Auto-Update: 2024-09-04T16:00:37.020458+00:00

This commit is contained in:
cad-safe-bot 2024-09-04 16:03:36 +00:00
parent 5096b07bd4
commit 83e7765e05
86 changed files with 4482 additions and 484 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36774",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-19T02:15:47.690",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-09-04T15:35:01.733",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "plugins/gtk+/glade-gtk-box.c en GNOME Glade anterior a 3.38.1 y 3.39.x anterior a 3.40.0 maneja mal la reconstrucci\u00f3n de widgets para GladeGtkBox, lo que provoca una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-664"
}
]
}
],
"references": [
{
"url": "https://gitlab.gnome.org/GNOME/glade/-/commit/7acdd3c6f6934f47b8974ebc2190a59ea5d2ed17",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26156",
"sourceIdentifier": "report@snyk.io",
"published": "2023-11-09T05:15:09.230",
"lastModified": "2023-11-17T17:46:38.143",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:01.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32093",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.447",
"lastModified": "2023-11-15T17:48:41.793",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:12.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32125",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.540",
"lastModified": "2023-11-15T17:48:36.397",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:12.447",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32500",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.633",
"lastModified": "2023-11-15T17:48:31.390",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:02.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32501",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.733",
"lastModified": "2023-11-15T17:48:07.883",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:02.897",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34171",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T20:15:08.487",
"lastModified": "2023-11-15T02:25:10.713",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:03.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41137",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2023-11-09T15:15:08.333",
"lastModified": "2023-11-18T00:12:58.673",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:04.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41138",
"sourceIdentifier": "info@appcheck-ng.com",
"published": "2023-11-09T15:15:08.550",
"lastModified": "2023-11-18T00:43:59.243",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:04.757",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-226"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45319",
"sourceIdentifier": "security@puppet.com",
"published": "2023-11-08T16:15:10.000",
"lastModified": "2023-11-15T20:15:50.193",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:05.510",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,20 +2,13 @@
"id": "CVE-2023-45896",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-28T05:15:13.657",
"lastModified": "2024-08-28T12:57:27.610",
"lastModified": "2024-09-04T15:15:13.160",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ntfs3 in the Linux kernel before 6.5.11 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image."
"value": "ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45931",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T04:15:11.250",
"lastModified": "2024-08-02T21:15:47.243",
"lastModified": "2024-09-04T15:35:13.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "Se descubri\u00f3 que Mesa 23.0.4 conten\u00eda una desreferencia de puntero NULL en check_xshm() para el estado has_error. NOTA: esto est\u00e1 en disputa porque no existe ning\u00fan escenario en el que se demuestre la vulnerabilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://gitlab.freedesktop.org/mesa/mesa/-/issues/9859",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46363",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-08T21:15:08.673",
"lastModified": "2023-11-15T19:22:31.510",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:14.107",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46756",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-11-08T11:15:08.050",
"lastModified": "2023-11-15T16:20:22.913",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:15.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46757",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-11-08T11:15:09.127",
"lastModified": "2023-11-15T16:19:03.930",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:16.303",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,16 @@
"value": "CWE-200"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46758",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-11-08T11:15:09.530",
"lastModified": "2023-11-15T16:18:47.657",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:17.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46759",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-11-08T11:15:09.750",
"lastModified": "2023-11-15T16:17:22.023",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:18.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46763",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-11-08T10:15:09.463",
"lastModified": "2023-11-15T16:16:36.933",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:19.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46764",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-11-08T10:15:09.527",
"lastModified": "2023-11-15T16:16:19.310",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T15:35:20.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-15"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5759",
"sourceIdentifier": "security@puppet.com",
"published": "2023-11-08T16:15:11.253",
"lastModified": "2023-11-15T20:17:01.213",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:07.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5913",
"sourceIdentifier": "security@opentext.com",
"published": "2023-11-08T17:15:08.193",
"lastModified": "2023-11-16T17:00:33.503",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-04T14:35:08.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-266"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1543",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2024-08-29T23:15:10.067",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:26:29.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.6.6",
"matchCriteriaId": "57DCDF61-F982-41D7-83BE-DDAEC85A797A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-566-dec-19-2023",
"source": "facts@wolfssl.com"
"source": "facts@wolfssl.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1545",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2024-08-29T23:15:10.263",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:27:08.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -55,10 +85,47 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wolfssl:wolfssl:5.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1324CF72-54B2-4CEA-A160-47EE84B56035"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable",
"source": "facts@wolfssl.com"
"source": "facts@wolfssl.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23758",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T23:15:07.683",
"lastModified": "2024-02-22T19:07:37.840",
"lastModified": "2024-09-04T15:35:22.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema descubierto en Unisys Stealth 5.3.062.0 permite a los atacantes ver informaci\u00f3n confidencial a trav\u00e9s del archivo Enterprise ManagementInstaller_msi.log."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=70",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25638",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-22T14:15:04.593",
"lastModified": "2024-07-24T12:55:13.223",
"lastModified": "2024-09-04T15:15:13.637",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -57,7 +57,7 @@
],
"references": [
{
"url": "https://github.com/dnsjava/dnsjava/commit/bc51df1c455e6c9fb7cbd42fcb6d62d16047818d",
"url": "https://github.com/dnsjava/dnsjava/commit/2073a0cdea2c560465f7ac0cc56f202e6fc39705",
"source": "security-advisories@github.com"
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2881",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2024-08-30T00:15:04.917",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:27:24.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -55,10 +85,47 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wolfssl:wolfssl:5.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1324CF72-54B2-4CEA-A160-47EE84B56035"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable",
"source": "facts@wolfssl.com"
"source": "facts@wolfssl.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37136",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-09-03T06:15:14.413",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:59:32.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:path_to_powerprotect:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7585E3A-F355-4AE6-AC85-3098E5976A75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:path_to_powerprotect:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "69A01B59-C878-4791-8A68-96AF24FDCAD8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000227430/dsa-2024-291-security-update-for-dell-path-to-powerprotect-for-security-vulnerability",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38858",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-09-02T12:15:19.370",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:39:10.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@checkmk.com",
"type": "Secondary",
@ -73,10 +105,101 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "784262E3-E643-4564-9FFE-BB8FEDB0A662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194"
}
]
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/17232",
"source": "security@checkmk.com"
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41345",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-29T20:15:08.393",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:17:57.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD7A74D-22DA-4AB3-A155-268E6FE10A96"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jpatokal/openflights/issues/1480",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43920",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T19:15:08.173",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:06:43.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jegstudio:gutenverse:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.0",
"matchCriteriaId": "FC8646BA-86B5-45C7-9177-B6F6653C48ED"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gutenverse/wordpress-gutenverse-gutenberg-blocks-page-builder-for-site-editor-plugin-1-9-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43921",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T19:15:08.383",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:12:12.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magic-post-thumbnail:magic_post_thumbnail:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.2.10",
"matchCriteriaId": "CE06C91A-B180-446B-BEDF-B9684B2A871C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/magic-post-thumbnail/wordpress-generate-images-magic-post-thumbnail-plugin-5-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43947",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T19:15:08.653",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:16:00.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dineshkarki:wp_armour_extended:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.32",
"matchCriteriaId": "FA40A629-CB30-43F5-ACD7-5AFC78F817E9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-armour-extended/wordpress-wp-armour-extended-plugin-1-26-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44383",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T13:15:06.753",
"lastModified": "2024-09-04T13:15:06.753",
