Auto-Update: 2024-07-30T22:00:17.356351+00:00

This commit is contained in:
cad-safe-bot 2024-07-30 22:03:12 +00:00
parent 6d8a9940f5
commit 756c994af3
25 changed files with 1215 additions and 136 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2023-33976",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-30T20:15:03.023",
"lastModified": "2024-07-30T20:15:03.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TensorFlow is an end-to-end open source platform for machine learning. `array_ops.upper_bound` causes a segfault when not given a rank 2 tensor. The fix will be included in TensorFlow 2.13 and will also cherrypick this commit on TensorFlow 2.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://github.com/tensorflow/tensorflow/commit/6fa05df43b00038b048f4f0e51ef522da6532fec",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/tensorflow/tensorflow/commit/915884fdf5df34aaedd00fc6ace33a2cfdefa586",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjh7-xx4r-x345",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26621",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:50.340",
"lastModified": "2024-07-29T09:15:02.400",
"lastModified": "2024-07-30T20:15:03.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -101,6 +101,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/07/29/2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/30/2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36572",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:03.630",
"lastModified": "2024-07-30T20:15:03.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype pollution in allpro form-manager 0.7.4 allows attackers to run arbitrary code and cause other impacts via the functions setDefaults, mergeBranch, and Object.setObjectValue."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/1771ab4fba733ca898b6e2463dc6ed19",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/allpro/form-manager/issues/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-38983",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T21:15:09.700",
"lastModified": "2024-07-30T21:15:09.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype Pollution in alykoshin mini-deep-assign v0.0.8 allows an attacker to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via the _assign() method at (/lib/index.js:91)"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/f82d0c3a8fe3a125f06425caef5d22ed",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-38984",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:03.873",
"lastModified": "2024-07-30T20:15:03.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype Pollution in lukebond json-override 0.2.0 allows attackers to to execute arbitrary code or cause a Denial of Service (DoS) via the __proto__ property."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/97a9a7d73fc8b38fcf01322239dd5fb1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-38986",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:03.990",
"lastModified": "2024-07-30T20:15:03.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype Pollution in 75lb deep-merge 1.1.1 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via merge methods of lodash to merge objects."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/b20c3aee8bea16e1863933778da6e4cb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39010",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:04.103",
"lastModified": "2024-07-30T20:15:04.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "chase-moskal snapstate v0.0.9 was discovered to contain a prototype pollution via the function attemptNestedProperty. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/af7a746df91ab5e944bd7a186816c262",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39011",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:04.203",
"lastModified": "2024-07-30T20:15:04.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype Pollution in chargeover redoc v2.0.9-rc.69 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via the function mergeObjects."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/693ef1c8b0a5ff1ae19f253381711f3e",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39012",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:04.307",
"lastModified": "2024-07-30T20:15:04.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ais-ltd strategyen v0.4.0 was discovered to contain a prototype pollution via the function mergeObjects. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mestrtee/acfbd724a4b73bfb5d030575b653453c",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41110",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-24T17:15:11.053",
"lastModified": "2024-07-25T12:36:39.947",
"lastModified": "2024-07-30T20:15:04.567",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege."
"value": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege."
},
{
"lang": "es",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41610",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:04.713",
