diff --git a/CVE-2016/CVE-2016-98xx/CVE-2016-9842.json b/CVE-2016/CVE-2016-98xx/CVE-2016-9842.json index 3a270b5460c..b9888043c3b 100644 --- a/CVE-2016/CVE-2016-98xx/CVE-2016-9842.json +++ b/CVE-2016/CVE-2016-98xx/CVE-2016-9842.json @@ -2,8 +2,8 @@ "id": "CVE-2016-9842", "sourceIdentifier": "security@opentext.com", "published": "2017-05-23T04:29:01.837", - "lastModified": "2023-11-07T02:37:36.463", - "vulnStatus": "Modified", + "lastModified": "2024-08-28T16:07:50.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,10 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gnu:zlib:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.2.3.4", "versionEndExcluding": "1.2.9", - "matchCriteriaId": "27DBF1B3-EBCE-4F4E-A83C-98DFE157D524" + "matchCriteriaId": "018FE9CE-4D44-4A7D-90DB-A2B1953B5B7F" } ] } @@ -147,8 +147,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", - "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" } ] } @@ -366,123 +366,221 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2016/12/05/21", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/95131", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1039427", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1220", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1221", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1222", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:2999", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3046", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3047", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3453", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/201701-56", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-54", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208112", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208113", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208115", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208144", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4246-1/", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4292-1/", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json index 3c5f9642fc2..1c32e7a3544 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json @@ -2,7 +2,7 @@ "id": "CVE-2018-25099", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T05:15:06.007", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-08-28T16:35:00.880", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el m\u00f3dulo CryptX anterior a 0.062 para Perl, gcm_decrypt_verify() y chacha20poly1305_decrypt_verify() no verifican la etiqueta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/DCIT/perl-CryptX/issues/47", diff --git a/CVE-2019/CVE-2019-198xx/CVE-2019-19824.json b/CVE-2019/CVE-2019-198xx/CVE-2019-19824.json index 43bd2fa55ea..41a43b170aa 100644 --- a/CVE-2019/CVE-2019-198xx/CVE-2019-19824.json +++ b/CVE-2019/CVE-2019-198xx/CVE-2019-19824.json @@ -2,13 +2,13 @@ "id": "CVE-2019-19824", "sourceIdentifier": "cve@mitre.org", "published": "2020-01-27T18:15:12.960", - "lastModified": "2020-02-05T14:30:22.743", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T16:15:07.290", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0." + "value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2." }, { "lang": "es", @@ -330,6 +330,10 @@ "Third Party Advisory" ] }, + { + "url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities", + "source": "cve@mitre.org" + }, { "url": "https://sploit.tech", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json index 55a6134088d..4711ad625be 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12615.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12615", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T13:15:06.820", - "lastModified": "2023-12-15T16:04:51.323", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T17:35:00.743", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json index c4f07017a7b..683d2d22659 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1498", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-19T20:15:19.280", - "lastModified": "2024-05-17T02:18:10.733", + "lastModified": "2024-08-28T17:20:31.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:responsive_hotel_site_project:responsive_hotel_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6725818B-1AEC-4448-B8F4-02078ADD04FD" + "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15" } ] } diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json index 72367ff5cbe..49092cd6774 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42860", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.827", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-28T16:35:01.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213983", diff --git a/CVE-2023/CVE-2023-484xx/CVE-2023-48406.json b/CVE-2023/CVE-2023-484xx/CVE-2023-48406.json index 45cea4f448e..fcec5808ce0 100644 --- a/CVE-2023/CVE-2023-484xx/CVE-2023-48406.json +++ b/CVE-2023/CVE-2023-484xx/CVE-2023-48406.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48406", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2023-12-08T16:15:17.783", - "lastModified": "2024-03-12T21:15:56.447", + "lastModified": "2024-08-28T16:35:03.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49468.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49468.json index 798c2687de0..4208bb23c5b 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49468.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49468.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49468", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T20:15:38.477", - "lastModified": "2023-12-30T21:15:44.010", + "lastModified": "2024-08-28T17:35:02.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7017.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7017.json index efbfba9497f..ec723ff07a8 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7017.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7017.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7017", "sourceIdentifier": "cret@cert.org", "published": "2024-03-15T17:15:07.857", - "lastModified": "2024-03-17T22:38:29.433", + "lastModified": "2024-08-28T17:35:03.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El mecanismo de actualizaci\u00f3n de firmware de las cerraduras Sciener no autentica ni valida las actualizaciones de firmware si se pasan a la cerradura a trav\u00e9s del servicio Bluetooth Low Energy. Se puede enviar una solicitud de desaf\u00edo a la cerradura con un comando para prepararse para una actualizaci\u00f3n, en lugar de una solicitud de desbloqueo, lo que permite a un atacante comprometer el dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7085.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7085.json index 33f7a538f54..35c5f5b3474 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7085.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7085.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7085", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T19:15:06.160", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-28T16:35:05.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Scalable Vector Graphics (SVG) de WordPress hasta la versi\u00f3n 3.4 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a2ec1308-75a0-49d0-9288-33c6d9ee4328/", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7167.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7167.json index 67b04734e9c..f9fad3f28b5 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7167.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7167.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7167", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-27T09:15:37.293", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-28T16:35:05.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Persian Fonts de WordPress hasta la versi\u00f3n 1.6 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/6a2eb871-6b6e-4dbb-99f0-dd74d6c61e83/", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0015.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0015.json index efc6ca7ef47..4d4cfa73a0e 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0015.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0015.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0015", "sourceIdentifier": "security@android.com", "published": "2024-02-16T19:15:08.153", - "lastModified": "2024-02-16T19:26:55.393", + "lastModified": "2024-08-28T17:35:03.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En convertToComponentName de DreamService.java, existe una forma posible de iniciar actividades protegidas arbitrarias debido a la redirecci\u00f3n de intenci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n del usuario necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0973.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0973.json index fad79a65979..1ca00adf2d6 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0973.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0973.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0973", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T19:15:06.620", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-28T16:35:06.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Widget for Social Page Feeds de WordPress anterior a 6.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1273.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1273.json index a609348d6c6..36ba5fa21af 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1273.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1273.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1273", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-11T18:15:17.900", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-28T16:35:07.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Starbox de WordPress anterior a 3.5.0 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a usuarios con un rol tan bajo como Colaborador realizar ataques de cross-site scripting" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1316.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1316.json index 0d61ee796aa..623cc57f18f 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1316.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1316", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-04T21:15:07.007", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-28T16:35:07.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Event Tickets and Registration de WordPress anterior a 5.8.1, el complemento Events Tickets Plus de WordPress anterior a 5.9.1 no impide que los usuarios con al menos el rol de colaborador filtren la existencia de ciertos eventos a los que no deber\u00edan tener acceso. (por ejemplo, eventos borrador, privados, pendientes de revisi\u00f3n, protegidos por contrase\u00f1a y eliminados)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1331.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1331.json index 9a24bf68d09..4e73b0cf497 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1331.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1331.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1331", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T16:15:07.103", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-28T16:35:07.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Team Members de WordPress anterior a 5.3.2 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de autor y superior realizar un ataque de Cross-Site Scripting Almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/", diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json new file mode 100644 index 00000000000..f8c237d4da0 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20279", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:06.113", + "lastModified": "2024-08-28T17:15:06.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-cousmo-uBpBYGbq", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json new file mode 100644 index 00000000000..021999ed72e --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-20284", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:06.893", + "lastModified": "2024-08-28T17:15:06.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json new file mode 100644 index 00000000000..0db641b0fa2 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-20285", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:07.687", + "lastModified": "2024-08-28T17:15:07.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json new file mode 100644 index 00000000000..c162dc55406 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-20286", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:08.400", + "lastModified": "2024-08-28T17:15:08.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json new file mode 100644 index 00000000000..217e84c5685 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20289", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:09.117", + "lastModified": "2024-08-28T17:15:09.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device. \r\n\r\nThis vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-Lq6jsZhH", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json new file mode 100644 index 00000000000..997286edebf --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20411", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:09.500", + "lastModified": "2024-08-28T17:15:09.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to execute arbitrary code as root on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-267" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json new file mode 100644 index 00000000000..1486216814a --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20413", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:09.763", + "lastModified": "2024-08-28T17:15:09.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to elevate privileges to network-admin on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing application arguments from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to create new users with the privileges of network-admin." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json new file mode 100644 index 00000000000..8a861491733 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20446", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:09.997", + "lastModified": "2024-08-28T17:15:09.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json new file mode 100644 index 00000000000..9e082560149 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20478", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-08-28T17:15:10.220", + "lastModified": "2024-08-28T17:15:10.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system.\r\n\r\nThis vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root.\r\nNote: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-priv-esc-uYQJjnuU", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21132.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21132.json index 5daf33fb698..c60cea12b5b 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21132.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21132", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:13.403", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T17:40:31.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "secalert_us@oracle.com", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:purchasing:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "56D8188F-3203-4D0C-B8BB-5AD9020359B5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json index 91957b4a027..f0c0ba6b584 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21136", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:14.243", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T17:59:36.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:retail_xstore_office:19.