"lastModified": "2024-09-04T14:35:11.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "WAYOS FBM-291W v19.09.11 is vulnerable to Command Execution via msp_info_htm."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/wayos_%20FBM_291W.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44400",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T13:15:06.867",
"lastModified": "2024-09-04T13:15:06.867",
"lastModified": "2024-09-04T14:35:11.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "D-Link DI-8400 16.07.26A1 is vulnerable to Command Injection via upgrade_filter_asp."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/lonelylonglong/openfile-/blob/main/D-link_DI_8400-16.07.26A1_Command_Injection.md/D-link_DI_8400-16.07.26A1_Command_Injection.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T22:15:04.590",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T14:35:12.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto (RCE) en el proyecto Pi Camera, versi\u00f3n 1.0, mantenido por RECANTHA. El problema surge de una desinfecci\u00f3n inadecuada de la entrada del usuario que se pasa al par\u00e1metro GET \"position\" en el script tilt.php. Un atacante puede aprovechar esto enviando datos de entrada creados que incluyen secuencias de comandos maliciosas, lo que permite ejecutar comandos arbitrarios en el servidor con los privilegios del usuario del servidor web. Esta vulnerabilidad se puede explotar de forma remota y plantea un riesgo significativo si la aplicaci\u00f3n se expone a redes que no son de confianza."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/recantha/camera-pi/blob/ef018d212288cb16404f0b050593d20f0dc0467b/www/tilt.php#L4",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44819",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T15:15:13.910",
"lastModified": "2024-09-04T15:15:13.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in ZZCMS v.2023 and before allows a remote attacker to obtain sensitive information via a crafted script to the pagename parameter of the admin/del.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44819%20ZZCMS2023%E5%8F%8D%E5%B0%84%E5%9E%8BXSS4.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-44820",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T15:15:13.997",
"lastModified": "2024-09-04T15:15:13.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A sensitive information disclosure vulnerability exists in ZZCMS v.2023 and before within the eginfo.php file located at /3/E_bak5.1/upload/. When accessed with the query parameter phome=ShowPHPInfo, the application executes the phpinfo() function, which exposes detailed information about the PHP environment, including server configuration, loaded modules, and environment variables."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44820%20ZZCMS2023%20phpinfo%E6%B3%84%E9%9C%B2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-44920",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T12:15:11.570",
"lastModified": "2024-09-03T16:35:07.800",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T14:59:58.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component admin_collect_news.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the siteurl parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente admin_collect_news.php de SeaCMS v12.9 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado espec\u00edficamente e inyectado en el par\u00e1metro siteurl."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44920.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-44921",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T12:15:11.667",
"lastModified": "2024-09-03T17:35:01.983",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:00:15.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS v12.9 was discovered to contain a SQL injection vulnerability via the id parameter at /dmplayer/dmku/index.php?ac=del."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que SeaCMS v12.9 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /dmplayer/dmku/index.php?ac=del."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44921.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4401",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-30T04:15:06.737",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:33:01.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,26 +71,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpvibes:elementor_addon_elements:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.13.6",
"matchCriteriaId": "883C4CB2-8BBD-47BA-9EFD-778E8447580F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/animated-text/widgets/animated-text.php#L358",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/bg-slider/module.php#L284",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3107074#file6",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3107074#file7",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfc1466-41d2-498b-8210-c67e8550f5b8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45490",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-30T03:15:03.757",
"lastModified": "2024-08-30T19:35:07.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:28:19.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/libexpat/libexpat/issues/887",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/libexpat/libexpat/pull/890",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45491",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-30T03:15:03.850",
"lastModified": "2024-08-30T14:35:09.057",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:28:33.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/libexpat/libexpat/issues/888",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/libexpat/libexpat/pull/891",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45492",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-30T03:15:03.930",
"lastModified": "2024-08-30T14:35:09.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:28:41.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "FDDF6E7A-AF1C-4370-B0B0-29A35C454FFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/libexpat/libexpat/issues/889",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/libexpat/libexpat/pull/892",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-45506",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T15:15:14.080",
"lastModified": "2024-09-04T15:15:14.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allows a remote denial of service."
}
],
"metrics": {},
"references": [
{
"url": "http://git.haproxy.org/?p=haproxy-3.0.git%3Ba=commitdiff%3Bh=c725db17e8416ffb3c1537aea756356228ce5e3c",
"source": "cve@mitre.org"
},
{
"url": "http://git.haproxy.org/?p=haproxy-3.0.git%3Ba=commitdiff%3Bh=d636e515453320c6e122c313c661a8ac7d387c7f",
"source": "cve@mitre.org"
},
{
"url": "https://www.haproxy.org/",
"source": "cve@mitre.org"
},
{
"url": "https://www.haproxy.org/download/3.1/src/CHANGELOG",
"source": "cve@mitre.org"
},
{
"url": "https://www.mail-archive.com/haproxy%40formilux.org/msg45280.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.mail-archive.com/haproxy%40formilux.org/msg45281.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5024",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-30T04:15:07.060",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:33:57.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:memberpress:memberpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.11.30",
"matchCriteriaId": "A36C5B70-9636-4300-825F-D94103D70922"
}
]
}
]
}
],
"references": [
{
"url": "https://memberpress.com/change-log/#1.11.30",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/718d12fe-31e4-4fa1-ba9a-8626df8ddbfe?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6020",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.260",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T15:35:25.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Sign-up Sheets de WordPress anterior a la versi\u00f3n 2.2.13 no escapa a algunas URL generadas, as\u00ed como tampoco al par\u00e1metro $_SERVER['REQUEST_URI'] antes de mostrarlas nuevamente en atributos, lo que podr\u00eda generar un error de cross-site scripting reflejado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/f3526320-3abd-4ddb-8f73-778741bd9c48/",

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-6232",
"sourceIdentifier": "cna@python.org",
"published": "2024-09-03T13:15:05.363",
"lastModified": "2024-09-03T15:15:16.597",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:01:04.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. Las expresiones regulares que permit\u00edan un retroceso excesivo durante el an\u00e1lisis del encabezado tarfile.TarFile son vulnerables a ReDoS a trav\u00e9s de archivos tar manipulados espec\u00edficamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
},
{
"source": "cna@python.org",
"type": "Secondary",
@ -24,34 +61,136 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.12.5",
"matchCriteriaId": "5621585D-59F4-4B27-9980-E7602EA0B750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*",
"matchCriteriaId": "3BA51E41-D221-431F-870F-536AF2867B50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "978582FF-B8F3-479F-AE77-359E9AEE6F23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "84E3F62C-7218-4DC3-8473-8A576739643A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "1FD15706-B8BC-4801-9F93-06771F2E12C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "0FDC359F-E8ED-4777-83FB-1EC63F095CBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*",
"matchCriteriaId": "6893BDDE-4D90-4592-8701-C6B3FFEB0CFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*",
"matchCriteriaId": "E316F712-F03A-4378-8192-D1640819698B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "8566F034-27CB-422E-950B-DCAA926CF64F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EACCE6C3-7701-4966-9D88-E949C82FCA46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "A4853BF2-9C27-465F-9840-5B37013C9F74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B266541A-E877-4CAD-A1EF-08A069441F36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8384A34C-50CD-439C-A2BB-DEA6161342C1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/python/cpython/issues/121285",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/python/cpython/pull/121286",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"source": "cna@python.org"
"source": "cna@python.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6670",
"sourceIdentifier": "security@progress.com",
"published": "2024-08-29T22:15:05.573",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:23:37.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.0",
"matchCriteriaId": "F88DF254-746E-41F3-A2CA-0DC0B5C49837"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6671",
"sourceIdentifier": "security@progress.com",
"published": "2024-08-29T22:15:05.767",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T15:53:07.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.1.0",
"versionEndExcluding": "24.0",
"matchCriteriaId": "3459EC7F-4718-4AFE-809C-AFCB6B660869"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6672",
"sourceIdentifier": "security@progress.com",
"published": "2024-08-29T22:15:05.953",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:23:58.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security@progress.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.0",
"matchCriteriaId": "F88DF254-746E-41F3-A2CA-0DC0B5C49837"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,67 +2,15 @@
"id": "CVE-2024-6716",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-15T15:15:10.900",
"lastModified": "2024-07-17T14:15:04.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:15:14.457",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the libtiff library. An out-of-memory issue in the TIFFReadEncodedStrip function can be triggered when processing a crafted tiff file, allowing attackers to perform memory allocation of arbitrary sizes, resulting in a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en libtiff. Esta falla permite a un atacante crear un archivo tiff manipulado, lo que obliga a libtiff a asignar memoria indefinidamente. Este problema puede provocar una denegaci\u00f3n de servicio del sistema que consume libtiff debido a la falta de memoria."