"lastModified": "2024-07-30T20:15:04.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-820LW REVB FIRMWARE PATCH 2.03.B01_TC contains hardcoded credentials in the Telnet service, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-820LW-hardcoded-vulnerability.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41611",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T20:15:04.810",
"lastModified": "2024-07-30T20:15:04.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04, the Telnet service contains hardcoded credentials, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-860L-hardcoded-vulnerability.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41705",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T08:15:02.467",
"lastModified": "2024-07-25T12:36:39.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-30T20:33:08.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -39,14 +59,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.13.0.4",
"matchCriteriaId": "B1A5E015-893F-4D88-BD9F-9594084CB070"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.14.0",
"versionEndExcluding": "6.14.0.4",
"matchCriteriaId": "B8CB20A1-1171-4B22-A874-F1B83F1FD92D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.03",
"versionEndExcluding": "2024.06",
"matchCriteriaId": "46F0DC44-40B8-44B4-BEE0-C731300E6603"
}
]
}
]
}
],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/announcing-archer-platform-release-2024-06/ta-p/722094",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/739717",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41706",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T08:15:02.783",
"lastModified": "2024-07-25T12:36:39.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-30T20:32:18.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -39,14 +59,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.14.0.4",
"matchCriteriaId": "41B53D34-0522-468F-B846-5EF03B16C3C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.03",
"versionEndExcluding": "2024.06",
"matchCriteriaId": "46F0DC44-40B8-44B4-BEE0-C731300E6603"
}
]
}
]
}
],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/announcing-archer-platform-release-2024-06/ta-p/722094",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/739717",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41707",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T08:15:02.980",
"lastModified": "2024-07-25T12:36:39.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-30T20:31:59.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.06",
"matchCriteriaId": "5B7BD033-561E-4C90-AC02-5283F442E2B3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/announcing-archer-platform-release-2024-06/ta-p/722094",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/739717",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41945",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-30T20:15:04.930",
"lastModified": "2024-07-30T20:15:04.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fuels-ts is a library for interacting with Fuel v2. The typescript SDK has no awareness of to-be-spent transactions causing some transactions to fail or silently get pruned as they are funded with already used UTXOs. The problem occurs, because the `fund` function in `fuels-ts/packages/account/src/account.ts` gets the needed ressources statelessly with the function `getResourcesToSpend` without taking into consideration already used UTXOs. This issue will lead to unexpected SDK behaviour, such as a transaction not getting included in the `txpool` / in a block or a previous transaction silently getting removed from the `txpool` and replaced with a new one."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/FuelLabs/fuels-ts/security/advisories/GHSA-3jcg-vx7f-j6qf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42225",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.747",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-30T20:15:19.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,116 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: reemplace skb_put con skb_put_zero Evite potencialmente reutilizar datos no inicializados"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.163",
"matchCriteriaId": "EC9441D7-E601-4251-998B-709AF20062BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.98",
"matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/64f86337ccfe77fe3be5a9356b0dabde23fbb074",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f819a2f4fbc510e088b49c79addcf1734503578",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc7f14d00d0c4c21898f3504607f4a31079065a2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42226",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.817",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-30T20:12:08.160",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,116 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: xhci: evita posibles fallos en handle_tx_event() para eventos de transferencia sin TRB Algunos eventos de transferencia no siempre apuntan a un TRB y, en consecuencia, no tienen un anillo de endpoint. En estos casos, la funci\u00f3n handle_tx_event() no debe continuar, porque si se establece 'ep->skip', se utiliza el puntero al anillo del endpoint. Para evitar una posible falla y hacer que el c\u00f3digo sea l\u00f3gico, regrese despu\u00e9s de verificar el c\u00f3digo de finalizaci\u00f3n para un evento de Transferencia sin TRB."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.98",