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3207145B-91F6-4785-BAE4-D0A195B422AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:retail_xstore_office:20.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2B59C3D5-61A4-468C-B5CC-4A6ED0BBEA8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:retail_xstore_office:20.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C70D2D6A-98BE-4971-B8B2-AD478663EDD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:retail_xstore_office:22.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2F21BF7-051C-4D63-B301-AFA43DC5D1E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:retail_xstore_office:23.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "18FD36BE-B692-498A-AF47-8C18A7B708D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21141.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21141.json index 920fe27118a..0f1436444d6 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21141.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21141.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21141", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.230", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T17:58:43.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.0.20", + "matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21148.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21148.json index f5170698fb7..24a2e024caa 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21148.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21148", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:16.590", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:56:18.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "secalert_us@oracle.com", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21161.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21161.json index 2bc3e2ea6f0..efc3b7c9e6e 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21161.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21161", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:18.930", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T17:00:38.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.0.20", + "matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json index f65aba20b3e..1a66f829d26 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21164", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:19.490", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T17:00:58.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.0.20", + "matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21165.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21165.json index 82817c1c8df..750ef97c5c3 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21165.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21165.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21165", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:19.700", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:43:23.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0", + "versionEndIncluding": "8.0.37", + "matchCriteriaId": "6251DC2A-53C2-4FBF-9EC1-CAF0C7893F1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json index eea7f4f4925..3439118f7f5 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21682", "sourceIdentifier": "security@atlassian.com", "published": "2024-02-20T18:15:51.063", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-28T16:35:07.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/assetapps/assets-discovery-3-2-1-cloud-6-2-1-data_center-1333987182.html", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23244.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23244.json index b38295409b8..07a8f73507e 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23244.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23244.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23244", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.243", - "lastModified": "2024-03-13T23:15:46.480", + "lastModified": "2024-08-28T16:35:08.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se abord\u00f3 un problema de l\u00f3gica con restricciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4. Una aplicaci\u00f3n de una cuenta de usuario est\u00e1ndar puede escalar privilegios despu\u00e9s de iniciar sesi\u00f3n como usuario administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23276.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23276.json index 5bf67b2ef0e..0e42514718b 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23276.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23276", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.557", - "lastModified": "2024-03-14T20:34:18.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T16:35:09.187", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json index 9e3774135a6..bd27b34212c 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23288", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.070", - "lastModified": "2024-03-13T22:15:11.173", + "lastModified": "2024-08-28T16:35:09.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en tvOS 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. Es posible que una aplicaci\u00f3n pueda elevar los privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24043.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24043.json index 8619dfb9286..76cd8a44ea0 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24043.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24043.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24043", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T07:15:09.517", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-28T16:35:09.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed", diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24155.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24155.json index 0ecb5671c54..ebbe6ae1d99 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24155.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24155.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24155", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:11.810", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-28T16:35:10.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Bento4 v1.5.1-628 contiene una p\u00e9rdida de memoria en AP4_Movie::AP4_Movie, analizando pistas y agreg\u00e1ndolas a la lista m_Tracks, pero mp42aac no puede eliminarse correctamente cuando recibimos un error de no encontrar pista de audio. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo mp4 manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/919", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24323.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24323.json index 0c152f3954d..f7855782c91 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24323.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24323.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24323", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T17:15:12.103", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-08-28T16:35:11.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en linlinjava litemall v.1.8.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros apodo, consignatario, orderSN, orderStatusArray del componente AdminOrdercontroller.java." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/lousix/exp/blob/main/CVE-2024-24323/CVE-2024-24323.md", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json index cbdd339dd58..550ba24468b 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24328", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.487", - "lastModified": "2024-02-01T04:49:21.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T16:35:12.420", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25083.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25083.json index b64d7fdd21f..9504649d13c 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25083.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25083", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-16T21:15:08.260", - "lastModified": "2024-02-16T21:39:50.223", + "lastModified": "2024-08-28T16:35:13.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-01", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25579.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25579.json index 615e10dff9a..5181cc0d136 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25579.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25579.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25579", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-28T23:15:09.660", - "lastModified": "2024-06-12T01:15:49.137", + "lastModified": "2024-08-28T16:35:14.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en enrutadores LAN inal\u00e1mbricos ELECOM permite que un atacante adyacente a la red con privilegios administrativos ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU99444194/", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25655.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25655.json index a07a4dd0d4c..fe9a247cb9d 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25655.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25655.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25655", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T20:15:08.917", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-28T16:35:15.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El almacenamiento inseguro de contrase\u00f1as LDAP en la funcionalidad de autenticaci\u00f3n de AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS permite a los miembros (con acceso de lectura a la base de datos de la aplicaci\u00f3n) descifrar las contrase\u00f1as LDAP de los usuarios que se autentican exitosamente en la administraci\u00f3n web a trav\u00e9s de LDAP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25655", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25859.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25859.json index 74085e516c3..5fa0f16b7b7 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25859.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25859", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T20:15:41.900", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-28T16:35:16.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de path traversal en el directorio /path/to/uploads/ de Blesta anterior a v5.9.2 permite a los atacantes apoderarse de cuentas de usuarios y ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.blesta.com/2024/02/08/security-advisory/", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25866.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25866.json index 8bd0b7166be..bcfe1d8c4c9 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25866.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25866.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25866", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T22:15:26.573", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-28T16:35:17.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en CodeAstro Membership Management System en PHP v.1.0 permite a un atacante remoto ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro email en el componente index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26470.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26470.json index 725de3a6537..0f8d975ec5d 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26470.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26470.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26470", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:18.927", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-28T16:35:18.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en la funci\u00f3n de contrase\u00f1a olvidada de WebAPI Boilerplate v1.0.0 y v1.0.1 de FullStackHero permite a los atacantes filtrar el token de restablecimiento de contrase\u00f1a a trav\u00e9s de una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28125.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28125.json index 21170bd65b1..99a6329252f 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28125.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28125.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28125", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T08:15:06.347", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-08-28T16:35:19.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Todas las versiones de FitNesse permiten que un atacante remoto autenticado ejecute comandos arbitrarios del sistema operativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://fitnesse.org/FitNesseDownload", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28537.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28537.json index 1fcafccd32e..b5f9585e0ed 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28537.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28537.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28537", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T14:15:09.960", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-28T16:35:20.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromNatStaticSetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28640.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28640.json index f15cce2943c..98fe5e2e210 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28640.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28640.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28640", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-16T06:15:14.613", - "lastModified": "2024-03-17T22:38:29.433", + "lastModified": "2024-08-28T16:35:21.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en TOTOLink X5000R V9.1.0u.6118-B20201102 y A7000R V9.1.0u.6115-B20201022 permite a un atacante remoto provocar una denegaci\u00f3n de servicio (D0S) a trav\u00e9s del campo de comando." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34087.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34087.json index 3091bc13ad6..29388f4ae09 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34087.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34087.json @@ -2,16 +2,55 @@ "id": "CVE-2024-34087", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T16:15:08.507", - "lastModified": "2024-08-26T19:10:18.890", + "lastModified": "2024-08-28T16:35:22.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en SEH en el servidor HTTP BPQ32 en BPQ32 6.0.24.1 permite a atacantes remotos con acceso a la terminal web lograr la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una solicitud HTTP POST /TermInput." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://groups.io/g/bpq32", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json index 89a5607630d..6c3cfde2501 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json @@ -2,85 +2,15 @@ "id": "CVE-2024-35325", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T17:15:50.390", - "lastModified": "2024-08-28T14:15:08.433", - "vulnStatus": "Modified", + "lastModified": "2024-08-28T16:15:08.417", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free." - }, - { - "lang": "es", - "value": "Se encontr\u00f3 una vulnerabilidad en libyaml hasta 0.2.5. La funci\u00f3n yaml_event_delete del archivo /src/libyaml/src/api.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una doble libertad." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-415" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pyyaml:libyaml:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.2.5", - "matchCriteriaId": "2EC679D8-115E-4170-8038-0BCB93DFE1BA" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/idhyt/pocs/tree/main/libyaml", - "source": "cve@mitre.org" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json index 279b5f4e2d8..7ad59dc370f 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json @@ -2,99 +2,15 @@ "id": "CVE-2024-35326", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T17:15:50.490", - "lastModified": "2024-08-28T15:15:16.590", - "vulnStatus": "Modified", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2024-08-28T16:15:08.740", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call all of the required _initialize functions that are described in the LibYAML documentation." - }, - { - "lang": "es", - "value": "libyaml v0.2.5 es vulnerable al desbordamiento de b\u00fafer. La funci\u00f3n yaml_emitter_emit del archivo /src/libyaml/src/emitter.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una doble libertad." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/idhyt/pocs/tree/main/libyaml", - "source": "cve@mitre.org" - }, - { - "url": "https://github.com/yaml/libyaml/issues/298", - "source": "cve@mitre.org" - }, - { - "url": "https://github.com/yaml/libyaml/issues/302", - "source": "cve@mitre.org" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json index aa03951409f..a606505e05b 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json @@ -2,90 +2,15 @@ "id": "CVE-2024-35328", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:11.037", - "lastModified": "2024-08-28T15:15:16.750", - "vulnStatus": "Modified", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2024-08-28T16:15:08.863", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "libyaml v0.2.5 is vulnerable to a denial of service. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call required _initialize functions that are described in the LibYAML documentation." - }, - { - "lang": "es", - "value": "libyaml v0.2.5 es vulnerable a DDOS. La funci\u00f3n yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-835" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c", - "source": "cve@mitre.org", - "tags": [ - "Exploit" - ] - }, - { - "url": "https://github.com/idhyt/pocs/tree/main/libyaml", - "source": "cve@mitre.org" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35329.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35329.json index 895745b5cac..2a6308737e7 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35329.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35329.json @@ -2,35 +2,15 @@ "id": "CVE-2024-35329", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T05:15:53.533", - "lastModified": "2024-08-02T03:15:51.520", - "vulnStatus": "Awaiting Analysis", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2024-08-28T16:15:08.980", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions." - }, - { - "lang": "es", - "value": "libyaml 0.2.5 es vulnerable a un desbordamiento de b\u00fafer basado en mont\u00f3n en yaml_document_add_sequence en api.c." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ], "metrics": {}, - "references": [ - { - "url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing", - "source": "cve@mitre.org" - }, - { - "url": "https://github.com/yaml/libyaml/releases/tag/0.2.5", - "source": "cve@mitre.org" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json index 98a4f819cd7..2fa2dd289e5 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38856", "sourceIdentifier": "security@apache.org", "published": "2024-08-05T09:15:56.780", - "lastModified": "2024-08-28T01:00:00.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T16:15:58.043", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-08-27", "cisaActionDue": "2024-09-17", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,22 +75,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*", + "versionEndIncluding": "18.12.15", + "matchCriteriaId": "445F4EEE-8237-47E4-AB1C-729659C36A57" + } + ] + } + ] + } + ], "references": [ { "url": "https://issues.apache.org/jira/browse/OFBIZ-13128", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://ofbiz.apache.org/download.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Product" + ] }, { "url": "https://ofbiz.apache.org/security.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39930.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39930.json index 72310c06be3..6db86e6517f 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39930.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39930.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39930", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T16:15:02.277", - "lastModified": "2024-08-12T19:35:09.940", + "lastModified": "2024-08-28T16:15:09.077", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/", "source": "cve@mitre.org" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/argument-injection-in-gogs-ssh-server-cve-2024-39930", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json index 432e5846d33..ba47940f400 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json @@ -2,17 +2,41 @@ "id": "CVE-2024-3980", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.210", - "lastModified": "2024-08-27T15:52:01.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:32:20.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The product allows user input to control or influence paths or file\nnames that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are\ncritical to the application." + }, + { + "lang": "es", + "value": "El producto permite que el usuario controle o influya en las rutas o nombres de archivos que se utilizan en las operaciones del sistema de archivos, lo que permite al atacante acceder o modificar archivos del sistema u otros archivos que son cr\u00edticos para la aplicaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch", - "source": "cybersecurity@hitachienergy.com" + "source": "cybersecurity@hitachienergy.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json index 7dfe27bf877..69d8c2f6879 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json @@ -2,17 +2,41 @@ "id": "CVE-2024-3982", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.557", - "lastModified": "2024-08-27T15:52:01.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:30:50.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker with local access to machine where MicroSCADA X\nSYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level\nis not enabled and only users with administrator rights can enable it." + }, + { + "lang": "es", + "value": "Un atacante con acceso local a la m\u00e1quina donde est\u00e1 instalado MicroSCADA X SYS600, podr\u00eda habilitar el registro de sesiones que soporta el producto e intentar explotar un secuestro de sesi\u00f3n de una sesi\u00f3n ya establecida. De forma predeterminada, el nivel de registro de sesi\u00f3n no est\u00e1 habilitado y solo los usuarios con derechos de administrador pueden habilitarlo." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch", - "source": "cybersecurity@hitachienergy.com" + "source": "cybersecurity@hitachienergy.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json index f91f53cb060..75515df6326 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41310", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T17:16:38.763", - "lastModified": "2024-08-05T12:41:45.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T17:42:01.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "AndServer 2.1.12 es vulnerable a Directory Traversal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yanzhenjie:andserver:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.12", + "matchCriteriaId": "2CB0C220-D4E7-4805-9121-39E85B6E16A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Gppp23333/f915655ff17df9a0fd1d92e3e2096cb9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json new file mode 100644 index 00000000000..8364dfe8112 --- /dev/null +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-41564", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T17:15:10.693", + "lastModified": "2024-08-28T17:15:10.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EMI v.1.1.10 and before, fixed in v.1.1.11, contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in EMI mod for Minecraft, which allows in-game item duplication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://gist.github.com/apple502j/6d691b62c37fc37b03b0784917064df6", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/emilyploszaj/emi/blob/1.21/xplat/src/main/java/dev/emi/emi/network/FillRecipeC2SPacket.java", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41565.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41565.json new file mode 100644 index 00000000000..02322d05690 --- /dev/null +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41565.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-41565", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T17:15:10.903", + "lastModified": "2024-08-28T17:15:10.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "JustEnoughItems (JEI) 19.5.0.33 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index in JEI for Minecraft, which allows in-game item duplication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://gist.github.com/apple502j/05123abb1d1c89c31afde15a9b34e2ae", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mezz/JustEnoughItems/commit/99ff43ba1009c44c6d935e2ab8a6c9292bb12873", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json index 7c9a84745d3..a854080a8d4 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41657", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:13.687", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T16:13:35.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-697" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F1B75F3C-3552-48E9-87F8-B34056AA5A5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/casdoor/casdoor/blob/v1.577.0/routers/cors_filter.go#L45", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json index bd2c1b55e2a..c6b28f50e63 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41658", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:13.910", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-28T16:08:31.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F1B75F3C-3552-48E9-87F8-B34056AA5A5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/casdoor/casdoor/blob/v1.577.0/web/src/QrCodePage.js", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json new file mode 100644 index 00000000000..8a0652d2936 --- /dev/null +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-42698", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T16:15:09.210", + "lastModified": "2024-08-28T16:15:09.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Roughly Enough Items (REI) v.16.0.729 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in the Roughly Enough Items (REI) mod for Minecraft, which allows in-game item duplication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://gist.github.com/apple502j/7b1af0082449c9bfbf910e9a25ef3595", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shedaniel/RoughlyEnoughItems/commit/e80ca84f1affb91d2388ddb298bfc6b141828cad", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42845.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42845.json index 01ad0544636..be494c0f9ee 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42845.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42845", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T19:15:06.947", - "lastModified": "2024-08-26T12:47:20.187", + "lastModified": "2024-08-28T16:35:23.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n de evaluaci\u00f3n en el componente invesalius/reader/dicom.py de InVesalius 3.1.99991 a 3.1.99998 permite a atacantes ejecutar c\u00f3digo arbitrario cargando un archivo DICOM manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/invesalius/invesalius3", diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42900.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42900.json new file mode 100644 index 00000000000..23055a2ecb0 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42900.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42900", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T16:15:09.443", + "lastModified": "2024-08-28T16:35:24.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://g03m0n.github.io/posts/cve-2024-42900/", + "source": "cve@mitre.org" + }, + { + "url": "https://gitee.com/y_project/RuoYi", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43915.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43915.json index 52720ae822d..092602c3808 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43915.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43915", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T21:15:29.360", - "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T17:44:45.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zephyr-one:zephyr_project_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.103", + "matchCriteriaId": "8862B152-D6D9-4600-BAA9-2059B1758E63" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-102-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json index b3a1db30858..324222c4b58 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json @@ -2,17 +2,41 @@ "id": "CVE-2024-4872", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.890", - "lastModified": "2024-08-27T15:52:01.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:25:02.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The product does not validate any query towards persistent\ndata, resulting in a risk of injection attacks." + }, + { + "lang": "es", + "value": "El producto no valida ninguna consulta sobre datos persistentes, lo que genera riesgo de ataques de inyecci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch", - "source": "cybersecurity@hitachienergy.com" + "source": "cybersecurity@hitachienergy.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6053.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6053.json new file mode 100644 index 00000000000..e86b65c716b --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6053.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6053", + "sourceIdentifier": "psirt@teamviewer.com", + "published": "2024-08-28T17:15:11.163", + "lastModified": "2024-08-28T17:15:11.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in the clipboard synchronization feature in TeamViewer Full Client prior version 15.57 and TeamViewer Meeting prior version 15.55.3 can lead to unintentional sharing of the clipboard with the current presenter of a meeting." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@teamviewer.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@teamviewer.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1007/", + "source": "psirt@teamviewer.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7744.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7744.json new file mode 100644 index 00000000000..d57aaf5ac30 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7744.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7744", + "sourceIdentifier": "security@progress.com", + "published": "2024-08-28T17:15:11.380", + "lastModified": "2024-08-28T17:15:11.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.\n\u00a0\n\nAn authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/ftp-server", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7745.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7745.json new file mode 100644 index 00000000000..5bbeb148b91 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7745.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7745", + "sourceIdentifier": "security@progress.com", + "published": "2024-08-28T17:15:11.593", + "lastModified": "2024-08-28T17:15:11.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + }, + { + "lang": "en", + "value": "CWE-304" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/ftp-server", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7940.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7940.json index f244cd07e7c..aed66b747df 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7940.