"value": "Rejected reason: Invalid security issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6716",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297636",
"source": "secalert@redhat.com"
},
{
"url": "https://gitlab.com/libtiff/libtiff/-/issues/620",
"source": "secalert@redhat.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6722",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.327",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T15:35:25.590",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Chatbot Support AI: Free ChatGPT Chatbot, Woocommerce Chatbot de WordPress hasta 1.0.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/ce909d3c-2ef2-4167-87c4-75b5effb2a4d/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6888",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.407",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T15:35:25.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Secure Copy Content Protection y Content Locking de WordPress anterior a la versi\u00f3n 4.1.7 no desinfecta ni evita algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/f4df74c2-4c95-4d1c-97c1-ebfc225f6b93/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6889",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.470",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T15:35:26.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Secure Copy Content Protection y Content Locking de WordPress anterior a la versi\u00f3n 4.1.7 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/9651abd1-0f66-418e-85a7-2de0c5e91bed/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6926",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.537",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T15:35:26.253",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Viral Signup de WordPress hasta la versi\u00f3n 2.1 no desinfecta ni escapa correctamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una inyecci\u00f3n SQL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/9ce96ce5-fcf0-4d7a-b562-f63ea3418d93/",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7012",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-04T14:15:14.570",
"lastModified": "2024-09-04T15:15:14.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7012",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299429",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7076",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-04T15:15:14.333",
"lastModified": "2024-09-04T15:15:14.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Semtek Informatics Software Consulting Inc. Semtek Sempos allows Blind SQL Injection.This issue affects Semtek Sempos: through 31072024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1396",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7077",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-04T15:15:14.447",
"lastModified": "2024-09-04T15:15:14.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Semtek Informatics Software Consulting Inc. Semtek Sempos allows Reflected XSS.This issue affects Semtek Sempos: through 31072024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1396",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7078",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-04T15:15:14.583",
"lastModified": "2024-09-04T15:15:14.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Semtek Informatics Software Consulting Inc. Semtek Sempos allows SQL Injection.This issue affects Semtek Sempos: through 31072024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.2,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1396",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7786",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-04T06:15:17.600",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T15:35:26.560",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Sensei LMS para WordPress anterior a la versi\u00f3n 4.24.2 no protege adecuadamente algunas de sus rutas de API REST, lo que permite que atacantes no autenticados filtren plantillas de correo electr\u00f3nico."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/f44e6f8f-3ef2-45c9-ae9c-9403305a548a/",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7923",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-04T14:15:14.800",
"lastModified": "2024-09-04T15:15:14.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7923",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305718",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7932",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-09-02T12:15:20.130",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:52:06.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience:r2024x:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D44D11-FF9F-4A4C-9AC4-449C27896E39"
}
]
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
"source": "3DS.Information-Security@3ds.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7938",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-09-02T12:15:20.333",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:53:13.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -51,10 +81,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience:r2023x:*:*:*:*:*:*:*",
"matchCriteriaId": "52603146-7A1B-4583-8C08-DDFD6914EF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience:r2024x:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D44D11-FF9F-4A4C-9AC4-449C27896E39"
}
]
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
"source": "3DS.Information-Security@3ds.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7939",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-09-02T12:15:20.530",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:54:22.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience:r2024x:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D44D11-FF9F-4A4C-9AC4-449C27896E39"
}
]
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
"source": "3DS.Information-Security@3ds.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7970",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-03T23:15:23.830",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T14:35:15.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La escritura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la 128.0.6613.119 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -26,6 +49,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8004",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-09-02T12:15:20.723",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:56:46.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
@ -51,10 +81,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience_enovia:r2022x:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA0FFCA-DA1D-41F4-996B-52E20CD24498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience_enovia:r2023x:*:*:*:*:*:*:*",
"matchCriteriaId": "019F5D09-638A-4F08-979C-0FAD27246F60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:3ds:3dexperience_enovia:r2024x:*:*:*:*:*:*:*",
"matchCriteriaId": "87193158-3EF5-4628-A0C7-9EEA9E082E67"
}
]
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
"source": "3DS.Information-Security@3ds.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8362",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-03T23:15:23.933",
"lastModified": "2024-09-04T13:05:36.067",
"lastModified": "2024-09-04T14:35:16.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Use after free en WebAudio en Google Chrome anterior a la versi\u00f3n 128.0.6613.119 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -26,6 +49,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8365",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-09-02T05:15:17.823",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:37:03.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@hashicorp.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "security@hashicorp.com",
"type": "Secondary",
@ -51,10 +81,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "1.16.9",
"matchCriteriaId": "42D075A3-0E7A-4EC6-96AF-55CD4B5E0722"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
"versionEndExcluding": "1.17.5",
"matchCriteriaId": "7249EEB1-D26D-4924-A69A-17C63F7B0693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "1.17.0",
"versionEndExcluding": "1.17.5",
"matchCriteriaId": "61BDF0C9-6DA7-496D-8181-6EDF20271239"
}
]
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2024-18-vault-leaks-client-token-and-token-accessor-in-audit-devices/",
"source": "security@hashicorp.com"
"source": "security@hashicorp.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8380",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-03T01:15:13.690",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-04T14:58:49.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:contact_manager_with_export_to_vcf:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1388B7F-5297-4826-8963-BA619741FAE0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_Contact_Manager_delete_contact_sqli.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.276353",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276353",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401249",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-8381",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.553",
"lastModified": "2024-09-03T16:35:13.350",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:02:54.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15."
},
{
"lang": "es",
"value": "Se podr\u00eda generar una confusi\u00f3n de tipos potencialmente explotable al buscar el nombre de una propiedad en un objeto que se utiliza como entorno `with`. Esta vulnerabilidad afecta a Firefox &lt; 130, Firefox ESR &lt; 128.2 y Firefox ESR &lt; 115.15."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,22 +81,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.15",
"matchCriteriaId": "1208DB6D-68A1-41C1-9C57-7C1C16F32229"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "128.0",
"versionEndExcluding": "128.2",
"matchCriteriaId": "5D8B478B-4E42-4B63-B62E-D788C298047D"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912715",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-41/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,32 +2,115 @@
"id": "CVE-2024-8382",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.630",
"lastModified": "2024-09-03T15:12:16.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:10:09.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15."
},
{
"lang": "es",
"value": "Las interfaces de eventos internos del navegador quedaron expuestas al contenido web cuando se ejecutaban devoluciones de llamadas de escucha de EventHandler privilegiados para esos eventos. El contenido web que intentaba usar esas interfaces no pod\u00eda usarlas con privilegios elevados, pero su presencia indicar\u00eda que se hab\u00edan usado ciertas funciones del navegador, como cuando un usuario abr\u00eda la consola de herramientas de desarrollo. Esta vulnerabilidad afecta a Firefox &lt; 130, Firefox ESR &lt; 128.2 y Firefox ESR &lt; 115.15."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.15",
"matchCriteriaId": "1208DB6D-68A1-41C1-9C57-7C1C16F32229"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "128.0",
"versionEndExcluding": "128.2",
"matchCriteriaId": "5D8B478B-4E42-4B63-B62E-D788C298047D"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906744",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-41/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,32 +2,115 @@
"id": "CVE-2024-8383",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.687",
"lastModified": "2024-09-03T22:15:05.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:09:52.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15."