"matchCriteriaId": "59AC0B46-8C0D-4C0B-9705-C8CFF0DCAD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.99",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "A6DFF463-7F88-4F38-B6E6-F218C9E3698A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.40",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "03052A88-0586-4BB7-B47F-B626DBC304CA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Not Applicable"
]
},
{
"url": "https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Not Applicable"
]
},
{
"url": "https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42227",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.890",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-30T20:15:03.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: corrigi\u00f3 la copia superpuesta dentro de dml_core_mode_programming [POR QU\u00c9] &mode_lib->mp.Watermark y &locals->Watermark tienen la misma direcci\u00f3n. memcpy puede provocar un comportamiento inesperado. [C\u00d3MO] se debe utilizar memmove."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "EDD11F94-D8F3-477D-931C-7806D6E5D6D3"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/9342da15f2491d8600eca89c8e0da08876fb969b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f1fd8a0a54e6d23a6d16ee29159f247862460fd1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42228",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.960",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-30T20:12:16.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu: uso del valor no inicializado *size al llamar a amdgpu_vce_cs_reloc Inicialice el tama\u00f1o antes de llamar a amdgpu_vce_cs_reloc, como en el caso 0x03000001. V2: Para mejorar realmente el manejo, necesitar\u00edamos tener un valor separado de 0xffffffff. (Christian)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "AFFE1388-D45B-4287-88F7-BBA975D80E4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/88a9a467c548d0b3c7761b4fd54a68e70f9c0944",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5664",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-10T08:15:11.507",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-30T21:00:44.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -39,22 +59,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.6",
"matchCriteriaId": "0CC809F4-0904-4C87-AFDF-8C5C0C2657E0"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mp3-music-player-by-sonaar/tags/5.4.0.2/includes/class-sonaar-music-widget.php#L1853",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3115110/mp3-music-player-by-sonaar/trunk/includes/class-sonaar-music-widget.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/mp3-music-player-by-sonaar/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c14783d3-68de-49c6-9c54-eb7fc4a7bf94?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-5901",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-30T21:15:09.863",
"lastModified": "2024-07-30T21:15:09.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid widget in all versions up to, and including, 1.62.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.62.0/widgets/image-grid/image-grid.php#L282",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.62.0/widgets/image-grid/tpl/default.php#L28",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0045c5a4-0807-4e89-8639-0802e54ce6ab?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7273",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-30T21:15:10.110",
"lastModified": "2024-07-30T21:15:10.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in itsourcecode Alton Management System 1.0. This vulnerability affects unknown code of the file search.php. The manipulation of the argument rcode leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273142 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.273142",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.273142",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.381089",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-30T20:00:17.489950+00:00
2024-07-30T22:00:17.356351+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-30T19:46:56.943000+00:00
2024-07-30T21:15:10.110000+00:00
```
### Last Data Feed Release
@ -33,55 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
258566
258579
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `13`
- [CVE-2024-3930](CVE-2024/CVE-2024-39xx/CVE-2024-3930.json) (`2024-07-30T19:15:10.573`)
- [CVE-2024-41304](CVE-2024/CVE-2024-413xx/CVE-2024-41304.json) (`2024-07-30T18:15:05.817`)
- [CVE-2024-41305](CVE-2024/CVE-2024-413xx/CVE-2024-41305.json) (`2024-07-30T18:15:05.910`)
- [CVE-2024-41437](CVE-2024/CVE-2024-414xx/CVE-2024-41437.json) (`2024-07-30T19:15:10.933`)
- [CVE-2024-41438](CVE-2024/CVE-2024-414xx/CVE-2024-41438.json) (`2024-07-30T19:15:11.027`)
- [CVE-2024-41439](CVE-2024/CVE-2024-414xx/CVE-2024-41439.json) (`2024-07-30T19:15:11.123`)
- [CVE-2024-41440](CVE-2024/CVE-2024-414xx/CVE-2024-41440.json) (`2024-07-30T19:15:11.210`)
- [CVE-2024-41443](CVE-2024/CVE-2024-414xx/CVE-2024-41443.json) (`2024-07-30T19:15:11.300`)
- [CVE-2024-41943](CVE-2024/CVE-2024-419xx/CVE-2024-41943.json) (`2024-07-30T18:15:06.037`)
