000
CVE-2024-43915,0,1,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
@ -258501,7 +258514,7 @@ CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543f
CVE-2024-44070,0,0,335509dea99ada6c9ff96f06f0e87dab6ba3af229752b80bde023da9415a33b1,2024-08-21T14:35:15.433000
CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000
CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000
CVE-2024-44083,0,1,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000
@ -258686,7 +258699,7 @@ CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc2559350
CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
CVE-2024-45346,0,1,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000
CVE-2024-45346,0,0,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000
CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000
CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
@ -258989,7 +259002,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
CVE-2024-4872,0,0,eb6d7f4214203eee8a6cb72e8d792186755c20a5d101f33f66ef4b3cea8dad55,2024-08-27T15:52:01.317000
CVE-2024-4872,0,1,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
@ -259973,6 +259986,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000
CVE-2024-6053,1,1,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000
@ -260567,7 +260581,7 @@ CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d537
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
CVE-2024-6879,0,1,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000
CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000
CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
@ -261118,7 +261132,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb
CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000
CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
CVE-2024-7720,0,1,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000
CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000
CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000
@ -261134,6 +261148,8 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
CVE-2024-7744,1,1,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000
CVE-2024-7745,1,1,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000
CVE-2024-7746,0,0,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
@ -261232,8 +261248,8 @@ CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bb
CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000
CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000
CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000
CVE-2024-7940,0,0,c6f423f2b42a2fa2f207dbe4fa5849cf630d4d81436ada726895ff9b4151e77e,2024-08-27T15:52:01.317000
CVE-2024-7941,0,0,77b44bc4d6878b7df0eb95e35f81ca8d59535ebb8b2e02ca2418a09213f68a6b,2024-08-27T15:52:01.317000
CVE-2024-7940,0,1,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
CVE-2024-7941,0,1,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000
CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000
CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000
@ -261292,7 +261308,7 @@ CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa
CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000
CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000
CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000
CVE-2024-8088,0,1,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000
CVE-2024-8088,0,0,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000
CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000
CVE-2024-8105,0,0,752bedc9f1c31babb6206d0feb37f4463554ca0baee90f1af7f94ac05e52579f,2024-08-27T13:02:05.683000
CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000
@ -261342,7 +261358,7 @@ CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b
CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000
CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8195,1,1,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000
CVE-2024-8195,0,0,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000
CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000
CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000
CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000

Can't render this file because it is too large.