},
{
"lang": "es",
"value": "Firefox normalmente pide confirmaci\u00f3n antes de pedirle al sistema operativo que encuentre una aplicaci\u00f3n para manejar un esquema que el navegador no soporta. No pregunt\u00f3 antes de hacerlo para los esquemas relacionados con Usenet news: y snews:. Dado que la mayor\u00eda de los sistemas operativos no tienen un lector de noticias confiable instalado de forma predeterminada, un programa sin escr\u00fapulos que el usuario haya descargado podr\u00eda registrarse como manejador. El sitio web que sirvi\u00f3 la descarga de la aplicaci\u00f3n podr\u00eda entonces iniciar esa aplicaci\u00f3n a voluntad. Esta vulnerabilidad afecta a Firefox &lt; 130, Firefox ESR &lt; 128.2 y Firefox ESR &lt; 115.15."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.15",
"matchCriteriaId": "1208DB6D-68A1-41C1-9C57-7C1C16F32229"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "128.0",
"versionEndExcluding": "128.2",
"matchCriteriaId": "5D8B478B-4E42-4B63-B62E-D788C298047D"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908496",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-41/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-8384",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.743",
"lastModified": "2024-09-03T16:35:14.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:50:28.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15."
},
{
"lang": "es",
"value": "El recolector de elementos no utilizados de JavaScript podr\u00eda colorear incorrectamente los objetos entre compartimentos si se detectaran condiciones de OOM en el punto correcto entre dos pasadas. Esto podr\u00eda haber provocado una corrupci\u00f3n de la memoria. Esta vulnerabilidad afecta a Firefox &lt; 130, Firefox ESR &lt; 128.2 y Firefox ESR &lt; 115.15."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,22 +81,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.15",
"matchCriteriaId": "1208DB6D-68A1-41C1-9C57-7C1C16F32229"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "128.0",
"versionEndExcluding": "128.2",
"matchCriteriaId": "5D8B478B-4E42-4B63-B62E-D788C298047D"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1911288",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-41/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-8385",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.803",
"lastModified": "2024-09-03T16:35:15.653",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:43:57.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2."
},
{
"lang": "es",
"value": "Una diferencia en el manejo de StructFields y ArrayTypes en WASM podr\u00eda utilizarse para desencadenar una vulnerabilidad de confusi\u00f3n de tipos explotable. Esta vulnerabilidad afecta a Firefox &lt; 130 y Firefox ESR &lt; 128.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,18 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "128.2",
"matchCriteriaId": "4530A3A8-2C08-4E9B-9CCB-1B6A65780491"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1911909",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,36 +2,117 @@
"id": "CVE-2024-8386",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.860",
"lastModified": "2024-09-03T15:12:16.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:44:30.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2."
},
{
"lang": "es",
"value": "Si a un sitio se le hubiera otorgado permiso para abrir ventanas emergentes, podr\u00eda provocar que los elementos Select aparecieran sobre otro sitio para realizar un ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox &lt; 130 y Firefox ESR &lt; 128.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "128.2",
"matchCriteriaId": "4530A3A8-2C08-4E9B-9CCB-1B6A65780491"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1907032",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909163",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909529",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-8387",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.917",
"lastModified": "2024-09-03T16:35:16.810",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:44:52.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2."
},
{
"lang": "es",
"value": "Se han detectado errores de seguridad de memoria en Firefox 129, Firefox ESR 128.1 y Thunderbird 128.1. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox &lt; 130 y Firefox ESR &lt; 128.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,18 +81,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:129.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5AA416-685C-404E-B807-7F80DB85135E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:128.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1402A33C-8F35-47EF-8396-72C62E0FD48A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:128.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E028CC8-D4A1-4D3F-B1B6-F7640D54CC1B"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-40/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,28 +2,107 @@
"id": "CVE-2024-8388",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:05.980",
"lastModified": "2024-09-03T15:12:16.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:49:19.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple prompts and panels from both Firefox and the Android OS could be used to obscure the notification announcing the transition to fullscreen mode after the fix for CVE-2023-6870 in Firefox 121. This could lead to spoofing the browser UI if the sudden appearance of the prompt distracted the user from noticing the visual transition happening behind the prompt. These notifications now use the Android Toast feature. \n*This bug only affects Firefox on Android. Other operating systems are unaffected.* This vulnerability affects Firefox < 130."
},
{
"lang": "es",
"value": "Se podr\u00edan usar varios mensajes y paneles tanto de Firefox como del sistema operativo Android para ocultar la notificaci\u00f3n que anuncia la transici\u00f3n al modo de pantalla completa despu\u00e9s de la correcci\u00f3n de CVE-2023-6870 en Firefox 121. Esto podr\u00eda provocar la falsificaci\u00f3n de la interfaz de usuario del navegador si la aparici\u00f3n repentina del mensaje distrae al usuario y evita que note la transici\u00f3n visual que ocurre detr\u00e1s del mensaje. Estas notificaciones ahora usan la funci\u00f3n Android Toast. *Este error solo afecta a Firefox en Android. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Firefox &lt; 130."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "87E41A09-924E-494F-BDF3-8C17EF330178"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1839074%2C1865413%2C1868970%2C1873367%2C1877820%2C1884642%2C1886469%2C1894326%2C1894891%2C1897648",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902996",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-8389",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-03T13:15:06.037",