- [CVE-2024-5249](CVE-2024/CVE-2024-52xx/CVE-2024-5249.json) (`2024-07-30T19:15:11.400`)
- [CVE-2024-5250](CVE-2024/CVE-2024-52xx/CVE-2024-5250.json) (`2024-07-30T19:15:11.613`)
- [CVE-2023-33976](CVE-2023/CVE-2023-339xx/CVE-2023-33976.json) (`2024-07-30T20:15:03.023`)
- [CVE-2024-36572](CVE-2024/CVE-2024-365xx/CVE-2024-36572.json) (`2024-07-30T20:15:03.630`)
- [CVE-2024-38983](CVE-2024/CVE-2024-389xx/CVE-2024-38983.json) (`2024-07-30T21:15:09.700`)
- [CVE-2024-38984](CVE-2024/CVE-2024-389xx/CVE-2024-38984.json) (`2024-07-30T20:15:03.873`)
- [CVE-2024-38986](CVE-2024/CVE-2024-389xx/CVE-2024-38986.json) (`2024-07-30T20:15:03.990`)
- [CVE-2024-39010](CVE-2024/CVE-2024-390xx/CVE-2024-39010.json) (`2024-07-30T20:15:04.103`)
- [CVE-2024-39011](CVE-2024/CVE-2024-390xx/CVE-2024-39011.json) (`2024-07-30T20:15:04.203`)
- [CVE-2024-39012](CVE-2024/CVE-2024-390xx/CVE-2024-39012.json) (`2024-07-30T20:15:04.307`)
- [CVE-2024-41610](CVE-2024/CVE-2024-416xx/CVE-2024-41610.json) (`2024-07-30T20:15:04.713`)
- [CVE-2024-41611](CVE-2024/CVE-2024-416xx/CVE-2024-41611.json) (`2024-07-30T20:15:04.810`)
- [CVE-2024-41945](CVE-2024/CVE-2024-419xx/CVE-2024-41945.json) (`2024-07-30T20:15:04.930`)
- [CVE-2024-5901](CVE-2024/CVE-2024-59xx/CVE-2024-5901.json) (`2024-07-30T21:15:09.863`)
- [CVE-2024-7273](CVE-2024/CVE-2024-72xx/CVE-2024-7273.json) (`2024-07-30T21:15:10.110`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `10`
- [CVE-2024-3246](CVE-2024/CVE-2024-32xx/CVE-2024-3246.json) (`2024-07-30T19:03:01.433`)
- [CVE-2024-40767](CVE-2024/CVE-2024-407xx/CVE-2024-40767.json) (`2024-07-30T19:19:40.767`)
- [CVE-2024-42064](CVE-2024/CVE-2024-420xx/CVE-2024-42064.json) (`2024-07-30T19:03:25.797`)
- [CVE-2024-42065](CVE-2024/CVE-2024-420xx/CVE-2024-42065.json) (`2024-07-30T19:02:59.217`)
- [CVE-2024-42066](CVE-2024/CVE-2024-420xx/CVE-2024-42066.json) (`2024-07-30T19:02:32.857`)
- [CVE-2024-42067](CVE-2024/CVE-2024-420xx/CVE-2024-42067.json) (`2024-07-30T19:02:20.687`)
- [CVE-2024-42068](CVE-2024/CVE-2024-420xx/CVE-2024-42068.json) (`2024-07-30T19:02:12.100`)
- [CVE-2024-42069](CVE-2024/CVE-2024-420xx/CVE-2024-42069.json) (`2024-07-30T19:01:58.623`)
- [CVE-2024-42070](CVE-2024/CVE-2024-420xx/CVE-2024-42070.json) (`2024-07-30T19:01:47.300`)
- [CVE-2024-42071](CVE-2024/CVE-2024-420xx/CVE-2024-42071.json) (`2024-07-30T19:01:26.950`)
- [CVE-2024-42072](CVE-2024/CVE-2024-420xx/CVE-2024-42072.json) (`2024-07-30T19:01:12.833`)
- [CVE-2024-42073](CVE-2024/CVE-2024-420xx/CVE-2024-42073.json) (`2024-07-30T19:00:52.667`)
- [CVE-2024-42074](CVE-2024/CVE-2024-420xx/CVE-2024-42074.json) (`2024-07-30T19:00:33.493`)
- [CVE-2024-42075](CVE-2024/CVE-2024-420xx/CVE-2024-42075.json) (`2024-07-30T19:00:26.477`)
- [CVE-2024-42076](CVE-2024/CVE-2024-420xx/CVE-2024-42076.json) (`2024-07-30T19:00:17.847`)
- [CVE-2024-42077](CVE-2024/CVE-2024-420xx/CVE-2024-42077.json) (`2024-07-30T18:59:53.480`)
- [CVE-2024-42078](CVE-2024/CVE-2024-420xx/CVE-2024-42078.json) (`2024-07-30T18:58:41.253`)
- [CVE-2024-42079](CVE-2024/CVE-2024-420xx/CVE-2024-42079.json) (`2024-07-30T18:58:08.977`)
- [CVE-2024-42080](CVE-2024/CVE-2024-420xx/CVE-2024-42080.json) (`2024-07-30T18:57:58.493`)
- [CVE-2024-42081](CVE-2024/CVE-2024-420xx/CVE-2024-42081.json) (`2024-07-30T18:57:21.440`)
- [CVE-2024-42082](CVE-2024/CVE-2024-420xx/CVE-2024-42082.json) (`2024-07-30T19:04:15.837`)
- [CVE-2024-42083](CVE-2024/CVE-2024-420xx/CVE-2024-42083.json) (`2024-07-30T19:03:40.337`)
- [CVE-2024-42229](CVE-2024/CVE-2024-422xx/CVE-2024-42229.json) (`2024-07-30T19:46:56.943`)
- [CVE-2024-42230](CVE-2024/CVE-2024-422xx/CVE-2024-42230.json) (`2024-07-30T19:32:51.137`)
- [CVE-2024-42231](CVE-2024/CVE-2024-422xx/CVE-2024-42231.json) (`2024-07-30T19:30:52.427`)
- [CVE-2024-26621](CVE-2024/CVE-2024-266xx/CVE-2024-26621.json) (`2024-07-30T20:15:03.410`)
- [CVE-2024-41110](CVE-2024/CVE-2024-411xx/CVE-2024-41110.json) (`2024-07-30T20:15:04.567`)
- [CVE-2024-41705](CVE-2024/CVE-2024-417xx/CVE-2024-41705.json) (`2024-07-30T20:33:08.920`)
- [CVE-2024-41706](CVE-2024/CVE-2024-417xx/CVE-2024-41706.json) (`2024-07-30T20:32:18.270`)
- [CVE-2024-41707](CVE-2024/CVE-2024-417xx/CVE-2024-41707.json) (`2024-07-30T20:31:59.030`)
- [CVE-2024-42225](CVE-2024/CVE-2024-422xx/CVE-2024-42225.json) (`2024-07-30T20:15:19.600`)
- [CVE-2024-42226](CVE-2024/CVE-2024-422xx/CVE-2024-42226.json) (`2024-07-30T20:12:08.160`)
- [CVE-2024-42227](CVE-2024/CVE-2024-422xx/CVE-2024-42227.json) (`2024-07-30T20:15:03.963`)
- [CVE-2024-42228](CVE-2024/CVE-2024-422xx/CVE-2024-42228.json) (`2024-07-30T20:12:16.913`)
- [CVE-2024-5664](CVE-2024/CVE-2024-56xx/CVE-2024-5664.json) (`2024-07-30T21:00:44.357`)
## Download and Usage

View File

@ -225483,6 +225483,7 @@ CVE-2023-33972,0,0,6658f984811e387bddcf22029a50eb9a9e13a81749815c23242b688915779
CVE-2023-33973,0,0,2162a3e64888e18aeea8c4550a40a4f3771d69a0e5c0dfc55abd6bb60c436d29,2023-06-06T16:35:11.990000
CVE-2023-33974,0,0,b2abfab98d759e81889a365940a5ec69c0704df2dfcf5b244d3e2dcda8bf00ab,2023-06-06T14:57:41.787000
CVE-2023-33975,0,0,db3531e208d924a4248560a175e2c14f14aed4ab6edfce257dc16a3219bb896f,2023-06-07T19:35:51.893000
CVE-2023-33976,1,1,770b46642532f526a0f67d7b32166efd0f93bec51b73fa5a5a9249040e2db187,2024-07-30T20:15:03.023000