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7940.json @@ -2,17 +2,41 @@ "id": "CVE-2024-7940", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:06.217", - "lastModified": "2024-08-27T15:52:01.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:24:07.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The product exposes a service that is intended for local only to\nall network interfaces without any authentication." + }, + { + "lang": "es", + "value": "El producto expone un servicio destinado \u00fanicamente al nivel local para todas las interfaces de red sin ninguna autenticaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -47,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2", + "versionEndExcluding": "10.6", + "matchCriteriaId": "5B9D0068-FDE8-4A91-B4A6-F498363223E5" + } + ] + } + ] + } + ], "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch", - "source": "cybersecurity@hitachienergy.com" + "source": "cybersecurity@hitachienergy.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json index 4270e56a59f..3563e36239e 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json @@ -2,17 +2,41 @@ "id": "CVE-2024-7941", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:06.467", - "lastModified": "2024-08-27T15:52:01.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T16:09:03.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An HTTP parameter may contain a URL value and could cause\nthe web application to redirect the request to the specified URL.\nBy modifying the URL value to a malicious site, an attacker may\nsuccessfully launch a phishing scam and steal user credentials." + }, + { + "lang": "es", + "value": "Un par\u00e1metro HTTP puede contener un valor de URL y podr\u00eda hacer que la aplicaci\u00f3n web redirija la solicitud a la URL especificada. Al modificar el valor de la URL de un sitio malicioso, un atacante puede iniciar con \u00e9xito una estafa de phishing y robar las credenciales del usuario." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + }, { "source": "cybersecurity@hitachienergy.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch", - "source": "cybersecurity@hitachienergy.com" + "source": "cybersecurity@hitachienergy.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index c4db870f9c0..1885be11e34 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-28T16:00:18.024756+00:00 +2024-08-28T18:00:18.030891+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-28T15:46:39.613000+00:00 +2024-08-28T17:59:36.023000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261371 +261387 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `16` -- [CVE-2024-34198](CVE-2024/CVE-2024-341xx/CVE-2024-34198.json) (`2024-08-28T15:15:16.503`) -- [CVE-2024-8195](CVE-2024/CVE-2024-81xx/CVE-2024-8195.json) (`2024-08-28T14:15:08.990`) +- [CVE-2024-20279](CVE-2024/CVE-2024-202xx/CVE-2024-20279.json) (`2024-08-28T17:15:06.113`) +- [CVE-2024-20284](CVE-2024/CVE-2024-202xx/CVE-2024-20284.json) (`2024-08-28T17:15:06.893`) +- [CVE-2024-20285](CVE-2024/CVE-2024-202xx/CVE-2024-20285.json) (`2024-08-28T17:15:07.687`) +- [CVE-2024-20286](CVE-2024/CVE-2024-202xx/CVE-2024-20286.json) (`2024-08-28T17:15:08.400`) +- [CVE-2024-20289](CVE-2024/CVE-2024-202xx/CVE-2024-20289.json) (`2024-08-28T17:15:09.117`) +- [CVE-2024-20411](CVE-2024/CVE-2024-204xx/CVE-2024-20411.json) (`2024-08-28T17:15:09.500`) +- [CVE-2024-20413](CVE-2024/CVE-2024-204xx/CVE-2024-20413.json) (`2024-08-28T17:15:09.763`) +- [CVE-2024-20446](CVE-2024/CVE-2024-204xx/CVE-2024-20446.json) (`2024-08-28T17:15:09.997`) +- [CVE-2024-20478](CVE-2024/CVE-2024-204xx/CVE-2024-20478.json) (`2024-08-28T17:15:10.220`) +- [CVE-2024-41564](CVE-2024/CVE-2024-415xx/CVE-2024-41564.json) (`2024-08-28T17:15:10.693`) +- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-08-28T17:15:10.903`) +- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-08-28T16:15:09.210`) +- [CVE-2024-42900](CVE-2024/CVE-2024-429xx/CVE-2024-42900.json) (`2024-08-28T16:15:09.443`) +- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-08-28T17:15:11.163`) +- [CVE-2024-7744](CVE-2024/CVE-2024-77xx/CVE-2024-7744.json) (`2024-08-28T17:15:11.380`) +- [CVE-2024-7745](CVE-2024/CVE-2024-77xx/CVE-2024-7745.json) (`2024-08-28T17:15:11.593`) ### CVEs modified in the last Commit -Recently modified CVEs: `45` +Recently modified CVEs: `57` -- [CVE-2024-23721](CVE-2024/CVE-2024-237xx/CVE-2024-23721.json) (`2024-08-28T15:35:15.520`) -- [CVE-2024-25354](CVE-2024/CVE-2024-253xx/CVE-2024-25354.json) (`2024-08-28T14:35:07.993`) -- [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-08-28T15:35:21.410`) -- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-08-28T15:35:21.617`) -- [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-08-28T15:35:21.843`) -- [CVE-2024-2625](CVE-2024/CVE-2024-26xx/CVE-2024-2625.json) (`2024-08-28T15:35:22.080`) -- [CVE-2024-26310](CVE-2024/CVE-2024-263xx/CVE-2024-26310.json) (`2024-08-28T15:35:16.490`) -- [CVE-2024-26503](CVE-2024/CVE-2024-265xx/CVE-2024-26503.json) (`2024-08-28T15:35:17.227`) -- [CVE-2024-27746](CVE-2024/CVE-2024-277xx/CVE-2024-27746.json) (`2024-08-28T15:35:18.103`) -- [CVE-2024-28339](CVE-2024/CVE-2024-283xx/CVE-2024-28339.json) (`2024-08-28T14:35:08.337`) -- [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-08-28T15:35:19.147`) -- [CVE-2024-28669](CVE-2024/CVE-2024-286xx/CVE-2024-28669.json) (`2024-08-28T14:35:09.157`) -- [CVE-2024-28682](CVE-2024/CVE-2024-286xx/CVE-2024-28682.json) (`2024-08-28T14:35:09.923`) -- [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-08-28T14:35:10.690`) -- [CVE-2024-29131](CVE-2024/CVE-2024-291xx/CVE-2024-29131.json) (`2024-08-28T15:35:19.953`) -- [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-08-28T14:35:11.473`) -- [CVE-2024-31811](CVE-2024/CVE-2024-318xx/CVE-2024-31811.json) (`2024-08-28T15:35:22.300`) -- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T14:15:08.433`) -- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T15:15:16.590`) -- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T15:15:16.750`) -- [CVE-2024-44083](CVE-2024/CVE-2024-440xx/CVE-2024-44083.json) (`2024-08-28T15:15:17.050`) -- [CVE-2024-45346](CVE-2024/CVE-2024-453xx/CVE-2024-45346.json) (`2024-08-28T14:35:12.640`) -- [CVE-2024-6879](CVE-2024/CVE-2024-68xx/CVE-2024-6879.json) (`2024-08-28T15:35:24.120`) -- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-08-28T14:35:14.160`) -- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-28T14:15:08.813`) +- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-08-28T16:35:14.267`) +- [CVE-2024-25655](CVE-2024/CVE-2024-256xx/CVE-2024-25655.json) (`2024-08-28T16:35:15.510`) +- [CVE-2024-25859](CVE-2024/CVE-2024-258xx/CVE-2024-25859.json) (`2024-08-28T16:35:16.347`) +- [CVE-2024-25866](CVE-2024/CVE-2024-258xx/CVE-2024-25866.json) (`2024-08-28T16:35:17.133`) +- [CVE-2024-26470](CVE-2024/CVE-2024-264xx/CVE-2024-26470.json) (`2024-08-28T16:35:18.190`) +- [CVE-2024-28125](CVE-2024/CVE-2024-281xx/CVE-2024-28125.json) (`2024-08-28T16:35:19.333`) +- [CVE-2024-28537](CVE-2024/CVE-2024-285xx/CVE-2024-28537.json) (`2024-08-28T16:35:20.337`) +- [CVE-2024-28640](CVE-2024/CVE-2024-286xx/CVE-2024-28640.json) (`2024-08-28T16:35:21.193`) +- [CVE-2024-34087](CVE-2024/CVE-2024-340xx/CVE-2024-34087.json) (`2024-08-28T16:35:22.590`) +- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T16:15:08.417`) +- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T16:15:08.740`) +- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T16:15:08.863`) +- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-08-28T16:15:08.980`) +- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-28T16:15:58.043`) +- [CVE-2024-3980](CVE-2024/CVE-2024-39xx/CVE-2024-3980.json) (`2024-08-28T16:32:20.957`) +- [CVE-2024-3982](CVE-2024/CVE-2024-39xx/CVE-2024-3982.json) (`2024-08-28T16:30:50.080`) +- [CVE-2024-39930](CVE-2024/CVE-2024-399xx/CVE-2024-39930.json) (`2024-08-28T16:15:09.077`) +- [CVE-2024-41310](CVE-2024/CVE-2024-413xx/CVE-2024-41310.json) (`2024-08-28T17:42:01.190`) +- [CVE-2024-41657](CVE-2024/CVE-2024-416xx/CVE-2024-41657.json) (`2024-08-28T16:13:35.140`) +- [CVE-2024-41658](CVE-2024/CVE-2024-416xx/CVE-2024-41658.json) (`2024-08-28T16:08:31.743`) +- [CVE-2024-42845](CVE-2024/CVE-2024-428xx/CVE-2024-42845.json) (`2024-08-28T16:35:23.650`) +- [CVE-2024-43915](CVE-2024/CVE-2024-439xx/CVE-2024-43915.json) (`2024-08-28T17:44:45.193`) +- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-08-28T16:25:02.097`) +- [CVE-2024-7940](CVE-2024/CVE-2024-79xx/CVE-2024-7940.json) (`2024-08-28T16:24:07.043`) +- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-08-28T16:09:03.693`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f4846aaa441..19726aed375 100644 --- a/_state.csv +++ b/_state.csv @@ -92623,7 +92623,7 @@ CVE-2016-9838,0,0,8915e7a7760dab1b83ccc9fcf5714761065d956e576593ed79dbce273e9baa CVE-2016-9839,0,0,56dd29d3d2add257a8ccbd99c526531df97870ecd1b87178196e5e22a1a37a37,2023-01-31T19:58:56.190000 CVE-2016-9840,0,0,c8cdfedcf9ba9d30c2e11a30c9ee1027f9c4943670cac0713400edb96b12ecbf,2023-11-07T02:37:35.780000 CVE-2016-9841,0,0,8461023f0b6af372abbc700df4bf248326f3d17885a444f7d4bf87fb75831d87,2023-11-07T02:37:36.093000 -CVE-2016-9842,0,0,d67fed1be1f6e8159dfb3396159a58fa49ed8dc17f52d03827fd9c4112a2c093,2023-11-07T02:37:36.463000 +CVE-2016-9842,0,1,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000 CVE-2016-9843,0,0,03bba8f361b4f311c57e6be0a8dca8d549e9547ec0826de5125cdde6ebac4654,2023-11-07T02:37:36.807000 CVE-2016-9844,0,0,00ba3ac318d524a060543298e92f49ba342658607b49204e522db0201c5e4e2a,2019-12-16T20:24:14.587000 CVE-2016-9845,0,0,00bb0b1bdce117249db0d0b791e75c832a7a8fdd6ba23a94074ca0696959dbbe,2020-11-10T19:23:05.543000 @@ -121384,7 +121384,7 @@ CVE-2018-25095,0,0,6f4ec7520fe1e8e1137939a36d89eebffe41414142eb46d5c5f36cf386b6b CVE-2018-25096,0,0,0f1a9d2fe0943450f70fc2f111ebfdebd2f2c63d07ffdb5b75cb7af27e02a352,2024-05-17T01:27:30.770000 CVE-2018-25097,0,0,b132b2c05ec96134ee21d6c1f5f845fb6d9b53254de5311e7c1f18ebf1a12d65,2024-05-17T01:27:30.893000 CVE-2018-25098,0,0,afd500b111d854a57f928388ff40ee517eeef41a47b8f0c70385aae8f8a38f95,2024-08-05T13:15:46.743000 -CVE-2018-25099,0,0,586c7631a0b69d643c54a64a2d6b1e5bcbdf77958964a738487d2e947c8f6cc3,2024-03-18T12:38:25.490000 +CVE-2018-25099,0,1,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000 CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000 CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000 CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000 @@ -136789,7 +136789,7 @@ CVE-2019-19820,0,0,d3200ebc5d581b4755916a609fe50979edea5a15e0fc3a04ffa5f71613f4e CVE-2019-19821,0,0,5d4ec7e2bffa15750c2939c0e7d2adea2bc3396ead4c3fc172fe464bc3578a28,2020-08-24T17:37:01.140000 CVE-2019-19822,0,0,f372437f800ae6340a6e164d4e09649bd7569c516be8f3889c8ec515ac663de0,2020-08-24T17:37:01.140000 CVE-2019-19823,0,0,3f6ad46dcab8a2c03d46210de505a5e9a1aaa92fdf0608ae333a991ddf15937a,2020-02-06T16:04:39.370000 -CVE-2019-19824,0,0,59b351a45fa829535350144da6c60d4794ee8053c5a3ab8fc932ddcb8697aa6e,2020-02-05T14:30:22.743000 +CVE-2019-19824,0,1,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000 CVE-2019-19825,0,0,04de0123f214687b69fe0b70940205a91ae0ecd6ff99d9fd325f56ef736a2f2b,2020-02-05T14:35:31.347000 CVE-2019-19826,0,0,2689ee020ae9e5e4ebe835dbcc0a88d036a8c5de49eae99421281d65c6938d42,2019-12-27T16:49:24.693000 CVE-2019-19829,0,0,3f73ae381fa8469b280488161d5fec22d571a4f6250d30f76b53103ab377bf65,2019-12-23T12:27:16.840000 @@ -147483,7 +147483,7 @@ CVE-2020-1261,0,0,facd24f80876f2ac6682cd4ffcda5908f697f57ca36f3a6dbb2ed3896e7945 CVE-2020-12612,0,0,27c013661b38b08d73a9ed802a24540f4841a815e7c5477dd782dabe8437df9c,2023-12-15T16:24:27.337000 CVE-2020-12613,0,0,c95356c17bc093130235aa64aae86584b7d9b965bf99a8b709408a2aaf3f050c,2023-12-14T16:37:11.820000 CVE-2020-12614,0,0,847dc8f32da2d3c78a4e8ef365590ce7648ef554d7da2f4e7aa6d04370642371,2024-08-01T13:42:02.280000 -CVE-2020-12615,0,0,36d741a8300c40d0907640fbe1b56e3d7d47937811858f27d7bb5e898c668199,2023-12-15T16:04:51.323000 +CVE-2020-12615,0,1,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000 CVE-2020-12618,0,0,6597e2bb9a8de14b97fe7ce944c521c20b776df974886bc6ada82eff63e8acda,2021-07-21T11:39:23.747000 CVE-2020-12619,0,0,ee598b4bf1d4265af77d330472cf7b83e088560073a1c2a3d5a6cf8d6eb12600,2021-07-21T11:39:23.747000 CVE-2020-1262,0,0,21c4e042f0bae4f9c23017151de84d72ef7a045e9efdf2cc4d6cb16ca079a3e6,2021-07-21T11:39:23.747000 @@ -205546,7 +205546,7 @@ CVE-2022-39332,0,0,477ba7648b2ff3efc7e15c35cd4f9a8063953643bd104d8fcf6e4123d4bd6 CVE-2022-39333,0,0,cae9628f620aeaa785bde614c3495c0a2350667e343b17114cdc498043380647,2022-12-01T17:39:03.577000 CVE-2022-39334,0,0,953bd45d6f15391408c3de4c9a67e9cc53b41429382ade33f7af626f41ee3551,2023-03-06T23:15:10.630000 CVE-2022-39335,0,0,338f7cecc4b22c17265bfd6917b9af12b92d4fcf78cd780c23b38825977fd2cc,2023-06-11T04:15:46.950000 -CVE-2022-39337,0,1,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000 +CVE-2022-39337,0,0,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000 CVE-2022-39338,0,0,df2a8a3e9084a1d1b2316940bbb923180459197a0b5b11dac656c6305cfdf18b,2022-12-01T20:43:10.727000 CVE-2022-39339,0,0,e54c18e4443dc47f306cd260e8ea3e02e1e318519ab443dbbf61c42136e20110,2022-12-01T20:43:02.263000 CVE-2022-3934,0,0,7ed77fa0bccfc3f3da1a7580185e2d2d09a7b3cc8b2502be4a6a5fc2baf3cbd9,2023-11-07T03:51:59.160000 @@ -205864,7 +205864,7 @@ CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3 CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000 CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000 CVE-2022-39996,0,0,515d89341d75fc891c2495715479db343fbd6a795549afa8dc6e58128081b767,2024-08-27T21:35:01.140000 -CVE-2022-39997,0,1,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000 +CVE-2022-39997,0,0,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000 CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000 CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000 CVE-2022-40001,0,0,53944e40d3dc029fd806c75d13f9eb446512b7b5067631d8fcb6e9c0e4408b76,2022-12-19T16:23:53.913000 @@ -213969,7 +213969,7 @@ CVE-2023-1494,0,0,fabe57685f9f065291cb73b5da5d58e55c63347ea4b821215e6a77cd8e6703 CVE-2023-1495,0,0,52d3a63f7531a21742127196634a25b8aac0e9134944b225f239008a7eb20fba,2024-05-17T02:18:10.487000 CVE-2023-1496,0,0,3ad20729adb8da7a942dfca3bf38af88fc6858bc7a66965d5ec257bb936aaa30,2023-03-24T01:52:42.833000 CVE-2023-1497,0,0,43a07682b47772aadc64da8126950dfea0d545240de7c9596bc9fee6200700c4,2024-05-17T02:18:10.633000 -CVE-2023-1498,0,0,9eeeceff41634d9dbf8d03706cdae4e9acea19ed25c6b8ff143ac0284ca5312f,2024-05-17T02:18:10.733000 +CVE-2023-1498,0,1,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000 CVE-2023-1499,0,0,8ff3854eaf9c82717c95e16a68fcb189e93074538f80edc381c1653810d6905e,2024-05-17T02:18:10.843000 CVE-2023-1500,0,0,3e6c08282f27193f563da01f48a334141476b60383b5180210ca9fe12b3b5de6,2024-05-17T02:18:10.947000 CVE-2023-1501,0,0,d6509f5f5f21ad6ed83987bcae6b52f819de1d497f3a8c7a59f97f9b53e05666,2024-05-17T02:18:11.043000 @@ -219701,9 +219701,9 @@ CVE-2023-26319,0,0,3dd6441fbb2cf89b0e957e6f3f556dd38ea034f50ae932ae756d43f14248f CVE-2023-2632,0,0,301898869b5a60457376f20e3b7ea036dcafa847ec705a351ca3cee971a25c85,2023-05-25T16:08:28.660000 CVE-2023-26320,0,0,ce18ada0dab81b6e3cbb23f236fe2120ff674b38177ae9eb5db23adbd1986f1c,2023-10-16T19:04:10.920000 CVE-2023-26321,0,0,b75b605fdb8ac99bba7cd33bc5a27b0464761915d8e051cc7391f87c31191bc9,2024-08-28T12:57:17.117000 -CVE-2023-26322,0,1,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000 +CVE-2023-26322,0,0,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000 CVE-2023-26323,0,0,484add0c04d4a78cede6c93a8c8952694f596119aecb48ac15eaa55dd3b75254,2024-08-28T12:57:17.117000 -CVE-2023-26324,0,1,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000 +CVE-2023-26324,0,0,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000 