"lastModified": "2024-09-03T16:35:17.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-04T15:50:02.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 129. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130."
},
{
"lang": "es",
"value": "Errores de seguridad de memoria presentes en Firefox 129. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haber sido explotados para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox &lt; 130."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,14 +81,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:129.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5AA416-685C-404E-B807-7F80DB85135E"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-39/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8407",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-04T14:15:15.113",
"lastModified": "2024-09-04T14:15:15.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/alwindoss/akademy/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276487",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276487",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.397340",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-8408",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-04T14:15:15.413",
"lastModified": "2024-09-04T14:15:15.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys WRT54G 4.21.5. It has been rated as critical. Affected by this issue is the function validate_services_port of the file /apply.cgi of the component POST Parameter Handler. The manipulation of the argument services_array leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_validate_services_port.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276488",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276488",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.398567",
"source": "cna@vuldb.com"
},
{
"url": "https://www.linksys.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2024-8409",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-04T15:15:14.980",
"lastModified": "2024-09-04T15:15:14.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in ABCD ABCD2 up to 2.2.0-beta-1. This affects an unknown part of the file /common/show_image.php. The manipulation of the argument image leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-24"
}
]
}
],
"references": [
{
"url": "https://github.com/peritocibernetico/ABCD_Vulnerabilities",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276489",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276489",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8410",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-04T15:15:15.260",
"lastModified": "2024-09-04T15:15:15.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in ABCD ABCD2 up to 2.2.0-beta-1. This vulnerability affects unknown code of the file /abcd/opac/php/otros_sitios.php. The manipulation of the argument sitio leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/peritocibernetico/ABCD_Vulnerabilities",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276490",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276490",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.398806",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-8411",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-04T15:15:15.510",
"lastModified": "2024-09-04T15:15:15.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in ABCD ABCD2 up to 2.2.0-beta-1. This issue affects some unknown processing of the file /buscar_integrada.php. The manipulation of the argument Sub_Expresion leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/peritocibernetico/ABCD_Vulnerabilities",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.276491",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.276491",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.398843",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-8418",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-04T15:15:15.773",
"lastModified": "2024-09-04T15:15:15.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-8418",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309683",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/containers/aardvark-dns/issues/500",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/containers/aardvark-dns/pull/503",
"source": "secalert@redhat.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-04T14:00:36.195174+00:00
2024-09-04T16:00:37.020458+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-04T13:40:41.620000+00:00
2024-09-04T15:53:07.733000+00:00
```
### Last Data Feed Release
@ -33,47 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261858
261872
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `14`
- [CVE-2024-44383](CVE-2024/CVE-2024-443xx/CVE-2024-44383.json) (`2024-09-04T13:15:06.753`)
- [CVE-2024-44400](CVE-2024/CVE-2024-444xx/CVE-2024-44400.json) (`2024-09-04T13:15:06.867`)
- [CVE-2024-7834](CVE-2024/CVE-2024-78xx/CVE-2024-7834.json) (`2024-09-04T13:15:07.030`)
- [CVE-2024-44819](CVE-2024/CVE-2024-448xx/CVE-2024-44819.json) (`2024-09-04T15:15:13.910`)
- [CVE-2024-44820](CVE-2024/CVE-2024-448xx/CVE-2024-44820.json) (`2024-09-04T15:15:13.997`)
- [CVE-2024-45506](CVE-2024/CVE-2024-455xx/CVE-2024-45506.json) (`2024-09-04T15:15:14.080`)
- [CVE-2024-7012](CVE-2024/CVE-2024-70xx/CVE-2024-7012.json) (`2024-09-04T14:15:14.570`)
- [CVE-2024-7076](CVE-2024/CVE-2024-70xx/CVE-2024-7076.json) (`2024-09-04T15:15:14.333`)
- [CVE-2024-7077](CVE-2024/CVE-2024-70xx/CVE-2024-7077.json) (`2024-09-04T15:15:14.447`)
- [CVE-2024-7078](CVE-2024/CVE-2024-70xx/CVE-2024-7078.json) (`2024-09-04T15:15:14.583`)
- [CVE-2024-7923](CVE-2024/CVE-2024-79xx/CVE-2024-7923.json) (`2024-09-04T14:15:14.800`)
- [CVE-2024-8407](CVE-2024/CVE-2024-84xx/CVE-2024-8407.json) (`2024-09-04T14:15:15.113`)
- [CVE-2024-8408](CVE-2024/CVE-2024-84xx/CVE-2024-8408.json) (`2024-09-04T14:15:15.413`)
- [CVE-2024-8409](CVE-2024/CVE-2024-84xx/CVE-2024-8409.json) (`2024-09-04T15:15:14.980`)
- [CVE-2024-8410](CVE-2024/CVE-2024-84xx/CVE-2024-8410.json) (`2024-09-04T15:15:15.260`)