CVE-2023-33977,0,0,1943b3e2aec5399b155edba0e070e007c31d781f63d29296475af25248b25001,2023-06-14T03:42:23.403000
CVE-2023-33979,0,0,b3c71b05446611c3f6b5f418de7141047c9715f4d554da0a283a7a2047888dfa,2023-06-08T13:41:28.850000
CVE-2023-3398,0,0,ec20545e113f7172d69075d3cf2dd66592a21d61773b55b9df3a468579d3156d,2023-06-30T13:01:21.363000
@ -246953,7 +246954,7 @@ CVE-2024-26618,0,0,60b49f9e86fa8f37acfeac63f8f4575f9654dbd2ab502c8b6c5996ed00c24
CVE-2024-26619,0,0,3a172888bab0a927d52b4fdd413d891b072fc341af639a3741034834064d6310,2024-03-12T12:40:13.500000
CVE-2024-2662,0,0,a2a94c73f74aa4424a4c3682e7ac78c6136565b797b4f728bf1a976cab864da5,2024-05-14T16:13:02.773000
CVE-2024-26620,0,0,65e5941945418b21a4c03b7b48584bf25732d23092fb7ebb20991b07ac64fe5a,2024-03-12T12:40:13.500000
CVE-2024-26621,0,0,86dd105998222d554e0d89a99385ede99614096aaab551dd47af98d6befbdb87,2024-07-29T09:15:02.400000
CVE-2024-26621,0,1,3feab2e92c3f74675f5ee2c5bc9c02f98529e15fee5ddc3ba84c0edeae9413c4,2024-07-30T20:15:03.410000
CVE-2024-26622,0,0,4cd7d655a251310c444f077e2df4271fb89c449a25650c0bd38a0c088f0ade16,2024-06-25T22:15:19.240000
CVE-2024-26623,0,0,072badb03b6dfd11f30eaa3dc91549de4bb838c1b1cb59508b9c081211145520,2024-03-06T15:18:08.093000
CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000
@ -251061,7 +251062,7 @@ CVE-2024-32456,0,0,d14077b9c0d3fd624bb090c8902408112668af5dcd1ec1392b17398cab655
CVE-2024-32457,0,0,e19d3294c5bd0f5932cb781ff1a6aaf0ad9675f665e5d230b25da52c6eb0ab24,2024-04-17T12:48:07.510000
CVE-2024-32458,0,0,61e534ffc05a2fd1f0c764d7b2f3b2dc812bdfe09bd360efea2bba78b4568568,2024-06-10T18:15:32.790000
CVE-2024-32459,0,0,565c2820f9f40b3ae7ac4380cb45711f29b0c6684b22418bec49fb00db4f3c9e,2024-06-10T18:15:32.940000
CVE-2024-3246,0,1,5e51d525244a378c87fc93ad78d7e53820315c4e55f1a9812675c8988463f0b2,2024-07-30T19:03:01.433000
CVE-2024-3246,0,0,5e51d525244a378c87fc93ad78d7e53820315c4e55f1a9812675c8988463f0b2,2024-07-30T19:03:01.433000
CVE-2024-32460,0,0,791d6f5eece9c40a7a8e9bf5719f0d21a50aef5a23765ed0735f0298c727e1a8,2024-06-10T18:15:33.033000
CVE-2024-32461,0,0,7a7784b51f232219ca425c17e34b523d7eced76a74e448dd98d2af59b52810da,2024-04-23T12:52:26.253000
CVE-2024-32462,0,0,3d3d05bcc9e36c0ca38630e8f66ae4fc7d4ac5c6b704d1bc0d85811d4a35b050,2024-05-01T18:15:24.140000
@ -253772,6 +253773,7 @@ CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e
CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000
CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000
CVE-2024-3657,0,0,ee35636c80343c35c9d7ec01515342fe2ebdf7b3a803cae60aab4ad80a6b3995,2024-07-18T16:15:07.693000
CVE-2024-36572,1,1,a026aac6e0daf669259fcaa37cfe6941274fe69ce5a5c15013bbb910fac41095,2024-07-30T20:15:03.630000
CVE-2024-36573,0,0,210f4a464aed5ca882857e08b7ab319b20ba6825802f28036ac835f0b3498a8d,2024-06-20T12:44:22.977000
CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000
CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092c4a,2024-07-03T02:03:19.590000
@ -255134,6 +255136,9 @@ CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07
CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
CVE-2024-38971,0,0,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
CVE-2024-38983,1,1,5a516ae66e7fd03f372675b2961e47e1cc2a26c072229ae2fa02fb5d92b6983c,2024-07-30T21:15:09.700000
CVE-2024-38984,1,1,b31761b892ceba30c5b525a6baace91f8fac65d0e8946aeb434f2f336455a498,2024-07-30T20:15:03.873000
CVE-2024-38986,1,1,d6c0552c0414e99c1ed9a101dcec2eeb261ce26899ec69e9262ab67ca948ea27,2024-07-30T20:15:03.990000
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000
@ -255150,6 +255155,9 @@ CVE-2024-39001,0,0,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84
CVE-2024-39002,0,0,c3d97f4ddfdf5113f1cf208674920a9bfb5660b5a18aa674db16cd39625f22d8,2024-07-01T16:37:39.040000
CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000
CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000
CVE-2024-39010,1,1,946fe04029cd264826612548aa816a4dd20f0ac78eb41a3fc64e6276e74e3ad5,2024-07-30T20:15:04.103000
CVE-2024-39011,1,1,afeb57ce4036a3c7c0446e6a587f7f9560ad91790e2dc1e4f9db4ebd77289b3e,2024-07-30T20:15:04.203000
CVE-2024-39012,1,1,b4c7287722ba9764c59b838796c22fd05d19cec512e0b28cc8a0eb707ffc2db7,2024-07-30T20:15:04.307000
CVE-2024-39013,0,0,a4c20ecb3bde21856044d9eb2da0ec8e02acc3f9684d1a5bf6185d1fb2e7bba0,2024-07-01T16:37:39.040000
CVE-2024-39014,0,0,9a0097bf0bd9a3cc47cff0cc484a6f4c909bfad413f77f22d65f886eb0aa8457,2024-07-01T16:37:39.040000
CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000
@ -255248,7 +255256,7 @@ CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32
CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c9431e4,2024-06-25T18:50:42.040000
CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000
CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000
CVE-2024-3930,1,1,99fba2b6ce5b9594a842ca8c98c795b49659c920913148827bd1c3d978f9c77f,2024-07-30T19:15:10.573000
CVE-2024-3930,0,0,99fba2b6ce5b9594a842ca8c98c795b49659c920913148827bd1c3d978f9c77f,2024-07-30T19:15:10.573000
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
CVE-2024-39303,0,0,a34ed591f51be43b3400c03523a5f8c55eb5097c5f908eacc0a16ec90a0e778f,2024-07-02T12:09:16.907000
@ -255787,7 +255795,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