CVE-2023-26325,0,0,0815d0f5538437b0c1a37e2d30e66d4594a1f33bad8ba20cf36ef6d2f6c24077,2023-04-13T20:15:09.657000 CVE-2023-26326,0,0,7a94421fc97dc2e69220f52c8149f79ba5e3f607156d057693f823cb0ba1ecd2,2023-03-03T16:46:29.717000 CVE-2023-26327,0,0,1cc55ebadf8900607cbb779734840e485cf992ab645ea88d7f35d67b7049a018,2023-04-03T18:42:37.320000 @@ -232328,7 +232328,7 @@ CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458 CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000 CVE-2023-42858,0,0,3cde77cff878b7bb98d08b0160f9736789daeec37f86aa56fd544ce01873eae4,2024-02-22T19:07:27.197000 CVE-2023-42859,0,0,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000 -CVE-2023-42860,0,0,cb68b7c82514ef900a7acd7613121b5f748ef4ff4bdc9490298810a61c3cc7e3,2024-02-22T19:07:27.197000 +CVE-2023-42860,0,1,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000 CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000 CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000 CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000 @@ -232351,7 +232351,7 @@ CVE-2023-42887,0,0,6a183a6bbbb784cf3ff7a27ca6dc2d91b7b7c3f3cb1bda7867c2939a5f618 CVE-2023-42888,0,0,b067218531e45be7cc34fa1275d3c2b57f0925c26eb93740839a000d9953633b,2024-01-26T20:53:27.637000 CVE-2023-42889,0,0,1649dc73df9490d9ce669184ee1d4b8722c3b17f66d00680b3c3c34df498b755,2024-02-22T19:07:27.197000 CVE-2023-4289,0,0,97e9dbfb002f991c9b0c7bb56513ad2ad7a34e2cc2f1908f40b15808fc4c7b13,2023-11-07T04:22:25.410000 -CVE-2023-42890,0,1,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000 +CVE-2023-42890,0,0,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000 CVE-2023-42891,0,0,9e832a9c79650ad0321f807def388413064ff2ab68c6ecbf9bb18e2496c75004,2023-12-13T17:46:10.560000 CVE-2023-42892,0,0,45868be9e713d43fbe1857fd521e7819eff03e6332a2f62faa55e58f6a79244c,2024-08-21T23:35:00.660000 CVE-2023-42893,0,0,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000 @@ -234678,7 +234678,7 @@ CVE-2023-46422,0,0,9828db1651145e55303f7c90e9b80d9152a0babe8f2b6bf7c6211e8345b27 CVE-2023-46423,0,0,fae9f7621f04eecce4ee8c67ae3cb477991a1d96e9608dd2d417468ee933e47e,2023-11-01T16:37:41.027000 CVE-2023-46424,0,0,50d5b8cffd7312c685b7f6280f3573716a877c1580c703fe9f896ec5081cf2ad,2023-11-01T16:37:51.027000 CVE-2023-46426,0,0,095958b9525a539d6bad1510a5c4a9bb3f3e81ffc03067e72a3a22c99ed7e1b9,2024-08-05T20:35:01.333000 -CVE-2023-46427,0,1,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000 +CVE-2023-46427,0,0,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000 CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000 CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000 CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000 @@ -234692,7 +234692,7 @@ CVE-2023-4645,0,0,080630aaab2615758e1b4d6f50d89291c19a67c7887d417a836246d5119706 CVE-2023-46450,0,0,9eedfca9fc0f26e4373fe52fcdff22340a7718bcd00536967f1e45fb1ec952e0,2023-10-30T15:55:16.417000 CVE-2023-46451,0,0,b7c650f5171568ff66e636d2cc25afe576e379cc753300c14a6647b49ae59d53,2023-11-06T18:15:09.143000 CVE-2023-46454,0,0,3dbd1be3466e652b6244f86c6f23f5226b664c9ce63ddb43f7325d4e0e6c7c6d,2023-12-14T19:33:14.070000 -CVE-2023-46455,0,1,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000 +CVE-2023-46455,0,0,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000 CVE-2023-46456,0,0,c4dfd3d82ae14a8b837bb61f8d23f14c4d0fc689e9b777f969e34fde85a437e8,2023-12-14T22:49:19.163000 CVE-2023-4646,0,0,8b7e316f7875d1dd1b48005b399d9b0cf2d7921bd690ed55ff013ac594bec756,2023-11-07T04:22:48.910000 CVE-2023-46467,0,0,8054488fd0132f7e27914107b3db54b56d981952490fdc3e16c9ef4f66fb3574,2023-11-07T15:08:59.640000 @@ -235490,7 +235490,7 @@ CVE-2023-47575,0,0,30cf6be65abd61448a4a89a9b72de85e929953eb93306b378cfacaff6d87c CVE-2023-47576,0,0,b658502efe54d9b05c4f426be235a8b40d293e00fdab9f01c40b60b57e7ef3f8,2023-12-18T15:01:53.273000 CVE-2023-47577,0,0,c0f13ddb15e49455530054095cc0266851552b5d13fc042a223643cd9df0b789,2023-12-18T15:08:42.737000 CVE-2023-47578,0,0,8bf0aae804a5d895a13b8eaa8706ff025054dd6e316ca1b2834837b692a8f7bf,2023-12-18T15:09:42.753000 -CVE-2023-47579,0,1,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000 +CVE-2023-47579,0,0,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000 CVE-2023-4758,0,0,713db879644d26febfa528fa3b5a32eaa4d032e64a180d47e3477adfad42aa0a,2023-09-06T20:43:43.440000 CVE-2023-47580,0,0,1046d1b7ec521db48bb6fc1bed5767243c03c220591fb511a40a277d8666b4e6,2024-08-14T19:35:12.147000 CVE-2023-47581,0,0,5103c8a44f66e69718053305c6d841267ec2f6ba489578cb95ee5adf75321cf4,2024-08-12T15:35:03.167000 @@ -236037,7 +236037,7 @@ CVE-2023-48402,0,0,4c809f2dd5e8dcfff010aa543a6c6f045768b178ca00ba8754b6c8edf6ecc CVE-2023-48403,0,0,4adc068ba69d93e217814aa03ab06c64d37d4e6f1f5b9e967d203dad5b01ccd6,2024-03-12T21:15:56.243000 CVE-2023-48404,0,0,678d899eed5c458b58da3464689532ca0142c650f2cd178cdc3f7827df0120ca,2024-03-12T21:15:56.300000 CVE-2023-48405,0,0,1184ca00738252a4a1fbfd7c535695d37028df78fe87d5aaaa04a1bc365c4159,2024-03-12T21:15:56.373000 -CVE-2023-48406,0,0,b330092f99e86d2edcd1d228620e5c48e2defe79dfd91e54db7fffe08c3396da,2024-03-12T21:15:56.447000 +CVE-2023-48406,0,1,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000 CVE-2023-48407,0,0,878114c674344ec771789050e93c4a630dfc18deac136706916dedaddc59d9b4,2024-03-12T21:15:56.517000 CVE-2023-48408,0,0,685d630782a479a80a275f86cfe75523d6e24bb2a663d7b093992d79e473f5dd,2024-03-12T21:15:56.573000 CVE-2023-48409,0,0,34f77accc0b2ac79d7dec98b91bbcd5fa76dbfd08a55d334eff38c7b0b7cd036,2024-03-12T21:15:56.647000 @@ -236888,7 +236888,7 @@ CVE-2023-49463,0,0,3997f0c76b75718e8d7fddf13118ae3adfe6e7b8a1e026bbdd8c02aa82ae2 CVE-2023-49464,0,0,6558ffdc5c503d25be5dd218daff18765b512708dd37d505c33fce4d88f34e1f,2023-12-11T17:31:56.900000 CVE-2023-49465,0,0,3295dd761e06a7bab659329b7dd55f865f3505849f65d110e023c01328124ac4,2023-12-30T21:15:43.877000 CVE-2023-49467,0,0,7f3716a39cf738913c36e4fa2859efa373c3aaf2bd666ae6754d1492097f8159,2023-12-30T21:15:43.957000 -CVE-2023-49468,0,0,bfb71ddc96fc61c25389cb277f3607453a350af6a19b799eacb4a3c375f3b229,2023-12-30T21:15:44.010000 +CVE-2023-49468,0,1,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000 CVE-2023-49469,0,0,cbc193cf36e9355f9d67ec1bc5dc157b2a50fd7106252de12cbfb6ed4ef2ef76,2024-01-04T17:14:07.600000 CVE-2023-4947,0,0,8df0a8e59512a342c1480f6e8ba47140e8a497588a05b9e649ab29c7e1e4eb1b,2023-11-07T04:23:12.703000 CVE-2023-49471,0,0,0f7e53b0476caf611046a94136cc7f6de729f116f183f5bc0ae510c9611e40ac,2024-01-17T13:41:42.813000 @@ -236917,7 +236917,7 @@ CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec2 CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000 CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000 CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000 -CVE-2023-49546,0,1,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000 +CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000 CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000 CVE-2023-49548,0,0,34b77376d27ee723d3ac14898631fa76b657dfe4cf5b3276c3299d37e41dd1fc,2024-08-08T20:35:02.323000 CVE-2023-49549,0,0,2421b127f456be0fc67abfad0a3b1f8926786d5d65fc8c1f3d22621b1f55fe3e,2024-01-09T16:18:48.520000 @@ -237237,7 +237237,7 @@ CVE-2023-49985,0,0,48621d95c58dd65f642543dd394ac7e9d6daa5b1663d066d6d97b86f6ff66 CVE-2023-49986,0,0,0bfa07ebd9dbe1f0457cbd00aed62c65d63f7c4a056604f06d8368c48ba916b7,2024-08-05T16:35:03.407000 CVE-2023-49987,0,0,6666894146cb92f75fc70a6c668cf409191be8d05d66fdbc2b6973b27220807d,2024-03-07T13:52:27.110000 CVE-2023-49988,0,0,af3f01af8abbd20907ca3d22a8fb2f0ce6ca13f1af6f9bf92429d44550b8b49a,2024-08-16T18:35:02.507000 -CVE-2023-49989,0,1,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000 +CVE-2023-49989,0,0,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000 CVE-2023-4999,0,0,a9caefdd4df7e960da2284d3ca94a538ae47e3d7f39d9ecb83734266ebc3a13e,2023-11-07T04:23:17.550000 CVE-2023-49990,0,0,1e5e5df2253f1be938172770085e3c41be08a9bc49fb8adca7ab6f2eb4169092,2024-01-19T04:15:08.763000 CVE-2023-49991,0,0,bd97a9ee7ae0f1cc74ef24bcda4231f713b9e1b0d8fdff1d77ef1e74196f05c6,2024-01-19T04:15:08.870000 @@ -237991,7 +237991,7 @@ CVE-2023-51381,0,0,dae38e2969db35298f7bb53595e944e9233b54858e286dfa2789b9cc64727 CVE-2023-51384,0,0,ec284ced8a028c80f45570d0f48e893a628f0d7f6a64a78835100e3773167767,2024-05-16T20:05:04.420000 CVE-2023-51385,0,0,851b9cad7a3a79109e0c97cd30aedcae9c6f131217d805171f55cda1951222c6,2024-03-13T21:15:55.100000 CVE-2023-51386,0,0,4989bef2423d43e06599dc7ab49fc1d8a0bef0f8e3a284aff6f4a4e0683c2314,2024-01-04T19:16:10.103000 -CVE-2023-51387,0,1,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000 +CVE-2023-51387,0,0,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000 CVE-2023-51388,0,0,2e3ad8da9f38d091cbd8c98cd1a3aabae546f5511bbdfeff688c563085b3097e,2024-02-22T19:07:27.197000 CVE-2023-51389,0,0,c8183e674f9d5219872a33e92b5a1fdc0eae3b4f316b3eb093c7a493c5e168c0,2024-02-22T19:07:27.197000 CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159a8,2024-01-21T01:44:13.437000 @@ -238263,7 +238263,7 @@ CVE-2023-51637,0,0,9dd5b13b347418006a53b7d73382dc77bb92ad47f1cbb8db408529d421275 CVE-2023-5164,0,0,b96e66d5438a1cd840a20c13041943d6f222ecbeaac68c7c2ffd9b6ed64d4331,2023-11-07T20:09:50.093000 CVE-2023-51649,0,0,70538420b22ae7c1ec835f6d0f9cf2b1648e5b5b1c043bf313fd06206fe66366,2024-01-03T20:05:01.863000 CVE-2023-5165,0,0,f7a9615603b2683ca9f4a9791f442b32b6c76896818992c01d44336b1364689e,2023-09-26T15:50:49.217000 -CVE-2023-51650,0,1,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000 +CVE-2023-51650,0,0,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000 CVE-2023-51651,0,0,67d2a3bf08f4d907e981e638fa0d5228e436cc7d71dbb46f1110ed924b67b0d6,2024-01-03T18:32:41.760000 CVE-2023-51652,0,0,39d217c9de6d0571e49c9aba349c3d8cf90b339902c56edcd4df3013a87c71f5,2024-01-08T19:35:18.890000 CVE-2023-51653,0,0,340dbcfc1bdb4753b236d00e4b63c6786e60d215a986fbe2b29b43277f9525e4,2024-02-22T19:07:27.197000 @@ -240877,7 +240877,7 @@ CVE-2023-7013,0,0,752e84fc788817f789f383d9b4727a6a371c7a1c500c5d0ed88cf4177f1382 CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000 CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000 CVE-2023-7016,0,0,010884b21a27fa66d833a70681dd186e397f473cbb0b90536483fba7b0d7269d,2024-02-27T14:19:41.650000 -CVE-2023-7017,0,0,d43bb3d02f436ac3feae16f37cb770aded8869c7c92b22169a5874f87e286ae1,2024-03-17T22:38:29.433000 +CVE-2023-7017,0,1,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000 CVE-2023-7018,0,0,9438a9ef02cb6b14eeff26492e18c6b4314ac91317f5ba8b28b4a172250c35b2,2023-12-30T03:13:12.367000 CVE-2023-7019,0,0,25421d5b7b02bc2542949247708020c3ce3a00d66a261d8b3c79bad4af5b1cd1,2024-01-17T22:28:36.323000 CVE-2023-7020,0,0,7d3304d8f230cb46404a5f4e0c7dfc242c13c646702476b3fd55147c8232dd5a,2024-05-17T02:34:03.503000 @@ -240944,7 +240944,7 @@ CVE-2023-7081,0,0,b94c538c220abbbf5d50ca8a2904f1fe370fbb1f80a5e1f3321f9af9bffbc7 CVE-2023-7082,0,0,500d0f2d877d9984b63decc202acb4ee4bb46b23d005a29465c40aa2ce7d0bca,2024-01-26T19:48:56.570000 CVE-2023-7083,0,0,cb22c9eca48a356f4e09d670d9f560809daf8ed155fa4fd28ed59b232188d26d,2024-01-19T14:54:30.993000 CVE-2023-7084,0,0,4632f03cec16c49d84207124ebe67a266da26c671bc47e64aa3e00e71deebb1b,2024-01-19T14:54:24.987000 -CVE-2023-7085,0,0,da4e24c322f876c0f94209a6ada5b031f39fe51c4da1fcc26d3e0f2743831f74,2024-03-18T19:40:00.173000 +CVE-2023-7085,0,1,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000 CVE-2023-7089,0,0,de15bf10cbbafe87d399a0ec4c918efb24631900a27c9c1192eff372993ed731,2024-02-03T00:27:31.313000 CVE-2023-7090,0,0,a5b4a70cda853965b97ddccc4bf6511943919b8d4fb98b9077b8f1637ede54e4,2024-02-08T10:15:13.540000 CVE-2023-7091,0,0,d58faa483178a62c20472bf1bded86f6b329c385b83c74a05c3e1f3b3b217008,2024-05-17T02:34:08.657000 @@ -241015,7 +241015,7 @@ CVE-2023-7163,0,0,54f5e7a55d48eb95c47fe9ab2bd934c769b28ba59ea5fbda349ed798a02bdb CVE-2023-7164,0,0,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000 CVE-2023-7165,0,0,9579de52ee223f320f228c1ef75c7d093c7dd9bb72a0fc1f5802e6bcb3ff7ba2,2024-08-09T19:35:02.617000 CVE-2023-7166,0,0,6cedf7ff09611c5f6f6894ca5635265e9233fca36dede244b351d519590f0234,2024-05-17T02:34:15.110000 -CVE-2023-7167,0,0,88ba53fe30221ae79ab66946da9ed586fa8d09e6fce2dd10ec5e0586182d0a78,2024-02-27T14:20:06.637000 +CVE-2023-7167,0,1,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000 CVE-2023-7169,0,0,ab91bd41244dde388327206c23937e5dca7ce4b0de2116a1c3757d023bfdbdc4,2024-02-15T02:29:40.877000 CVE-2023-7170,0,0,c09ccb7568e9a7781a5b4886b0c86c25c0a32c50adfe4049560ce5dfc4fe85bc,2024-01-26T21:05:46.627000 CVE-2023-7171,0,0,ca5e0c79c1ad7ffbcf6087eb7053f4be605bc976e841898426c6792174a905d1,2024-05-17T02:34:15.343000 @@ -241107,13 +241107,13 @@ CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c CVE-2024-0010,0,0,0619a8beffc460e406861d5436887a98d4820a4ca409aea20f604a00879fcec0,2024-02-15T06:23:39.303000 CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50ac,2024-02-15T06:23:39.303000 CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000 -CVE-2024-0015,0,0,81cd08444b6aef5834e4eb427fcb32b84cfcb9c43ccd80385d5b532e537d2ea5,2024-02-16T19:26:55.393000 +CVE-2024-0015,0,1,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000 CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000 CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000 CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000 CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000 CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000 -CVE-2024-0021,0,1,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000 +CVE-2024-0021,0,0,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000 CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000 CVE-2024-0023,0,0,0ae19107c0f009088c14cc9607c2fcb734bab1e5ea02d37a78e27ee1213b97f1,2024-08-21T20:35:01.700000 CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000 @@ -241126,7 +241126,7 @@ CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914 CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf814,2024-02-16T13:37:55.033000 CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000 CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000 -CVE-2024-0035,0,1,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000 +CVE-2024-0035,0,0,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000 CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000 CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000 CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000 @@ -241671,7 +241671,7 @@ CVE-2024-0669,0,0,c742feb186482c5b850f8f47a8ad21b0a116882aa950f3b591c682f1d00d2f CVE-2024-0670,0,0,d7af230e4a779f07d41ef710c5466f9f1f09f5eed836a0b4fda43c6f633ecf53,2024-03-13T23:15:45.750000 CVE-2024-0671,0,0,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000 CVE-2024-0672,0,0,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000 -CVE-2024-0673,0,1,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000 +CVE-2024-0673,0,0,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000 CVE-2024-0674,0,0,2202c0e4a57a8020cd97aff2c1a5d1a1df2bd5f61035f83890c80e50cc47048f,2024-02-08T16:39:59.450000 CVE-2024-0675,0,0,31b4e65d3d10777ce13189dafebdfb82e520a928a3d9c7e18ba8db99a930c11a,2024-02-08T16:39:42.950000 CVE-2024-0676,0,0,435ecea72a5bce3bb04c7988a29d806f61fbeed7ad45e02290781eeac120a465,2024-02-08T16:39:00.907000 @@ -241950,7 +241950,7 @@ CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368 CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000 CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000 CVE-2024-0972,0,0,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000 -CVE-2024-0973,0,0,e5fb6b4d7ce253b144fdf362ec0f968de6ca466dcd6c3adca143df6bc6e05926,2024-03-18T19:40:00.173000 +CVE-2024-0973,0,1,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000 CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000 CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000 CVE-2024-0976,0,0,cc7f106853c76332cf2c1434fc9c2b994b6bd96e33b062831e11057ccad8d2cf,2024-03-13T18:16:18.563000 @@ -242233,7 +242233,7 @@ CVE-2024-1267,0,0,0ac3a4ad3c33b1de1cb6d3c82dc409665a58abf06843c3ddfdea13f760f08d CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b804c,2024-05-17T02:35:22.040000 CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000 CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000 -CVE-2024-1273,0,0,77e426e491189decb08be6f5f41b23b0e6b37212aa753cdfd723b534f74aeb9c,2024-03-12T12:40:13.500000 +CVE-2024-1273,0,1,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000 CVE-2024-1274,0,0,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000 CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000 CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000 @@ -242273,7 +242273,7 @@ CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15 CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000 CVE-2024-1313,0,0,e178cffe6aa77a4f0d6d1f0bc0814c15387ceb02accf822d00ca94cf3dcbb92c,2024-06-10T18:15:24.947000 CVE-2024-1315,0,0,25a55ec7d2eabca19718f4f801048334cc1cea56ed0621182dceeddb8f9f2d51,2024-04-10T13:24:00.070000 -CVE-2024-1316,0,0,8219ebc553a9077664f3f7c46bd8d84684203b334ed147394b768c21ba00910d,2024-03-05T13:41:01.900000 +CVE-2024-1316,0,1,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000 CVE-2024-1317,0,0,e6b73971b8fadcf515a25ac1e50eb31e33a60418d7d45cd3d52420834e679d55,2024-02-29T13:49:29.390000 CVE-2024-1318,0,0,5ba6af40f86ed8ef42439c311587e2b7fcfc352f41e84ea7a6e6cadfbc71379b,2024-02-29T13:49:29.390000 CVE-2024-1319,0,0,903406ad02ffa43d0d568c21b4803da244dc9d7ce0c7f684b31acb02d2ec9380,2024-03-05T13:41:01.900000 @@ -242288,7 +242288,7 @@ CVE-2024-1327,0,0,ae9f5cba237be94589254d7283daa73f7fafabd33cfebb17147581f2cee609 CVE-2024-1328,0,0,7073f5514db5b26279568b528e71529068f45e6ad24d9e6819ac92a07723ef47,2024-03-12T12:40:13.500000 CVE-2024-1329,0,0,2cd50cabd5bf81a4f9539c2a3a992a874338213f75ad414ccf75d557c037546e,2024-02-15T18:27:28.837000 CVE-2024-1330,0,0,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000 -CVE-2024-1331,0,0,6c977f20f6f7bde4755773555c00e763bf8e9a163fc61da4ae97f1dd32b908a9,2024-03-18T19:40:00.173000 +CVE-2024-1331,0,1,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000 CVE-2024-1332,0,0,b1d0012a9e40c173cc8f28116508227ff7724ad8f4f969c3dc5f4b0e2f08d038,2024-05-24T13:03:05.093000 CVE-2024-1333,0,0,bd53e9cdde226b8c165843c67dcea5ab4ff36ead472bf29231b1c2f3f1abcb85,2024-08-27T21:35:07.153000 CVE-2024-1334,0,0,fe4c6be53440216c757c2bf51b270a3930f5c7dd35674ef18ead1fe70ed3fa7c,2024-02-29T13:49:29.390000 @@ -242593,7 +242593,7 @@ CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a0 CVE-2024-1666,0,0,1f8333a8347ccf0940f5f18eb72bff97cea1045d2d21b82516336ffe9989709b,2024-04-16T13:24:07.103000 CVE-2024-1668,0,0,5d777dacf70894c13bb98378761ebbab538d2f58e3be366f3dd859cfdec3a507,2024-03-13T18:15:58.530000 CVE-2024-1669,0,0,7051f11d6175af0afa7adcb8852b15d12f5bb44802faedbbae321e1477b73fea,2024-02-26T16:27:52.577000 -CVE-2024-1670,0,1,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000 +CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000 CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000 CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000 CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000 @@ -242871,7 +242871,7 @@ CVE-2024-1958,0,0,947fad07d36c41a06040aff36ab5d050d343db5e82c876a243f2fa9452dd0f CVE-2024-1959,0,0,20773b09a03765316a8a30eab375cea71fea1425346dc1ce35f18b661dfaac63,2024-05-02T18:00:37.360000 CVE-2024-1960,0,0,c755cb8cb954b0b1fd45e3b2b2de1bed153c08b47450f36752ad68952963c3e6,2024-04-10T13:23:38.787000 CVE-2024-1961,0,0,dc2f9d3f3b67fb9e1c6125531b0d8e4d845cdbbf4294ea07c79e7fd65b2f59e9,2024-04-16T13:24:07.103000 -CVE-2024-1962,0,1,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000 +CVE-2024-1962,0,0,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000 CVE-2024-1963,0,0,497da3e0c849986f6d35bf596bea7f2a65b5687d8cd64468172b927cfb094a60,2024-07-18T19:46:01.863000 CVE-2024-1965,0,0,5cf0344d0ba6ffdf46e178c3a3f0a22dafc37cdaf493620506aae0773081ac04,2024-02-28T14:06:45.783000 CVE-2024-1968,0,0,5d386d638a6745d5972e3da785c6fa3ef4f25b00eef921490d278858d9e57670,2024-05-20T13:00:04.957000 @@ -243031,11 +243031,16 @@ CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bb CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000 CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000 CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000 +CVE-2024-20279,1,1,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000 CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000 CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000 CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000 CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000 +CVE-2024-20284,1,1,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000 +CVE-2024-20285,1,1,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000 +CVE-2024-20286,1,1,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000 CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000 +CVE-2024-20289,1,1,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000 CVE-2024-2029,0,0,354f931e93072109dced3bc73857c32e7a282fc5266016d20bde6f1070f10b9d,2024-04-10T19:49:51.183000 CVE-2024-20290,0,0,95fa55047489b4a2ee370988084e137cebac8acab30010c47f69339f30b23cb9,2024-02-15T15:43:27.240000 CVE-2024-20291,0,0,c2ed04ab4eaaddf8b1bcc5dc083481f305536f5151be36cfe21c14f02472ee22,2024-02-29T13:49:29.390000 @@ -243124,6 +243129,8 @@ CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002 CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000 +CVE-2024-20411,1,1,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000 +CVE-2024-20413,1,1,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000 CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 @@ -243133,6 +243140,7 @@ CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000 CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000 +CVE-2024-20446,1,1,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000 CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000 CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000 CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000 @@ -243140,6 +243148,7 @@ CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f7 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 +CVE-2024-20478,1,1,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 @@ -243659,23 +243668,23 @@ CVE-2024-21129,0,0,46efd627f8b87e045268cbee292986282d76e8b338e8626a07344d3f76a5e CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000 CVE-2024-21130,0,0,c5d206e6fb887c84baa9c493ebc7d93f2ba4e2f0bacd858d2d5741cf02d71f96,2024-07-17T13:34:20.520000 CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000 -CVE-2024-21132,0,0,a847eec6e39593d2e3be335daccbaa7566fca94a3cea944f277ae6077eb8c167,2024-07-17T13:34:20.520000 +CVE-2024-21132,0,1,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000 CVE-2024-21133,0,0,9a1197ce9530b48696d53f4b8d6c0bb018d1a324656fccf337eedb1d5dc8a23b,2024-07-17T13:34:20.520000 CVE-2024-21134,0,0,631920bbbb3f0a2e285eb8830426e0d345e96a6482baa287298491b83a91756a,2024-07-17T13:34:20.520000 CVE-2024-21135,0,0,9aadd6ca5a38f239443e4aa9211c7acd69c8becfda2781dc6ecf3e89d27baedd,2024-07-17T13:34:20.520000 -CVE-2024-21136,0,0,ad8ed641eb9e0dfe773d7b453ce1a777791004300592ffcb4b9aeccb6189d2b8,2024-07-17T13:34:20.520000 +CVE-2024-21136,0,1,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000 CVE-2024-21137,0,0,8b1ccafbde54d689b232a5ba4da880526c6b578bae146f59db158760bdc4f414,2024-07-17T13:34:20.520000 CVE-2024-21138,0,0,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000 CVE-2024-21139,0,0,ac1e7874c883d227974696e6da1f4ea74ebc9ccd7cdf45b6f9f9065cbabb6c27,2024-07-17T13:34:20.520000 CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3d60,2024-08-01T13:46:27.193000 -CVE-2024-21141,0,0,a46fdd63fb31ff99b4780cb153ac9f2ae29000b590679f43cbb64095a7fb0c47,2024-07-17T13:34:20.520000 +CVE-2024-21141,0,1,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000 CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000 CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000 CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000 CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000 CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000 CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000 -CVE-2024-21148,0,0,7bc96a76ce0077505eae8d68abc8206f3ba6f186267ade9b3eedb49371d494f1,2024-07-17T13:34:20.520000 +CVE-2024-21148,0,1,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000 CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000 CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000 CVE-2024-21150,0,0,8bf7ad156aade7fa3f13e2261e319a8085198969642f90d90774096fb77f35b3,2024-07-17T13:34:20.520000 @@ -243689,11 +243698,11 @@ CVE-2024-21158,0,0,abd2177430b15289f1dafe8369befc77334519d6a9221a02b1f5bfbbc009d CVE-2024-21159,0,0,2ff4efcbe3aa08e46da9e0946901b69656a8a1ad9976fd197b8e18d6231382c7,2024-07-17T13:34:20.520000 CVE-2024-2116,0,0,db5680b78c73e9ed7444fef2da21a0c5bcac8a3e521c07413a62cc0c6dfac6ff,2024-03-29T12:45:02.937000 CVE-2024-21160,0,0,20f8ad0ce54327b1482f0174779d6b8936bf9313ce550cb111b84c1a3729be73,2024-07-17T13:34:20.520000 -CVE-2024-21161,0,0,612c4884deeafecd7580dfdbda30fa8bdd1ab1716fdba44ef79465dbc125b3e1,2024-07-17T13:34:20.520000 +CVE-2024-21161,0,1,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000 CVE-2024-21162,0,0,6599b8c3e8d4ce2bd56d758955204dc60835461542055bd440e060f275edef92,2024-07-17T13:34:20.520000 CVE-2024-21163,0,0,1c218c6447f5bc6b8f4a4bcf8e9b987dd785d628ca9f5052cf582edba99f160a,2024-07-17T13:34:20.520000 -CVE-2024-21164,0,0,409d31e6725bddcbc7809866c9718b7fe29398e89ea9c04f4ddf0f02e0b7f477,2024-07-17T13:34:20.520000 -CVE-2024-21165,0,0,20993784304d7762a8021f9b16e9507bbf65223455c94632351bf958464a2463,2024-07-17T13:34:20.520000 +CVE-2024-21164,0,1,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000 +CVE-2024-21165,0,1,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000 CVE-2024-21166,0,0,ede3b755f5804621a8ef25d79d9679055f7e04ae20b8138869340e09adf91227,2024-08-01T13:46:33.843000 CVE-2024-21167,0,0,68c8f227666c06298257f7b468706125c2676562df674ce8154b7de7b4496211,2024-07-17T13:34:20.520000 CVE-2024-21168,0,0,c69572c1110a4cc480c0e5afb70d08f9984a6bb55f4f3c55f471c687df059b4a,2024-07-17T13:34:20.520000 @@ -244065,7 +244074,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6 CVE-2024-21677,0,0,172011c5d5a06c0e2ca2f356ecd05cb171d9f8cbcabb5b389ad48344d43d1ad1,2024-03-20T13:00:16.367000 CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc778397e,2024-02-20T19:50:53.960000 CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000 -CVE-2024-21682,0,0,ea94962fb19bc771b1e7e5a4a1b57027a5c5c8b332b79d32007472ab6d5177d5,2024-02-20T19:50:53.960000 +CVE-2024-21682,0,1,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000 CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000 CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000 CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000 @@ -244096,7 +244105,7 @@ CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000 CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000 CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000 -CVE-2024-2174,0,1,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000 +CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000 CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000 @@ -244421,7 +244430,7 @@ CVE-2024-22182,0,0,b8c6625a5282a72f76fb60314413b773d9f3fb9c9d9f485e5d536e19dd0bf CVE-2024-22184,0,0,e3b13ffe675f8579db3776363f4670ba9137f26137c3f424c46d120f2b78c4bf,2024-08-14T17:49:14.177000 CVE-2024-22186,0,0,59ecddd100ddcae06a7ecf9fc641630f9ab4f57ca25d5313e480ef6c07a40e52,2024-05-28T17:15:09.680000 CVE-2024-22187,0,0,764c633f29a9b7a4988eca707a5f5a20cd222e9e3850a0ea108932eed046a25b,2024-06-10T18:15:25.660000 -CVE-2024-22188,0,1,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000 +CVE-2024-22188,0,0,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000 CVE-2024-22189,0,0,fea0be1a5a7409c880f87752eeb084fafd5b6d1284d3177e6521b5c7516d6ecd,2024-04-04T16:33:06.610000 CVE-2024-22190,0,0,e6ac33b356ba6a74674e45bf7cdf7d2f2e69f941856b85a391b927bae4fad4a8,2024-01-18T13:48:07.553000 CVE-2024-22191,0,0,f7f1b03cf67feaead11389a4af47a24ff41e590c594aa0c037973685b4253fd3,2024-01-24T18:13:53.947000 @@ -245030,7 +245039,7 @@ CVE-2024-23212,0,0,f80d0116e96d75ecefd545c3526dcd4d5f88bcbed5b339e1c95b1820f7413 CVE-2024-23213,0,0,3accb2e6ca7cc402e236c9474680e18edadbd0d691e602685b9c7a01131e56df,2024-06-12T10:15:29.957000 CVE-2024-23214,0,0,33119634a46fa5c4e530acd0e9c618db34847fde568cfa47bd7b42b58ac780ef,2024-06-12T10:15:30.080000 CVE-2024-23215,0,0,33fc650ebd8d97f7539b32750e085a2fd8b81965edd8ee0561acd57fa017b4eb,2024-01-30T16:17:32.130000 -CVE-2024-23216,0,1,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000 +CVE-2024-23216,0,0,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000 CVE-2024-23217,0,0,22b8aabc2c537f06727d28ccece5638ac7f57c64b05d618b0085cec7c37d61be,2024-03-13T22:15:09.273000 CVE-2024-23218,0,0,764d9591d3c5e993d8e4b9e38693ec8072deb6341bcae3b3215d2e62a14277ea,2024-03-13T23:15:46.027000 CVE-2024-23219,0,0,478ca77553ffcd9677d8ceaf589ef8d6cf6bae32d2a8df76b85c410ad74b3348,2024-01-30T14:36:42.017000 @@ -245058,7 +245067,7 @@ CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0 CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000 CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000 CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000 -CVE-2024-23244,0,0,455d9fe185a5ba98c85be5a60bcc93f0c8059eb317391f8af99e553d44b61dc5,2024-03-13T23:15:46.480000 +CVE-2024-23244,0,1,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000 CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000 CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000 CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000 @@ -245093,7 +245102,7 @@ CVE-2024-23272,0,0,862f7d259a6cfce25fc04a6db8d5e2417105b7f51cabfc9af10955b3e49ce CVE-2024-23273,0,0,8ea5a132f7f9599d563a8466af6d69a139c2be77bdbd7e0c7a2fee86dd445737,2024-03-14T19:54:26.287000 CVE-2024-23274,0,0,d63dec58c682291f417ab20be0e0fbb2c8ea2b0b1f5246aeb4f66431c08118d0,2024-08-01T13:47:13.570000 CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8dfedf,2024-03-14T20:34:02.077000 -CVE-2024-23276,0,0,6f3b52f749f8311c4232b3c82ff3f246f15d88c45d906f1a4e0e3bdde6ac41e7,2024-03-14T20:34:18.527000 +CVE-2024-23276,0,1,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000 CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000 CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000 CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000 @@ -245106,7 +245115,7 @@ CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdf CVE-2024-23285,0,0,5a0d4d7d553005e90735503704fdc16408a5286a022afa1dff47851a5d56c396,2024-08-27T21:35:09.383000 CVE-2024-23286,0,0,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000 CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000 -CVE-2024-23288,0,0,26b1136d0d4444408c9f51d02208acadeac0b309c2fd8cd24b38e5f71e3d14bf,2024-03-13T22:15:11.173000 +CVE-2024-23288,0,1,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000 CVE-2024-23289,0,0,88178045365eb11e89ccefeb5771451d6b6166955f5f6c5f6a64f2f080826233,2024-03-13T22:15:11.227000 CVE-2024-2329,0,0,11e6f1e43e05cca18867c7d5c048956c7fecd23b0254816ac97fead1b2517ae0,2024-05-17T02:38:10.443000 CVE-2024-23290,0,0,c464194e225931bf0d2137cac165c36f9146fd1d9e1ad3c4a6426c7b4df4b92d,2024-03-13T22:15:11.280000 @@ -245437,7 +245446,7 @@ CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 -CVE-2024-23721,0,1,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 +CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000 CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000 CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000 @@ -245683,7 +245692,7 @@ CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98 CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000 CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000 CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000 -CVE-2024-24043,0,0,e1968910fbe3303046e08aad0f620638588dfecc0e402ebdf747bad91bf95f6f,2024-03-19T13:26:46 +CVE-2024-24043,0,1,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000 CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000 CVE-2024-24050,0,0,d8a497c77556b4efbe72dd469fd71e81b74bd8a1e54cb63f7dab3892d7471943,2024-03-21T12:58:51.093000 CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000 @@ -245730,7 +245739,7 @@ CVE-2024-24148,0,0,a02156e49f720741f5d47ffecf3d295f680f99f45fd5e722459fdf6b3749f CVE-2024-24149,0,0,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee0a5,2024-08-13T19:35:04.837000 CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000 CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000 -CVE-2024-24155,0,0,2c63d7924f0cfbcec05c8391f1806e0f50aabfd2ca7e4c7b5af6f390f137d171,2024-02-29T13:49:29.390000 +CVE-2024-24155,0,1,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000 CVE-2024-24156,0,0,4d905495fcc21ea03b392e5dcfb4049afb36c88ec6395d026fb3a826675269b3,2024-08-19T20:35:03.650000 CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000 CVE-2024-2416,0,0,509b47b2b38dd8150594dfd075dd7f079b3bbd22e8420f2d63fb8a39e8d3ccb0,2024-03-13T12:33:51.697000 @@ -245801,12 +245810,12 @@ CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583 CVE-2024-2432,0,0,57240eece5c1b31c057486728f6363c9217250d91f3d10c0c941fdad51a7f6e5,2024-03-13T18:15:58.530000 CVE-2024-24320,0,0,a5847bec026f9a38211f5c0373776488eb6f7d35353beef2a24ffd1ecc8d8864,2024-08-21T14:35:04.240000 CVE-2024-24321,0,0,88c98cb76542c8acb076726441dae70ba16682bd2171c6fbca3804855a845a0c,2024-02-15T05:02:58.427000 -CVE-2024-24323,0,0,87c9f21a2b792326c3395038aca05fa9c659ed3affd70ad21bad1ba52479ce4a,2024-02-28T14:06:45.783000 +CVE-2024-24323,0,1,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000 CVE-2024-24324,0,0,e65b7320bc70eb87aafe69f87ce443d4231ab35603a9991590cdc2a337dea76b,2024-02-01T04:49:29.220000 CVE-2024-24325,0,0,c48bdb59f66fc453df8a65a409e26ae0fc9e608ab91641625410877a482dad6a,2024-02-01T04:49:27.410000 CVE-2024-24326,0,0,ffd176ee9cc205937cd1eaded7dc4a650316e43005277f1af89616e40875e18b,2024-02-01T04:49:24.940000 CVE-2024-24327,0,0,b496192967607b64939b46dfafe2c91cb919e1f1a3928b7c8c6e7165f4559273,2024-02-01T04:49:22.830000 -CVE-2024-24328,0,0,6ead54e0ed7aac5b64071a50f85f248cebff3b6d5e997fc6c92b63dc8aee1aa4,2024-02-01T04:49:21.037000 +CVE-2024-24328,0,1,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000 CVE-2024-24329,0,0,cd2cef58182ccada9d789908a0715e06b22ee8c2346a6ad57e7666e3ca17fc5f,2024-02-01T04:49:18.867000 CVE-2024-2433,0,0,af22ac085d1109b732837345c936d39f0c3c18741ae1714b3ff1934488777262,2024-03-13T18:15:58.530000 CVE-2024-24330,0,0,6f4394e82ffdaddc9904fbc3397bf25ed86fab2a1cc87acc40260a4358ba28b7,2024-02-01T04:18:43.927000 @@ -246275,7 +246284,7 @@ CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd8 CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 -CVE-2024-25083,0,0,9d2f407cabf3a12bbd22cd36b42859a90ce2fc840877d4b234c6f6f10f6ee54c,2024-02-16T21:39:50.223000 +CVE-2024-25083,0,1,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000 CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000 @@ -246449,7 +246458,7 @@ CVE-2024-25344,0,0,db69ab30d7794b839b183db3e507228c9f3f45497af2375243b3fe88a539e CVE-2024-2535,0,0,1d4fc1154e21273a7c74f61b7c8874d973288768c48e8247cc99c965af9b7c7f,2024-05-17T02:38:18.023000 CVE-2024-25350,0,0,3eadafce3b2244ddf5f3884efc711bcacedce55f760934f937927ed6e35502b0,2024-08-01T13:47:41.340000 CVE-2024-25351,0,0,799dbc66bff5fa6efdf5aa91495ce5a0210c4cb89c79f9796068de8220467c77,2024-08-26T20:35:14.720000 -CVE-2024-25354,0,1,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000 +CVE-2024-25354,0,0,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000 CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6ca08,2024-08-02T20:35:24.740000 CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000 @@ -246567,7 +246576,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000 CVE-2024-25576,0,0,1298eb71baf232c73dfc082da86c1a427fcac3907201ddd5e757f1be26775922,2024-08-14T17:49:14.177000 CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000 -CVE-2024-25579,0,0,3ce7817b4efbfe814fc7f2f138ef6147015c649f3e26a4e4549fa9163410577a,2024-06-12T01:15:49.137000 +CVE-2024-25579,0,1,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000 CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000 CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8cc67,2024-03-27T12:29:30.307000 CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000 @@ -246640,7 +246649,7 @@ CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000 CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000 CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46 -CVE-2024-25655,0,0,e15adc8eac4466bc206ecbf344e823f2dc60c695c8e2b528f93955091c188195,2024-03-19T13:26:46 +CVE-2024-25655,0,1,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000 CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000 CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000 CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000 @@ -246747,11 +246756,11 @@ CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fa CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000 CVE-2024-25854,0,0,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000 CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000 -CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000 +CVE-2024-25859,0,1,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000 CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000 CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000 CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000 -CVE-2024-25866,0,0,9800d1d73cf4e02f2835e7808c820220d82c6c39d582e9178e2e2aa396a9c576,2024-02-29T13:49:47.277000 +CVE-2024-25866,0,1,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000 CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000 CVE-2024-25868,0,0,8468e8c7cd26d2e5838f8da558add0a0ea34e7d6538ad367885aebb852006e2e,2024-08-27T20:35:15.173000 CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000 @@ -246919,7 +246928,7 @@ CVE-2024-26045,0,0,0acb4c430eb04b486f9fde8afbebe04bb30c7a2da9501b59437c922e62ac2 CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000 CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000 CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000 -CVE-2024-2605,0,1,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 +CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 CVE-2024-26050,0,0,a01e15c84b45a65b3bc336a569ca46f534ec28925a3745536846dbd737880774,2024-03-18T19:40:00.173000 CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000 CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000 @@ -246963,7 +246972,7 @@ CVE-2024-26086,0,0,ae34cc70c1fb5245418ea1021c46e145477ed2510ed19be388b0597933b58 CVE-2024-26087,0,0,886690623538c9b67d73b3140abb23679c4e72a1155e44ccb96173e256c726c6,2024-04-10T13:23:38.787000 CVE-2024-26088,0,0,aed72cfe3c05269ae6fa7444f7478df5bb7d6d6fd37a95c7c481f7f0efb015d9,2024-06-14T20:10:01.653000 CVE-2024-26089,0,0,87f38a9968c3e4028ac78d2f547942af5af438b7e5b9b22788cce73b35aca8df,2024-06-17T20:32:03.657000 -CVE-2024-2609,0,1,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000 +CVE-2024-2609,0,0,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000 CVE-2024-26090,0,0,ed98f35d571423c5ef53e825d7ea9212d7ca429e14c4d90b79333d7179f2c1a9,2024-06-17T20:32:18.073000 CVE-2024-26091,0,0,432c29cd1da1e6c9f8652a2bc2bfacfd01862e5bf100718ad43ba6760143b36d,2024-06-17T20:32:37.817000 CVE-2024-26092,0,0,67476159c2a94aa6c3caf2c7ea973d42f985c77e89e69f10705b74d3b72d9b65,2024-06-14T19:55:31.347000 @@ -247023,7 +247032,7 @@ CVE-2024-26146,0,0,554fce310a1cb01edbb3b3f06f7dd6d6c768a6125a05ad6a5f05315540519 CVE-2024-26147,0,0,31938bfd609e440a2f1803807cf5ed67ed95c5f9b331c66db59a00a1433a779e,2024-02-22T19:07:27.197000 CVE-2024-26148,0,0,db984f5e17193fef4f237cfc03c668c1be3c9c198ae40220b6dfc6aeb32d7d9f,2024-02-22T19:07:27.197000 CVE-2024-26149,0,0,cdd4ff9e035195557225db24049cf1e570f0b2e25d95a9e4fdf8b2509a4f3d3a,2024-02-26T22:10:40.463000 -CVE-2024-2615,0,1,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000 +CVE-2024-2615,0,0,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000 CVE-2024-26150,0,0,724a23f6f5cd2b08e078faf9766b70ef43f45650f38390687bb0597c880332b3,2024-02-23T19:31:25.817000 CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639eb1,2024-02-23T02:42:54.547000 CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000 @@ -247122,7 +247131,7 @@ CVE-2024-26245,0,0,d8e7715693a4c17db96124229016576d132c978af86f165ed843021cc0e24 CVE-2024-26246,0,0,281c00482b3c35bb6fb58282b68f55f76ce6bc574686f37dcb024dae18841f5f,2024-06-11T16:15:22.197000 CVE-2024-26247,0,0,2e08eb3ba6b627c10ba27bd8963a5aabfaab07773e08696de8ef39c9e2d29c88,2024-06-11T16:15:22.333000 CVE-2024-26248,0,0,1d69ec410d789e5cecdce5ca5f00f4cb4dc73522c17a80577a09df4303fbce8e,2024-04-10T13:24:00.070000 -CVE-2024-2625,0,1,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000 +CVE-2024-2625,0,0,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000 CVE-2024-26250,0,0,361a4a598e17b5e0caa4dfe07f1d82a4b2b3caf0473c9778a9a5173e920f20ed,2024-04-10T13:24:00.070000 CVE-2024-26251,0,0,752d1c2a1c430ddddba02d64b195b606d79a2c3854c081fbabcf7b1750edf415,2024-04-10T13:24:00.070000 CVE-2024-26252,0,0,a16ea7a04b440699076d4a90d57b94e69adc561ff365215a47bfe0edfb85ff13,2024-04-10T13:24:00.070000 @@ -247178,7 +247187,7 @@ CVE-2024-26307,0,0,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592 CVE-2024-26308,0,0,b4d73560210ad1a249254bb49e208942ee75ee7f41147c3b9e47cd68fff84e87,2024-03-21T19:54:03.230000 CVE-2024-26309,0,0,2640b5966073fd3d518fa5abac6bf90144529b272adda5f9f180e91c567c3f6b,2024-03-08T14:02:57.420000 CVE-2024-2631,0,0,c40f6cd20ef48d6d5340c38d8cfe42cec4782b3ae9f2af1e0914d012954c4b8c,2024-04-01T15:23:45.590000 -CVE-2024-26310,0,1,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000 +CVE-2024-26310,0,0,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000 CVE-2024-26311,0,0,28ff8a1b0384f422415c01ccf263a2e9d55cfdafba39542393811f1550f890d2,2024-02-22T19:07:27.197000 CVE-2024-26312,0,0,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000 CVE-2024-26313,0,0,f4cc2c8a31f2a657cb8e56530069fdda1b7331701b9b323e9b20a0d62c414aa3,2024-03-08T14:02:57.420000 @@ -247229,7 +247238,7 @@ CVE-2024-26467,0,0,f852e96e7aa9bd31104a7a5efbb92bf78ab3732b64936f49fadf5127e2447 CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ececaf,2024-02-26T16:32:25.577000 CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000 CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000 -CVE-2024-26470,0,0,c7b5d7dc6fff2b462a4e7b75eff02406620bfb4a3f9caec2a7328aed1e8f840f,2024-02-29T13:49:29.390000 +CVE-2024-26470,0,1,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000 CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000 CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000 CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000 @@ -247247,7 +247256,7 @@ CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee3 CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000 CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000 CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000 -CVE-2024-26503,0,1,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000 +CVE-2024-26503,0,0,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000 CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000 CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000 CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000 @@ -248294,7 +248303,7 @@ CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663 CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000 CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000 CVE-2024-27744,0,0,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000 -CVE-2024-27746,0,1,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000 +CVE-2024-27746,0,0,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000 CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000 CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000 CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 @@ -248622,7 +248631,7 @@ CVE-2024-28120,0,0,31f0663194c3ae59508b649362ee2d5539147691a5912e9e045c000f7246f CVE-2024-28121,0,0,5d765bddd1522ef772672d7c5b7d192742701db6f681e7efbb273dbd45669d62,2024-03-13T21:16:00.460000 CVE-2024-28122,0,0,84073f6c96d7936717c065299f48850cb9a25df36eb3f8060c8dc4aa02997344,2024-03-11T01:32:39.697000 CVE-2024-28123,0,0,1f90dd93aca0d11a73a18e1eb6b5cda27a407eb4db9e34eaa0e325666a8f1c24,2024-03-21T12:58:51.093000 -CVE-2024-28125,0,0,d05b4beef18ff94cb171b45d1bff2e0f308181a912ef6501300c9c027e77556c,2024-03-18T12:38:25.490000 +CVE-2024-28125,0,1,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000 CVE-2024-28126,0,0,81385e85c5a93c53bb47fe916edfff61f701ac34a4427a9e5bf459631bdea34d,2024-03-26T12:55:05.010000 CVE-2024-28128,0,0,ff9121c55a5d465f19f3056b6278dc961489b664c0de60bae39143ce763e9dc9,2024-03-18T12:38:25.490000 CVE-2024-2813,0,0,d92b59c3edc51ec01f06a151ea9186c3488c58069c0b5769bb5f8edad6a74d59,2024-05-17T02:38:31.770000 @@ -248767,7 +248776,7 @@ CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38 CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000 CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000 CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000 -CVE-2024-28339,0,1,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000 +CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000 CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000 CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000 CVE-2024-28344,0,0,07e206e8ae7b1052e93419db971a4a320fe24d9f630cd6feb731f0be928f9073,2024-07-03T01:51:39.137000 @@ -248832,10 +248841,10 @@ CVE-2024-28515,0,0,a1e2389b4555eab5e18310c7e283a6a35bc4bcaedf003e200c7e78de4e2e3 CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000 CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000 CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000 -CVE-2024-28521,0,1,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000 +CVE-2024-28521,0,0,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000 CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000 CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000 -CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000 +CVE-2024-28537,0,1,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000 CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000 CVE-2024-28545,0,0,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000 CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd135e7,2024-08-15T17:35:04.350000 @@ -248888,7 +248897,7 @@ CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a4 CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000 CVE-2024-28639,0,0,add78e1164c8df42f8993d3ec4e8bcc5efcf9c67ce1cf3d76c2a38423013e9f5,2024-03-17T22:38:29.433000 CVE-2024-2864,0,0,0b7092f6657eda771a1a9211b6ecdc80d9c4229cfeb8d1413066da331f243b95,2024-03-25T13:47:14.087000 -CVE-2024-28640,0,0,106c587776d7eaa30d047f09c3864bea29de634863ccad6bc6dabf8d3997046e,2024-03-17T22:38:29.433000 +CVE-2024-28640,0,1,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000 CVE-2024-2865,0,0,55e62f341bb00366e8e43c3aae92bec34f13cdc149d9c58605d949f8282b8ec7,2024-03-25T16:43:06.137000 CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000 CVE-2024-28662,0,0,dab9197cc819aeac0bf0ea06401058d5cc75e9a0ba3a4ce1ecd76d7bcd7e31f2,2024-03-14T12:52:16.723000 @@ -248896,7 +248905,7 @@ CVE-2024-28665,0,0,1bcb843df69123849882283a8f9fca9c4abb51adf88a0a7fc25bcd7f8392f CVE-2024-28666,0,0,9909b1d8b42ce81db5680c2cff308836e3dc86a07602ebc3692c51a5608b0d49,2024-08-02T21:35:23.507000 CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371374,2024-08-05T19:35:10.487000 CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000 -CVE-2024-28669,0,1,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000 +CVE-2024-28669,0,0,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000 CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000 CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000 CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000 @@ -248910,7 +248919,7 @@ CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000 CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000 CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000 -CVE-2024-28682,0,1,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000 +CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000 CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000 CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000 CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000 @@ -248948,7 +248957,7 @@ CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e9 CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000 CVE-2024-28755,0,0,a971352ccfd1d9312c8fc951387a64198c3d2967458d020bfed491bd6af81566,2024-04-03T12:38:04.840000 -CVE-2024-28756,0,1,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000 +CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000 CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000 CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000 CVE-2024-2876,0,0,96b96473aca77aa576cfbfd4fdd62bd6bbdb12d76f0bee3d312855d2e34a9cd3,2024-05-02T18:00:37.360000 @@ -249257,7 +249266,7 @@ CVE-2024-29128,0,0,77fce425c49ac339ee33e12f1b3878cbdddd513fcac87acb1ce6cb06f4726 CVE-2024-29129,0,0,022433b928b77b4e11df8137329a8e805ce777a51e5c390569874776ed9f1d92,2024-03-19T14:31:27.883000 CVE-2024-2913,0,0,f13b68719789b0ec1d0ac3f00293efe13ae2d2476f7393cb029a386c10b9d5fb,2024-05-07T13:39:32.710000 CVE-2024-29130,0,0,3c5ab042ef8fedd1c9b8f15ab543cc07d9c157ccb5fa600e78e62121be1aee44,2024-03-19T14:31:27.883000 -CVE-2024-29131,0,1,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000 +CVE-2024-29131,0,0,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000 CVE-2024-29133,0,0,36561ecc1d25beeebffdfe71774843942f6f7498bb13fffd291f6157a4b0ff67,2024-05-01T17:15:31.283000 CVE-2024-29134,0,0,64d7104dca1a7039d75ee2143ca2d6681014df1f5270f4434e5925abd69f5cba,2024-03-19T14:31:27.883000 CVE-2024-29135,0,0,82b1b4a3f7dec94f8bbc60ae3c283e311437a5e9bda89959429180db805aaa10,2024-03-19T14:31:27.883000 @@ -249368,7 +249377,7 @@ CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000 CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000 CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d38b,2024-05-17T02:38:37.557000 -CVE-2024-29271,0,1,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000 +CVE-2024-29271,0,0,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000 CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000 CVE-2024-29273,0,0,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65fffd8,2024-08-27T21:35:20.250000 CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000 @@ -251064,7 +251073,7 @@ CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda82 CVE-2024-31809,0,0,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000 CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000 CVE-2024-31810,0,0,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000 -CVE-2024-31811,0,1,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000 +CVE-2024-31811,0,0,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000 CVE-2024-31812,0,0,e59d4fa5975f0119da4cfd4900343a38d484d0506f79ca6ee0996d32731f70d0,2024-08-01T13:51:11.397000 CVE-2024-31813,0,0,29e23c3e48f06162164aa0d6475a9681cc76184b2c7d19a6059995c0e6dd7e35,2024-04-08T18:48:40.217000 CVE-2024-31814,0,0,9e4411c92895e7b973cb8cdaa5d063ce91670d843374d0de8b17a9f579b1c377,2024-08-01T13:51:12.177000 @@ -252662,7 +252671,7 @@ CVE-2024-34083,0,0,be7ff33683a966fd2e2a91bd6e6ef912f3af6f70d27ba06b83f6ba7e43054 CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1796,2024-05-07T20:07:58.737000 CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000 CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000 -CVE-2024-34087,0,0,5426f4aa57991d63a28f5e8b07028c60fe5b8f0b154c31b4e8cd3001af26d0dc,2024-08-26T19:10:18.890000 +CVE-2024-34087,0,1,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000 CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000 CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000 CVE-2024-34090,0,0,4dc7a0402f56619348ec9c3e24642b60cff8f706f450ee8cc2f0663fc31edfc2,2024-05-06T19:53:38.797000 @@ -252737,7 +252746,7 @@ CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233 CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000 CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000 CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 -CVE-2024-34198,1,1,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000 +CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000 CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000 CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 @@ -253452,10 +253461,10 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000 CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000 CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000 -CVE-2024-35325,0,1,4b80666b63fc2d080ad0ef78d60bca54774976fcbb99e3bbc447d091344fce9e,2024-08-28T14:15:08.433000 -CVE-2024-35326,0,1,785b7c0f0611cee707ab55e4e91e7281ee39cefedfaae81dcfde51906229e1f9,2024-08-28T15:15:16.590000 -CVE-2024-35328,0,1,e32cbb90dfa97693b919430d56bab63542e4093ad25a37c20d599be5a44e71ea,2024-08-28T15:15:16.750000 -CVE-2024-35329,0,0,4d7aa78fa054a9381ac03b56ef696af98c93a3855ee38f8a31593aacb03aa73e,2024-08-02T03:15:51.520000 +CVE-2024-35325,0,1,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000 +CVE-2024-35326,0,1,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000 +CVE-2024-35328,0,1,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000 +CVE-2024-35329,0,1,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000 CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000 CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000 CVE-2024-35338,0,0,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000 @@ -255876,7 +255885,7 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000 -CVE-2024-38856,0,0,b96edffa3c5d3c056b0b683b5901b7d1b42d5c04f23c921a537c2a85ba0d9c15,2024-08-28T01:00:00.950000 +CVE-2024-38856,0,1,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000 CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000 @@ -256420,7 +256429,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 -CVE-2024-3980,0,0,49f4e2a123078274984196ef63d2506b6e8e655b0a6bda271789de0fb7938b36,2024-08-27T15:52:01.317000 +CVE-2024-3980,0,1,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000 @@ -256428,7 +256437,7 @@ CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2 CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000 CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000 CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000 -CVE-2024-3982,0,0,a0de489e3433ce3a86a9c4e65d10b7ac468577660531b6c8501a0094ff1cccce,2024-08-27T15:52:01.317000 +CVE-2024-3982,0,1,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000 CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000 CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000 CVE-2024-39822,0,0,cb2d1986932d128ad1eb7e7cc883dcc2562e93b2f186e64c96f02bfcb19b2244,2024-08-14T17:49:14.177000 @@ -256514,7 +256523,7 @@ CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae345056 CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000 CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 -CVE-2024-39930,0,0,7b1072f578db5486acad330ef551c9af3d89161af147b6932a05219f09829b8e,2024-08-12T19:35:09.940000 +CVE-2024-39930,0,1,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000 CVE-2024-39931,0,0,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000 CVE-2024-39932,0,0,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000 CVE-2024-39933,0,0,b6d32209bff3b62be34bd9bfc29ae3793bbd5d0463ddb473f2add5c3bc3eb1dd,2024-07-12T16:11:56.423000 @@ -257155,7 +257164,7 @@ CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7 CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000 CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000 CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000 -CVE-2024-41310,0,0,411e679a4d87025cfbd714a6e1af5ab48738e4397cbbc5202ae220b932f1975c,2024-08-05T12:41:45.957000 +CVE-2024-41310,0,1,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000 CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000 CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000 CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000 @@ -257223,6 +257232,8 @@ CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a8 CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b51898fb,2024-08-01T13:58:53.253000 CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 +CVE-2024-41564,1,1,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000 +CVE-2024-41565,1,1,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000 CVE-2024-41572,0,0,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000 @@ -257257,8 +257268,8 @@ CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d CVE-2024-41651,0,0,57f3cb7d00e7e9511d0d03f9437ce1a28380d574f08dab4c3cea3241ce2f7fe3,2024-08-14T21:35:07.780000 CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000 CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000 -CVE-2024-41657,0,0,482cc991d05bcd3eb066c0c56d874cc7b42b646258450f155c57d61a96a8fda1,2024-08-21T12:30:33.697000 -CVE-2024-41658,0,0,7b1c1c3712bae12126c9b8d3964c233fb804348f9c0993c62ac378019e83523e,2024-08-21T12:30:33.697000 +CVE-2024-41657,0,1,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000 +CVE-2024-41658,0,1,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000 CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000 CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000 CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000 @@ -257944,6 +257955,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7 CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000 CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 +CVE-2024-42698,1,1,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000 CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000 @@ -258008,7 +258020,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,95f0b34855c9e871f13f61a27d7d6c078da48a4416445325f9775ca851de2f13,2024-08-26T19:10:18.890000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 -CVE-2024-42845,0,0,41f949a7278b40e93c96bce086a04dddafae3cccde3fe1baa3e17a4aa01d20bb,2024-08-26T12:47:20.187000 +CVE-2024-42845,0,1,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28 @@ -258018,6 +258030,7 @@ CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c26 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 +CVE-2024-42900,1,1,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000 CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000 @@ -258481,7 +258494,7 @@ CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c7 CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000 CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000 CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000 -CVE-2024-43915,0,0,527eaabdc21342738de4963484c9dc8224b73fd991fc0a05e81028cc4df2773a,2024-08-27T13:01:37.913000 +CVE-2024-43915,0,1,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000 CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 @@ -258501,7 +258514,7 @@ CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543f CVE-2024-44070,0,0,335509dea99ada6c9ff96f06f0e87dab6ba3af229752b80bde023da9415a33b1,2024-08-21T14:35:15.433000 CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 -CVE-2024-44083,0,1,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 +CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 @@ -258686,7 +258699,7 @@ CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc2559350 CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 -CVE-2024-45346,0,1,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000 +CVE-2024-45346,0,0,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000 CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000 CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000 CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000 @@ -258989,7 +259002,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 -CVE-2024-4872,0,0,eb6d7f4214203eee8a6cb72e8d792186755c20a5d101f33f66ef4b3cea8dad55,2024-08-27T15:52:01.317000 +CVE-2024-4872,0,1,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 @@ -259973,6 +259986,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000 CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000 +CVE-2024-6053,1,1,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000 @@ -260567,7 +260581,7 @@ CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d537 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 -CVE-2024-6879,0,1,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000 +CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000 CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000 CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000 CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000 @@ -261118,7 +261132,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 -CVE-2024-7720,0,1,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000 +CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000 CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000 CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000 CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000 @@ -261134,6 +261148,8 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0 CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000 CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000 CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000 +CVE-2024-7744,1,1,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000 +CVE-2024-7745,1,1,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000 CVE-2024-7746,0,0,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000 CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000 CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000 @@ -261232,8 +261248,8 @@ CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bb CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000 CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000 CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000 -CVE-2024-7940,0,0,c6f423f2b42a2fa2f207dbe4fa5849cf630d4d81436ada726895ff9b4151e77e,2024-08-27T15:52:01.317000 -CVE-2024-7941,0,0,77b44bc4d6878b7df0eb95e35f81ca8d59535ebb8b2e02ca2418a09213f68a6b,2024-08-27T15:52:01.317000 +CVE-2024-7940,0,1,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000 +CVE-2024-7941,0,1,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000 CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000 CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000 CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000 @@ -261292,7 +261308,7 @@ CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000 CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 -CVE-2024-8088,0,1,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000 +CVE-2024-8088,0,0,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000 CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000 CVE-2024-8105,0,0,752bedc9f1c31babb6206d0feb37f4463554ca0baee90f1af7f94ac05e52579f,2024-08-27T13:02:05.683000 CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000 @@ -261342,7 +261358,7 @@ CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000 CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 -CVE-2024-8195,1,1,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000 +CVE-2024-8195,0,0,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000 CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000 CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000 CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000