- [CVE-2024-8411](CVE-2024/CVE-2024-84xx/CVE-2024-8411.json) (`2024-09-04T15:15:15.510`)
- [CVE-2024-8418](CVE-2024/CVE-2024-84xx/CVE-2024-8418.json) (`2024-09-04T15:15:15.773`)
### CVEs modified in the last Commit
Recently modified CVEs: `102`
Recently modified CVEs: `70`
- [CVE-2024-4629](CVE-2024/CVE-2024-46xx/CVE-2024-4629.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-6020](CVE-2024/CVE-2024-60xx/CVE-2024-6020.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-6722](CVE-2024/CVE-2024-67xx/CVE-2024-6722.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-6888](CVE-2024/CVE-2024-68xx/CVE-2024-6888.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-6889](CVE-2024/CVE-2024-68xx/CVE-2024-6889.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-6926](CVE-2024/CVE-2024-69xx/CVE-2024-6926.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-7786](CVE-2024/CVE-2024-77xx/CVE-2024-7786.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-7870](CVE-2024/CVE-2024-78xx/CVE-2024-7870.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-7950](CVE-2024/CVE-2024-79xx/CVE-2024-7950.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-7970](CVE-2024/CVE-2024-79xx/CVE-2024-7970.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8102](CVE-2024/CVE-2024-81xx/CVE-2024-8102.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8104](CVE-2024/CVE-2024-81xx/CVE-2024-8104.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8106](CVE-2024/CVE-2024-81xx/CVE-2024-8106.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8117](CVE-2024/CVE-2024-81xx/CVE-2024-8117.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8119](CVE-2024/CVE-2024-81xx/CVE-2024-8119.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8121](CVE-2024/CVE-2024-81xx/CVE-2024-8121.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8123](CVE-2024/CVE-2024-81xx/CVE-2024-8123.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8181](CVE-2024/CVE-2024-81xx/CVE-2024-8181.json) (`2024-09-04T12:15:05.833`)
- [CVE-2024-8289](CVE-2024/CVE-2024-82xx/CVE-2024-8289.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8298](CVE-2024/CVE-2024-82xx/CVE-2024-8298.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8318](CVE-2024/CVE-2024-83xx/CVE-2024-8318.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8325](CVE-2024/CVE-2024-83xx/CVE-2024-8325.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8362](CVE-2024/CVE-2024-83xx/CVE-2024-8362.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8399](CVE-2024/CVE-2024-83xx/CVE-2024-8399.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-8413](CVE-2024/CVE-2024-84xx/CVE-2024-8413.json) (`2024-09-04T13:05:36.067`)
- [CVE-2024-6671](CVE-2024/CVE-2024-66xx/CVE-2024-6671.json) (`2024-09-04T15:53:07.733`)
- [CVE-2024-6672](CVE-2024/CVE-2024-66xx/CVE-2024-6672.json) (`2024-09-04T14:23:58.403`)
- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-09-04T14:15:14.457`)
- [CVE-2024-6722](CVE-2024/CVE-2024-67xx/CVE-2024-6722.json) (`2024-09-04T15:35:25.590`)
- [CVE-2024-6888](CVE-2024/CVE-2024-68xx/CVE-2024-6888.json) (`2024-09-04T15:35:25.820`)
- [CVE-2024-6889](CVE-2024/CVE-2024-68xx/CVE-2024-6889.json) (`2024-09-04T15:35:26.040`)
- [CVE-2024-6926](CVE-2024/CVE-2024-69xx/CVE-2024-6926.json) (`2024-09-04T15:35:26.253`)
- [CVE-2024-7786](CVE-2024/CVE-2024-77xx/CVE-2024-7786.json) (`2024-09-04T15:35:26.560`)
- [CVE-2024-7932](CVE-2024/CVE-2024-79xx/CVE-2024-7932.json) (`2024-09-04T14:52:06.830`)
- [CVE-2024-7938](CVE-2024/CVE-2024-79xx/CVE-2024-7938.json) (`2024-09-04T14:53:13.887`)
- [CVE-2024-7939](CVE-2024/CVE-2024-79xx/CVE-2024-7939.json) (`2024-09-04T14:54:22.290`)
- [CVE-2024-7970](CVE-2024/CVE-2024-79xx/CVE-2024-7970.json) (`2024-09-04T14:35:15.343`)
- [CVE-2024-8004](CVE-2024/CVE-2024-80xx/CVE-2024-8004.json) (`2024-09-04T14:56:46.947`)
- [CVE-2024-8362](CVE-2024/CVE-2024-83xx/CVE-2024-8362.json) (`2024-09-04T14:35:16.777`)
- [CVE-2024-8365](CVE-2024/CVE-2024-83xx/CVE-2024-8365.json) (`2024-09-04T14:37:03.543`)
- [CVE-2024-8380](CVE-2024/CVE-2024-83xx/CVE-2024-8380.json) (`2024-09-04T14:58:49.450`)
- [CVE-2024-8381](CVE-2024/CVE-2024-83xx/CVE-2024-8381.json) (`2024-09-04T15:02:54.417`)
- [CVE-2024-8382](CVE-2024/CVE-2024-83xx/CVE-2024-8382.json) (`2024-09-04T15:10:09.713`)
- [CVE-2024-8383](CVE-2024/CVE-2024-83xx/CVE-2024-8383.json) (`2024-09-04T15:09:52.937`)
- [CVE-2024-8384](CVE-2024/CVE-2024-83xx/CVE-2024-8384.json) (`2024-09-04T15:50:28.300`)
- [CVE-2024-8385](CVE-2024/CVE-2024-83xx/CVE-2024-8385.json) (`2024-09-04T15:43:57.797`)
- [CVE-2024-8386](CVE-2024/CVE-2024-83xx/CVE-2024-8386.json) (`2024-09-04T15:44:30.137`)
- [CVE-2024-8387](CVE-2024/CVE-2024-83xx/CVE-2024-8387.json) (`2024-09-04T15:44:52.153`)
- [CVE-2024-8388](CVE-2024/CVE-2024-83xx/CVE-2024-8388.json) (`2024-09-04T15:49:19.170`)
- [CVE-2024-8389](CVE-2024/CVE-2024-83xx/CVE-2024-8389.json) (`2024-09-04T15:50:02.933`)
## Download and Usage

View File

@ -159289,7 +159289,7 @@ CVE-2020-36770,0,0,342096ee6bcabffc876d045f7b047d95957ed0e24e4f159371263b0a65e3d
CVE-2020-36771,0,0,06226d7a1a0f634e04a127a8140fa6aa4c50363da735fb56cffe4d89e7f06324,2024-03-28T19:15:46.773000
CVE-2020-36772,0,0,4901f0300dbb4bfc19846db75293ff00c94a014617e8da3180def8ca74bd2c87,2024-03-28T19:15:46.887000
CVE-2020-36773,0,0,da62f29094afdc73550731cb7dff0b0973e7eaf0faf517df43ef5cb9972b0e91,2024-03-04T23:04:23.720000
CVE-2020-36774,0,0,b1f4f8c07f7dc1562fce728c0e12854043bb1cca70d8ab1779c0590eea5b7512,2024-02-20T19:50:53.960000
CVE-2020-36774,0,1,63d2af6e1f77f69c592918f611b2831429216f8341a37ec3fc1c1670cc5f49a4,2024-09-04T15:35:01.733000
CVE-2020-36775,0,0,57f8b1cfccf2aab26d73dffa8165b7564de4aa3bb3113b44ae141b4cc4ecf246,2024-04-17T17:32:18.957000
CVE-2020-36776,0,0,95448c982f03576592f62bc1c771f3ada9b048de048bbc46661ad5c33a037c87,2024-04-10T19:34:31.410000
CVE-2020-36777,0,0,049b8813e9bcefe32870c3cf66fa0cd20fdf6be2bd1a3ff587d83ec743eb7201,2024-04-10T19:32:09.210000
@ -219605,7 +219605,7 @@ CVE-2023-26152,0,0,1728bdc3f92f296fdd9076c246b1702ee3efa2a7f6070c96e12cf87521a78
CVE-2023-26153,0,0,28a2926032c781392aa9dcf1f9f06c0e84b17fe0df8ec4c462c4b289c54da1ea,2023-11-07T04:09:29.387000
CVE-2023-26154,0,0,22013e582020c3445df04e85d004e528d4143eb7c09efec61c3f73765a054b99,2023-12-11T17:48:03.653000
CVE-2023-26155,0,0,5145d87aff7044c801bd92cccd8ebf85a3e850c3ba33fe4dcc863dcd6b17b7ec,2023-11-07T04:09:29.567000
CVE-2023-26156,0,0,33abb1b5b05536437c3b0e67c2019e39a7f4f27a406ccba584c4251f4e850fc7,2023-11-17T17:46:38.143000
CVE-2023-26156,0,1,889f252c330b9b5f97dc88e8aa07733090c89fa3d03a8d6fe3d201131d94dbd7,2024-09-04T14:35:01.280000