CVE-2024-40767,0,1,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
CVE-2024-40774,0,0,f362e44a6513e9a7ad670a01f69c050dc7028489484160824ab1f96f580e42a0,2024-07-30T13:32:45.943000
CVE-2024-40775,0,0,1fdbbe2b554a0166a3b8a0cf31bf852c33e7d8e5242e045fa4d346d0613760b8,2024-07-30T13:32:45.943000
@ -256072,7 +256080,7 @@ CVE-2024-41098,0,0,0e3bb06817924b091ecd502db6e8d6b8dfedc58f44996ff13dc833ea0ac51
CVE-2024-41107,0,0,8900de25677c2ad7075ce083b915bd87b6a95be071804b0852c57c05697761e4,2024-07-19T14:15:06.080000
CVE-2024-41109,0,0,8e2788b650464b65229bdb352d44a4f4987c669a37d937e54db42882c9a39d38,2024-07-30T15:15:12.890000
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
CVE-2024-41110,0,0,6ff3558a253c7fb43657a983fdd8f716059d35d04d5c39b9395ecb33c679f6d6,2024-07-25T12:36:39.947000
CVE-2024-41110,0,1,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
CVE-2024-41112,0,0,c1e2935d5067b6b9e390edcde870b73985efea83b9c457e37019ce21e57e3326,2024-07-29T14:12:08.783000
CVE-2024-41113,0,0,e72ec79e8d81313d3777b3a6a45fd3886cd1a93c2cd46e25a58ccadfa78f3067,2024-07-29T14:12:08.783000
@ -256119,8 +256127,8 @@ CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ec
CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000
CVE-2024-41281,0,0,67d3a54ff6c69e817d1c4d3304511fe0d1b87ffa7ae182f6c630038b3326bf87,2024-07-22T13:00:53.287000
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
CVE-2024-41304,1,1,fc267a0abc75b30a6dc8d5a03a26c13cc3369d57b67b1467db56fe797a92ba88,2024-07-30T18:15:05.817000
CVE-2024-41305,1,1,abfbbbf72d9386d5a8287d954777b040b4d86e2a1e7578dd383d0a4a2e8a1f50,2024-07-30T18:15:05.910000
CVE-2024-41304,0,0,fc267a0abc75b30a6dc8d5a03a26c13cc3369d57b67b1467db56fe797a92ba88,2024-07-30T18:15:05.817000
CVE-2024-41305,0,0,abfbbbf72d9386d5a8287d954777b040b4d86e2a1e7578dd383d0a4a2e8a1f50,2024-07-30T18:15:05.910000
CVE-2024-41314,0,0,b51b0e3a4e5d4ef00805134d9c64392d4de8d2322e969183a3b6dc33816f9694,2024-07-24T12:55:13.223000
CVE-2024-41315,0,0,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39d47,2024-07-24T12:55:13.223000
CVE-2024-41316,0,0,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000
@ -256144,12 +256152,12 @@ CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c
CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb29d,2024-04-24T19:58:40.710000
CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000
CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000
CVE-2024-41437,1,1,a480c7cafdea4f10f177c36c7d68e338075390fe39545b619acfe0e3760dfe90,2024-07-30T19:15:10.933000
CVE-2024-41438,1,1,43c51501220b9280fbb2a619b5823f3bda1e19f0112e67053d52746177998068,2024-07-30T19:15:11.027000
CVE-2024-41439,1,1,7ffa4e6c6f9f64706db3166377e99b171ca158a78a397ac8af977d0560520ab8,2024-07-30T19:15:11.123000
CVE-2024-41437,0,0,a480c7cafdea4f10f177c36c7d68e338075390fe39545b619acfe0e3760dfe90,2024-07-30T19:15:10.933000
CVE-2024-41438,0,0,43c51501220b9280fbb2a619b5823f3bda1e19f0112e67053d52746177998068,2024-07-30T19:15:11.027000
CVE-2024-41439,0,0,7ffa4e6c6f9f64706db3166377e99b171ca158a78a397ac8af977d0560520ab8,2024-07-30T19:15:11.123000
CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000
CVE-2024-41440,1,1,2786894dea1f01314595c88d1156e8c651a11df92fd4b99000a5278ef5b49e7a,2024-07-30T19:15:11.210000
CVE-2024-41443,1,1,70cf21032fa6437b334dbab8fc23f567906f3652be13d825ed8738ccbca4ba57,2024-07-30T19:15:11.300000
CVE-2024-41440,0,0,2786894dea1f01314595c88d1156e8c651a11df92fd4b99000a5278ef5b49e7a,2024-07-30T19:15:11.210000
CVE-2024-41443,0,0,70cf21032fa6437b334dbab8fc23f567906f3652be13d825ed8738ccbca4ba57,2024-07-30T19:15:11.300000
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
CVE-2024-41459,0,0,27333ea1f8bbfaac7382ac7849477df0d4e7f0cb54570d7d12028ddbda3304d0,2024-07-26T13:21:21.527000
CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
@ -256185,6 +256193,8 @@ CVE-2024-41601,0,0,0a4c46a9e0b7ae10b4c49205927577ced484b2b5ff2c73162e53448b05b83
CVE-2024-41602,0,0,1008bf55cc85541b699d3ce61768b1dcbe9f1fa0beeed1f78306ea877ed05853,2024-07-22T13:00:53.287000
CVE-2024-41603,0,0,fea24b2a4f5edef8eed4f92099c55619421eb840f7c5615d183c1e7fc6737204,2024-07-22T13:00:53.287000
CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000
CVE-2024-41610,1,1,1f18cc286e805cd53f4a5823ff3d9cbdf55ab7af93bc70acd8a7313eb9d465c0,2024-07-30T20:15:04.713000
CVE-2024-41611,1,1,3e490d1b35caecf38e9d4db9bdc6bd3cae7d717d9735b092ed77796826a44416,2024-07-30T20:15:04.810000
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
CVE-2024-41624,0,0,27591d721b6b93bb72ed8c8d8df31fac89dd525c92ee99de3b5ca8f07694b2d0,2024-07-29T16:21:52.517000
CVE-2024-41628,0,0,5ec8768921bad03bab84b09fc8dfe73d891754e0ae7735ac3fc375a877076401,2024-07-29T14:12:08.783000
@ -256230,9 +256240,9 @@ CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c
CVE-2024-41702,0,0,cdaf376956d976cad8d3300425370c07ba735cd90e9544051b990f59715bdf4d,2024-07-30T13:32:45.943000
CVE-2024-41703,0,0,a85362978996c7d236f30e97fa16c337a7f9d6be679ddc12fca950c1a606cca0,2024-07-25T16:55:48.747000
CVE-2024-41704,0,0,da6c19dec91a04b61d02ede6a13562fab5099a10133c7133c2bc4c7b7733b093,2024-07-25T16:55:24.307000
CVE-2024-41705,0,0,710a6e223a595b850fc1abe74813fc5dc553a977607000233e7b49f5d54f1184,2024-07-25T12:36:39.947000
CVE-2024-41706,0,0,2e5520e401226f7d8ac6ccda5278f567d59301b638accffd565c50d862359658,2024-07-25T12:36:39.947000