CVE-2023-26157,0,0,5b54d293009b3be393adccaf07d8f03c79203e956511f7dc4c81536c37b6ed1b,2024-01-08T19:33:27.113000
CVE-2023-26158,0,0,699f12907e5309561e070d63e0170a6db29bca64dcf3ba7f34fa03156ef4e2f5,2023-12-12T22:26:30.457000
CVE-2023-26159,0,0,f1709cc5bf58477399b52769bbbcbc35b87ef9cf6e169a323ab987f6cc566709,2024-01-23T03:15:11.380000
@ -224079,7 +224079,7 @@ CVE-2023-3209,0,0,04d58e862ac4fdb45a1e476b4ac46847e2b31a04dd7a579264519011b19025
CVE-2023-32090,0,0,30fd1a0540e5172a6ec18b451a1b6ad117fdde134940d3e94383e80e441e0e20,2023-08-10T21:57:19.720000
CVE-2023-32091,0,0,cfbbf8c4720d68dd1e0e0d863e699926c51930882f64e8483cd278f1a0743cfa,2023-10-06T16:24:58.010000
CVE-2023-32092,0,0,1cdec410beccf6207e5c0bcd40c945811a2ddb2a48acc452de018a98a2874bce,2023-11-15T17:48:53.537000
CVE-2023-32093,0,0,198b888273489cc5c8ed633bebcdb8b4df8d52c2498c8eceaf31027b86fb209a,2023-11-15T17:48:41.793000
CVE-2023-32093,0,1,0e70153248617d23c6ca28b1b1e9d8df9d7bb9e2f22e961026a0775848677c06,2024-09-04T15:35:12.110000
CVE-2023-32095,0,0,b440f4c17920e1976b58b63d5d9b56b41640e2787a30599f4d26aa39215e02eb,2024-02-29T01:39:35.533000
CVE-2023-32096,0,0,328f4365024c923e49e922490445d842dba7cff1f74105756fa1e33f184e8b51,2023-05-25T18:04:56.717000
CVE-2023-32097,0,0,38780ba919cb224c2f0cd9726bb0bb7c1d934d2cbad8f0a5cd9a5d850a9c9682,2023-05-25T18:05:09.160000
@ -224111,7 +224111,7 @@ CVE-2023-32121,0,0,a66c1a6ea8d73f20530ce786550f2fd9bb2022df3f1bc88519f8f46907998
CVE-2023-32122,0,0,662721d6e27f9fbbfa60240985729189c98f06ba2bbeb95221b89d43beb1708a,2023-08-22T23:53:18.217000
CVE-2023-32123,0,0,570dff2eaf75cd65ff33318dc9e301c859fbdfbe2a7ab580042fdd27880f57b0,2024-06-21T15:15:15.377000
CVE-2023-32124,0,0,467aefef086f8e14e105ab3ad286ce890eab793fcd673196fca71993f785c3a3,2023-10-16T12:56:58.477000
CVE-2023-32125,0,0,98b9b962a558348f33282171ffe986aa76910833a904cd646bf439394bf96038,2023-11-15T17:48:36.397000
CVE-2023-32125,0,1,0170f757c54691498b7f09e93a6bf92be619dfd7419353d303697cc8f5ae62a7,2024-09-04T15:35:12.447000
CVE-2023-32127,0,0,b8aa0eba0952a97b2d18a1ee4f8706fc3f7bf1bf4da26efcde90f0b5ad51afe5,2024-04-24T17:16:50.397000
CVE-2023-32128,0,0,9b60b45c9ffccb388440bde2b839e74f35ef97b8d45780423f49f1f90fbfd994,2023-12-22T09:50:51.407000
CVE-2023-32129,0,0,42b572224fefc4b6a02bfddae049043e6d48eb5e00a059e5836187e543cfa660,2024-05-17T18:36:05.263000
@ -224479,8 +224479,8 @@ CVE-2023-32496,0,0,e3c3f510cea15c40d7e051973cef5d8ed1dde9de6a6d99ea587be21bcd89f
CVE-2023-32497,0,0,99281717e70c5890b12d75a7110d75c2831c767894b6746ecf7311dae6a5a205,2023-08-29T15:36:57.033000
CVE-2023-32498,0,0,cd0e6219eabd9ff5bd912894e77ca8a0429ce0fd48d0d1f871f655fb9b79de94,2023-08-29T15:36:35.810000
CVE-2023-32499,0,0,b6d5984a88de970619bc7a22242b577f081522cc64de1c346b0d5fb512aabd37,2023-08-29T15:36:27.277000
CVE-2023-32500,0,0,cd396631bd2c251997c9d5fc3f58499a7a90d92e6197ad9e2083840b37a5124e,2023-11-15T17:48:31.390000
CVE-2023-32501,0,0,046d6d0aaf21e52c98b6f567713a370c882bd712eb386706e199f457db679e26,2023-11-15T17:48:07.883000
CVE-2023-32500,0,1,25be6f460b3331c243d7bc1f9a485970425baab9b2ce9d867ac17d1c0baefcb4,2024-09-04T14:35:02.597000
CVE-2023-32501,0,1,1c71423f91bd2453288c44b24852a3eb8a42607dc4e1f468038aead0f147f1b8,2024-09-04T14:35:02.897000
CVE-2023-32502,0,0,3fbd96bf98275daf9236c54a6b9df16c676b597aefea0b32be2e24304e51e252,2023-11-15T17:47:55.267000
CVE-2023-32503,0,0,1a7217dda2f352cea1561923bfc71534f15eca03a26b8012b2d60cbbf490b2a3,2023-08-10T03:53:30.737000
CVE-2023-32504,0,0,df6c10e59f3331d40e68039d006565ecd82d267d64b7b2057ed2ca576e7d2a4d,2023-11-30T04:57:38.217000
@ -225838,7 +225838,7 @@ CVE-2023-34168,0,0,9fb50c1c6033f1845d0b4fea9da9ebbdf8cc285da17f39b98e9cb87da6d54
CVE-2023-34169,0,0,6325d661c2fdf27a21cf542c548e3b53eeaa08380bb2d81a789f9afab1ff6627,2024-02-29T01:39:48.460000
CVE-2023-3417,0,0,94fca8455b513d77a23f2aa19b799bffaf820fea1ce6cb4b12890263b3fbab9e,2023-08-01T17:53:51.063000
CVE-2023-34170,0,0,1b6ebbebfe090643db931330c5f9e791daccac6ab8766aeaf7c55d5f919956cb,2023-06-28T07:22:07.830000
CVE-2023-34171,0,0,7d0f20a37c836d908a93108c0574418144aa0f380bc250fddabad65336a3da75,2023-11-15T02:25:10.713000
CVE-2023-34171,0,1,d35ad067c5a27d84e3ee824a98c5f80355fc8094868e7e7a862e3bd62c91552e,2024-09-04T14:35:03.600000
CVE-2023-34172,0,0,2b30fe4b86d9930d6210812857b6ff88b21293711aca303b356560165d854f34,2023-09-01T12:30:20.373000
CVE-2023-34173,0,0,3b4eedc69061cf28e263391e902f859f1923b0497cdb988dbaa2da466e4ff63e,2023-09-01T12:38:47.593000
CVE-2023-34174,0,0,c1196dd72ef532fd1a969f468effaac78ab18aee4b52d908ab7f14c8c8726972,2023-09-01T19:37:34.893000
@ -231065,8 +231065,8 @@ CVE-2023-4113,0,0,b3964169a4a288c31d7534d7e7777fa174c0452d1dddbc7f27a12bfc4107b8
CVE-2023-41131,0,0,34f7e8cccbeb1e590b5a44d2b0991df6198158744a0a9874ea398a496bd4af38,2023-10-16T12:57:06.543000
CVE-2023-41134,0,0,5cabd1fc2475eb57bf46af0b0e6a2bc7e8d98a327cfbb4d998fcb36d54900351,2024-06-04T16:57:41.053000
CVE-2023-41136,0,0,abbdf022493ee41bbed95e75aa09f549e5f9a5eac4bb8eeaacc6368f96548917,2023-12-05T20:59:39.847000
CVE-2023-41137,0,0,67bac82770019271343d865c2f144d010c94b99c02b446644377a1b4ba7cd158,2023-11-18T00:12:58.673000
CVE-2023-41138,0,0,34a00c05b00695ea4a864bd225e5a562d946398af18a0faa308e3ae26c97e9b5,2023-11-18T00:43:59.243000
CVE-2023-41137,0,1,b9531ce16ac3d699004b7356c0380ba53819a7ee3f6848dcb050e0fd4642de3e,2024-09-04T14:35:04.010000
CVE-2023-41138,0,1,50fa004604643ea857d4b50ac89f221e6a4653e726e9c4a1e431e0bf65b85875,2024-09-04T14:35:04.757000
CVE-2023-41139,0,0,8de923a7afbed7e0779f19e504b87d948fc6d88458f147ba08759377dc775295,2023-11-30T15:48:23.633000
CVE-2023-4114,0,0,0fd673c245b5c9721e1b0324c9881dad96e97f0eb80999a4ecdd51353b102957,2024-05-17T02:31:19.987000
CVE-2023-41140,0,0,7263644e9ca055e0a49cd45f777f6bc650ca3b108ffea78580c323529d47e8ec,2023-11-30T15:45:50.633000
@ -233882,7 +233882,7 @@ CVE-2023-45315,0,0,0015d13db4624e57dda596fb704547c049b03e9719ea11b6bef4521d52713
CVE-2023-45316,0,0,bcb622ee988a69d3ea1780e296139d040dc8d162f461eee319826569892b4933,2023-12-14T18:58:08.837000
CVE-2023-45317,0,0,bea509f07c47450a9d51733d8c387920adc340eaef4bf8aea20bf7ae8b7e45f3,2023-11-07T19:54:46.170000
CVE-2023-45318,0,0,a89942c3a7da207d1a507d307bb3d0d2e42a815f53bc4a5aa55a3cb62ae14b20,2024-02-20T19:50:53.960000
CVE-2023-45319,0,0,613258c28050c3230566aa08d98cb29bbd699ae8dd6bc406e7ede0beff515e3a,2023-11-15T20:15:50.193000
CVE-2023-45319,0,1,8bc960e149f01022befd213ed5c009672908f0c13e6246ae9f8b2c116ade98cf,2024-09-04T14:35:05.510000
CVE-2023-4532,0,0,cc68b6244fbba8637ad353ed09b6f2b45c9cdc3fd2a8afc1cce9da5bf31918f0,2023-10-03T19:28:34.357000