CVE-2024-41707,0,0,3c5ea333b2404f7e0d9195aa6339fef455f6fa8292255904be4c6dce5c96f3cc,2024-07-25T12:36:39.947000
CVE-2024-41705,0,1,5b6b550b5a007db9c8980f79f04b711a2eae005d4e12fa7f45cc500b763dac47,2024-07-30T20:33:08.920000
CVE-2024-41706,0,1,57cd8a1a8e4969563144dfc7d6c6c2ead751097b77dd114b3f95f143eff0b546,2024-07-30T20:32:18.270000
CVE-2024-41707,0,1,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
@ -256285,8 +256295,9 @@ CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a12162631897066
CVE-2024-41924,0,0,24158a49c3742b0541bdd3409c983b7d59bb552b3c444ac190659070a374a298,2024-07-30T13:32:45.943000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
CVE-2024-41943,1,1,ea6a0b804baee78cda5149280c1542286d7d394f503361f987f54b2f96746108,2024-07-30T18:15:06.037000
CVE-2024-41943,0,0,ea6a0b804baee78cda5149280c1542286d7d394f503361f987f54b2f96746108,2024-07-30T18:15:06.037000
CVE-2024-41944,0,0,38ddc144465089a90f723a639a1365a358acd1ffefa771e73c1360e990bcf220,2024-07-30T17:15:13.853000
CVE-2024-41945,1,1,2d4302a25c45b748a068caac6d8068fd64dc1f02a1e28a80597a8b7ced57a0bc,2024-07-30T20:15:04.930000
CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000
CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
@ -256309,27 +256320,27 @@ CVE-2024-42054,0,0,7cefcb5df710c5d52c7b44743e7320cbb773b7864f3adff97191d41734299
CVE-2024-42055,0,0,38832abf63aaabdc907feb9726d6725f630aba764b55549d89c565bd77d3378b,2024-07-29T14:12:08.783000
CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000
CVE-2024-42063,0,0,b79fa6aa08c846471acf77f3dfbf57119b631126c398ef36dda54a714ad37725,2024-07-29T16:21:52.517000
CVE-2024-42064,0,1,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000
CVE-2024-42065,0,1,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000
CVE-2024-42066,0,1,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000
CVE-2024-42067,0,1,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000
CVE-2024-42068,0,1,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000
CVE-2024-42069,0,1,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000
CVE-2024-42070,0,1,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000
CVE-2024-42071,0,1,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000
CVE-2024-42072,0,1,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000
CVE-2024-42073,0,1,f43077c064bf834b648ca031d8c7c90c16484619a635dcde5279f184eca4f504,2024-07-30T19:00:52.667000
CVE-2024-42074,0,1,c1003ca1cd857d6901b3df9173f0a7927b093db043332c5d10100926e7521f32,2024-07-30T19:00:33.493000
CVE-2024-42075,0,1,09886a603959c28eac08e3691cd5c50b20630f2b1656317a40eb926c920c8fc3,2024-07-30T19:00:26.477000
CVE-2024-42076,0,1,c9acd2aee37ee2d39b2fd653fd4a679a2b01ab0266df65621ad96d984e85c7ec,2024-07-30T19:00:17.847000
CVE-2024-42077,0,1,ae5445c1f3c93a0b71a56c4d4c519fd4c92ee7bc024435048d7b31da1476344b,2024-07-30T18:59:53.480000
CVE-2024-42078,0,1,46aeb1640b69db3d766b123cb8661ee9c5b0244bf9cfe66df62dcc1f1bc485de,2024-07-30T18:58:41.253000
CVE-2024-42079,0,1,615fba7ddb879610fe652b42080e11b3fd9ce7c703bdec8a6a4e9644c1bbd677,2024-07-30T18:58:08.977000
CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000
CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000
CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000
CVE-2024-42067,0,0,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000
CVE-2024-42068,0,0,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000
CVE-2024-42069,0,0,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000
CVE-2024-42070,0,0,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000
CVE-2024-42071,0,0,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000
CVE-2024-42072,0,0,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000
CVE-2024-42073,0,0,f43077c064bf834b648ca031d8c7c90c16484619a635dcde5279f184eca4f504,2024-07-30T19:00:52.667000
CVE-2024-42074,0,0,c1003ca1cd857d6901b3df9173f0a7927b093db043332c5d10100926e7521f32,2024-07-30T19:00:33.493000
CVE-2024-42075,0,0,09886a603959c28eac08e3691cd5c50b20630f2b1656317a40eb926c920c8fc3,2024-07-30T19:00:26.477000
CVE-2024-42076,0,0,c9acd2aee37ee2d39b2fd653fd4a679a2b01ab0266df65621ad96d984e85c7ec,2024-07-30T19:00:17.847000
CVE-2024-42077,0,0,ae5445c1f3c93a0b71a56c4d4c519fd4c92ee7bc024435048d7b31da1476344b,2024-07-30T18:59:53.480000
CVE-2024-42078,0,0,46aeb1640b69db3d766b123cb8661ee9c5b0244bf9cfe66df62dcc1f1bc485de,2024-07-30T18:58:41.253000
CVE-2024-42079,0,0,615fba7ddb879610fe652b42080e11b3fd9ce7c703bdec8a6a4e9644c1bbd677,2024-07-30T18:58:08.977000
CVE-2024-4208,0,0,32e5dd37fcb796c0866341642387d4cc76a1d3ae9362eee8c22ff2c138c94874,2024-05-15T16:40:19.330000
CVE-2024-42080,0,1,7fbaaca0a6aeb5bdfda9d2ffcdb0eeebd9767469aa1e7a137d6a790bb0180339,2024-07-30T18:57:58.493000
CVE-2024-42081,0,1,7952f0a0cb7322f4a55d2e3ed80f93080c6d5ba97bfc359475cbbdb5247053db,2024-07-30T18:57:21.440000
CVE-2024-42082,0,1,eff775e1665f30ff881719df9a585aaa82084c989b937633b1a5625f819031d7,2024-07-30T19:04:15.837000
CVE-2024-42083,0,1,89007ffa1723bb9616d5e97e8206878c7bc8d4d034d65ecc75c2333799bd1db9,2024-07-30T19:03:40.337000
CVE-2024-42080,0,0,7fbaaca0a6aeb5bdfda9d2ffcdb0eeebd9767469aa1e7a137d6a790bb0180339,2024-07-30T18:57:58.493000
CVE-2024-42081,0,0,7952f0a0cb7322f4a55d2e3ed80f93080c6d5ba97bfc359475cbbdb5247053db,2024-07-30T18:57:21.440000
CVE-2024-42082,0,0,eff775e1665f30ff881719df9a585aaa82084c989b937633b1a5625f819031d7,2024-07-30T19:04:15.837000
CVE-2024-42083,0,0,89007ffa1723bb9616d5e97e8206878c7bc8d4d034d65ecc75c2333799bd1db9,2024-07-30T19:03:40.337000
CVE-2024-42084,0,0,2419bf7f9c0ff6d4ecd88d3174d0de0433fb1a33ae81692aac9b85c4d85c76f8,2024-07-30T13:33:30.653000
CVE-2024-42085,0,0,42ad9d94684b357600f8069e6980c249dd991ef89c82a342c9436c234ae4419b,2024-07-30T13:33:30.653000
CVE-2024-42086,0,0,0486c374fb7721de34d27071e7947be100dd7ee23784594c29172b09ce48c174,2024-07-30T13:33:30.653000
@ -256422,14 +256433,14 @@ CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
CVE-2024-42223,0,0,6f496051e17acd26c026d75fa988b6d6ff9e5447fbb1fb5ab39d7edf9d044b37,2024-07-30T13:32:45.943000
CVE-2024-42224,0,0,9dea2dbc28ce3545486461134a19fb3b8aecf6e9048c73b521719de55d5e64ac,2024-07-30T13:32:45.943000
CVE-2024-42225,0,0,fc91c22ede93264c5678296991dbb7b23b3f375088bbc4cec4e958e8b9234199,2024-07-30T13:32:45.943000
CVE-2024-42226,0,0,80b29dabdc697490ec3fc6e3f90a9c09017d124bd922d25f924e7a6419400cb6,2024-07-30T13:32:45.943000
CVE-2024-42227,0,0,a2c43cd8c9a5b737406bf04cfac9ab320ae2654e82850d4364101bbda03cea8a,2024-07-30T13:32:45.943000
CVE-2024-42228,0,0,f24e3d39153e88d81adcb0b9c453368bdf820250a2141753e787d3f5659875a5,2024-07-30T13:32:45.943000
CVE-2024-42229,0,1,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d3a6,2024-07-30T19:46:56.943000
CVE-2024-42225,0,1,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000
CVE-2024-42226,0,1,85e1a1843ef6b9230ee103078e5f87f3a7bc00e8db591eb32209bc245bb0dcf1,2024-07-30T20:12:08.160000
CVE-2024-42227,0,1,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000
CVE-2024-42228,0,1,bb35b5d07117a510d2c8f813597e1359d157744c6e3d74a8f3b969980ffe591b,2024-07-30T20:12:16.913000
CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d3a6,2024-07-30T19:46:56.943000
CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000
CVE-2024-42230,0,1,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
CVE-2024-42231,0,1,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000
CVE-2024-42230,0,0,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
CVE-2024-42231,0,0,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000
CVE-2024-4224,0,0,1072ade5e61d4673e4fde8d68c377ed60a4f449367391001c4ccc215a9b54b17,2024-07-16T13:43:58.773000
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
@ -257318,8 +257329,8 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000
CVE-2024-5249,1,1,232f47cfb2c69c6a8c9d02a3b0cfea12f31b0f5b2461136c3f6fb34f19fe55d0,2024-07-30T19:15:11.400000
CVE-2024-5250,1,1,3670f2c0e7c70580f978e446568f5ac668b790748e31a5c3911ef088cda40359,2024-07-30T19:15:11.613000
CVE-2024-5249,0,0,232f47cfb2c69c6a8c9d02a3b0cfea12f31b0f5b2461136c3f6fb34f19fe55d0,2024-07-30T19:15:11.400000
CVE-2024-5250,0,0,3670f2c0e7c70580f978e446568f5ac668b790748e31a5c3911ef088cda40359,2024-07-30T19:15:11.613000
CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
@ -257655,7 +257666,7 @@ CVE-2024-5659,0,0,ffc77731bd38c72dba71b78652c4b9387b9df2ddb5b033ee614f797d944c1f
CVE-2024-5661,0,0,64c610f4ac197974e4a9f4370e828aefe9bbaabb0bf444795d194a1356128a89,2024-07-02T14:43:40.460000
CVE-2024-5662,0,0,8c3107c3250f17bf50f488951af6a806bf508fec6c0432bc071f0b8c3606d97e,2024-06-28T10:27:00.920000
CVE-2024-5663,0,0,bb880da64d53311a8a310f135d9a5689f60a63ae397c005441eb1cf59738b610,2024-07-23T17:55:19.843000
CVE-2024-5664,0,0,c8140580dc5fba46f6fa0e365bb691b18490e120c359f209bcf871e212ff855f,2024-07-11T13:05:54.930000
CVE-2024-5664,0,1,15d6d3474356777a172880e6c9174f79c431df5a540b6c11d12c2ee9d4a776e5,2024-07-30T21:00:44.357000
CVE-2024-5665,0,0,ee434c76bce552b377f6919bf1c15ee1f70c912b781038fb2d7ab59e3f11029d,2024-06-11T17:47:45.033000
CVE-2024-5666,0,0,97b5f8516d6a83112ace9f54dd19c30ee8d354b5a2cceeea2e9bda093f34ca6c,2024-07-01T12:37:24.220000
CVE-2024-5669,0,0,ddd7772a6277d903bcf1d89da44667af6e9a3df4fd3440e71ca75c5d1aad7a37,2024-07-09T18:19:14.047000
@ -257830,6 +257841,7 @@ CVE-2024-5896,0,0,543a9739bb7994a5cf7a44d8a031ddac2c68327e324b7d90a0e38059960eb0
CVE-2024-5897,0,0,7705294a726132fe76b260cca78d94d4cdc2b24feee8f8352eb858eb73b1c164,2024-06-13T18:36:09.010000
CVE-2024-5898,0,0,0d43a32ea8127bc0ab1191832cee4a9d60038575841f8992bc0a9c66154d3c87,2024-06-13T18:36:09.010000
CVE-2024-5899,0,0,9a50f1672a8f19c78e5991e440d5a0c2d46a5e3e821843d3d776673ac7766d57,2024-06-20T12:44:01.637000
CVE-2024-5901,1,1,6394f4a6d32a8605ce5461c951c2de06cc2db4ef38c111f80d7732721a704543,2024-07-30T21:15:09.863000
CVE-2024-5902,0,0,7888af9d367c2dddb4d6f8ca0d5bee140123446fdb703c2c12cdc94e6e9d8ba4,2024-07-15T13:00:34.853000
CVE-2024-5905,0,0,be70c4e08f84c756b5f3c406b9f7243178ad87363f58f84ccd50cdaa5058fc06,2024-06-13T18:36:09.010000
CVE-2024-5906,0,0,7122b72eae2ba5326022ae04558ccad9890de521e231b1730c040bf08879bb1f,2024-06-13T18:36:09.010000
@ -258564,4 +258576,5 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000
CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000
CVE-2024-7273,1,1,96ac7cdc7b0d4132cb85ff0c2e5f52cf75d02b34301d6b8ef1b0ed79592b5528,2024-07-30T21:15:10.110000
CVE-2024-7297,0,0,2e874bfba57ad5ec5745065eab38f5876ea9fcd7307b48661cf2daf7f9f6b574,2024-07-30T17:15:14.513000

Can't render this file because it is too large.