CVE-2023-45320,0,0,e20435de8e58fba25528f0899673d8da831ddd5e7582bd8c6d4b1d4cfa65cede,2024-07-03T01:41:51.467000
CVE-2023-45321,0,0,1a2ec0bd5862a0b5c8f71aae23a1973f9730822538ea43278e99dec4ae797620,2023-11-06T14:44:12.273000
@ -234291,7 +234291,7 @@ CVE-2023-4589,0,0,5823a1bbdcd3fd3dad6a9d361ad6771c5169f34ce23ef9e39b305d1aaf66a9
CVE-2023-45892,0,0,31ea99a81b63e5dc5404654e4231556ec48f5c4f723835f37c58ea694f43c518,2024-01-08T19:31:03.043000
CVE-2023-45893,0,0,012ce31fe6e07df7e806e0f22cab292b188d57d4fcd77a1edd037ec55ea25c2a,2024-01-08T19:30:51.917000
CVE-2023-45894,0,0,acbbd0369c677d90271e9d43ae921ffda1b227f19a0c24cf767e01f00c88765f,2023-12-20T16:44:29.960000
CVE-2023-45896,0,0,b6f1871c5cde20100e5e34025c9d349c486d49aa1d3960ac236671572654f902,2024-08-28T12:57:27.610000
CVE-2023-45896,0,1,219c348b3e14417d281e67cea4b9228bbfb7da477408d782c62f097d03c0428d,2024-09-04T15:15:13.160000
CVE-2023-45897,0,0,734daadcbcf83a77d0375bea2b59862190723c5d109c64b97c90f46f832ac6a4,2023-11-21T16:33:02.183000
CVE-2023-45898,0,0,f3261a8736c0c34cdaa65c9211bd18854b9e3c8fbb8c9c8e0fd98bdbf7fab3eb,2024-08-26T16:07:21.753000
CVE-2023-45899,0,0,8ea5b9ddd2874024b78e9d2dcda12439e81d1dbfe77d0f8413dab38e7cc66b6f,2023-11-08T16:54:12.307000
@ -234324,7 +234324,7 @@ CVE-2023-45928,0,0,692773293cc994caed3570cd831cde7ba12c36d9e87f74ed0925476a93196
CVE-2023-45929,0,0,d06d8802f033d3364ed9d8561e56c053fac04131e0401aeeb9a382027f7e9cfe,2024-03-27T12:29:30.307000
CVE-2023-4593,0,0,4991cf119c8ebfc10d48154734bdf0ee9365316ccc7c1b60d5d04e7ab999d216,2023-11-29T21:23:46.107000
CVE-2023-45930,0,0,ac3197c84435c7633fa4745f386c7743f353780ba24625d46aefcbc75ec9d4de,2024-01-30T06:15:45.560000
CVE-2023-45931,0,0,71291ba97a260f713a861108fda23be4ac6e7903d28c5e573e686f6dedac45cf,2024-08-02T21:15:47.243000
CVE-2023-45931,0,1,1f5bd835283ab289e500417af1c235f343ba52a05df340c733345fabae2eb518,2024-09-04T15:35:13.067000
CVE-2023-45932,0,0,5804986f26a4a7091164de7ac51ad9027240da2e953af7ae7ca5bb7bec6cb357,2024-01-29T09:15:42.593000
CVE-2023-45935,0,0,a681b11e1b15d64f0feef3bbce8cfc25d06bd82aced7e4d63aa09594ced1e08a,2024-08-02T21:15:47.317000
CVE-2023-4594,0,0,24c035b780c77202dedc81f329600980e9f4ebf5e60ff552b7c3ea2fd6139c32,2023-11-29T21:23:22.717000
@ -234643,7 +234643,7 @@ CVE-2023-4636,0,0,0a8908ed53b282884073cf1159c75f04520678616413932f50206626519e8e
CVE-2023-46360,0,0,15b7a0bfab198a40fa51898875d8715bef48ca2dde4b0a9c26bf4f4c0eae3a96,2024-07-03T01:42:03.253000
CVE-2023-46361,0,0,6566005f37b3b81cce124758e1aa16ad83da42a1c4e3dd83e0552b0fbb29c5a1,2023-11-06T19:26:57.803000
CVE-2023-46362,0,0,6de7c4e3de78a15cc4cee39eb5908a6649732d0266f5e09709a4fca63247c911,2023-11-15T19:49:17.137000
CVE-2023-46363,0,0,d83f9cc12cd535147f115a71b8a44faf622b373ca1a58141c917e251f650bb6e,2023-11-15T19:22:31.510000
CVE-2023-46363,0,1,88add742026dacb9c5fb0ed25051b79dbf420bfd9e4dc44f99319d2fa0e9f430,2024-09-04T15:35:14.107000
CVE-2023-46369,0,0,05f430621e20b438c901b498a04c3792c3a816c2ac20590971f8b20317024e04,2023-11-01T20:03:48.360000
CVE-2023-4637,0,0,8e9dbb42526591aef31bf444a885002ed992c120ad0152f6dedc0aa3ba92f807,2024-02-12T15:55:22.053000
CVE-2023-46370,0,0,cbc7ea034a75728a62aff6e5259c8e40bc0c202441fa2efd5200be0598aeb76b,2023-11-01T20:05:45.640000
@ -234937,16 +234937,16 @@ CVE-2023-46752,0,0,02ba18beeea3d9cd2589127e949af27cc274848f7001f95dd52a5768446ec
CVE-2023-46753,0,0,a358632885874e1096965fa2cd9f4b2b0003da5864eafc8abcb4f334eae8fb20,2024-04-28T07:15:08.623000
CVE-2023-46754,0,0,1ffcf9d46b272f7e633897ba307e7fc0cfd404c3206f5762d36b8dab1832675c,2023-11-07T15:56:54.830000
CVE-2023-46755,0,0,f006abf3387ee385702fe38ad1783df75a9a1c12fb78bd37f05eb4006c002947,2024-09-03T21:35:03.293000
CVE-2023-46756,0,0,ee931586ed5a979dd36bed6d4d9aa43d50ca439365d207b71fdb06bac256da38,2023-11-15T16:20:22.913000
CVE-2023-46757,0,0,45413f284fe5e4a3e2dfbb53746f29bad87953cd3b04b41df8a8c02055e90d09,2023-11-15T16:19:03.930000
CVE-2023-46758,0,0,2d6ebd1667c90c8dabc0db44319221c3074d11af2df39a16b6f02af058643e53,2023-11-15T16:18:47.657000
CVE-2023-46759,0,0,8132bcd83cba575be809d6eb8070309f94417e1c5ffaf353634cfb861abd12b7,2023-11-15T16:17:22.023000
CVE-2023-46756,0,1,43f3563c4505975db0e07f9c314367c7c7d35f79a19ff50cfdf146eecbac9c87,2024-09-04T15:35:15.437000
CVE-2023-46757,0,1,720f0d3d9509fe8e96e9e1b4a5aacc09ef3c21de6b257f8d004ac4540c434954,2024-09-04T15:35:16.303000
CVE-2023-46758,0,1,226078aee0cbd4a3125ee2f5cb07981befe68e19e1bae0ee1f5200dfedbbf665,2024-09-04T15:35:17.067000
CVE-2023-46759,0,1,30f062ee321eed6b2c2413aa2f7783c0d691f4b4070789591c0b89f04227c879,2024-09-04T15:35:18.050000
CVE-2023-4676,0,0,228bd517b376fbeec2e676e982e3184b84f4fde26115f780117b13388e8bcc60,2023-09-19T18:45:20.783000
CVE-2023-46760,0,0,2559b3e5cf2950fc203e9561149519223c27a8ee38dd8c91bd943d05fe929904,2023-11-14T20:03:50.917000
CVE-2023-46761,0,0,d020f2f4c4b9bc5a9c76924b0e22e7220bc2a719305740db8df0129b770cfecc,2023-11-14T20:02:53.007000
CVE-2023-46762,0,0,a9c6a3395300a221c30ab84662748e8b70bb193f73740948a0caf14489e20eb1,2023-11-14T20:04:21.413000
CVE-2023-46763,0,0,ea7701379ed32f1ad20b53ed8927fdff4e82622451343603d1386ab75f402e22,2023-11-15T16:16:36.933000
CVE-2023-46764,0,0,457caeba832a65fd5c0562e18f41bfc125b5985c449f2282abc059186f132a9e,2023-11-15T16:16:19.310000
CVE-2023-46763,0,1,0814fb884245de0558e2279ef7b6dc47fe7fed056a74c9ef6ee98928355cdadf,2024-09-04T15:35:19.180000
CVE-2023-46764,0,1,8d1ea84cfff9b1ca313f05f2494f1fc4c2e2743d307ee35e2c9b9de1ff52531d,2024-09-04T15:35:20.070000
CVE-2023-46765,0,0,89f63e930f556b7155978fac16a6e175b828646333613673e92ea854029e41eb,2023-11-15T16:01:11.077000
CVE-2023-46766,0,0,cc07ad79be4ad93151ce682aec54ffb88903c76742da9fa9fd0910c55cc4e0b4,2023-11-14T21:33:58.310000
CVE-2023-46767,0,0,6c15a35fbaa30dec6165852499244b60bbbfcc29d5245b6b3a175bb3df400e85,2023-11-14T21:33:44.223000
@ -238822,7 +238822,7 @@ CVE-2023-52431,0,0,199f10747613e848b4be76ff988b9f76b50282c6e59f2e5da91f811ef18a5
CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000
CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000
CVE-2023-52434,0,0,b72f32c1cbec248d35f9c41a46397d6f83aca29d211f6de56a2e5906d4279d8e,2024-06-25T22:15:14.567000
CVE-2023-52435,0,1,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000
CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000
CVE-2023-52436,0,0,387ed35f7d4a0634a004ef9c8917dd0a18ca99fe446d00a68e749f5a1c29bc3d,2024-06-27T12:15:14
CVE-2023-52437,0,0,42872141987ae74e64d2ed167d955818bd8792275db5df08a84277dbded74cb3,2024-02-22T13:15:08.020000
CVE-2023-52438,0,0,4e064d83c544e822a879c8ee937e79d939c820e62514fc918e0471f1fd3d6597,2024-06-25T21:15:51.867000
@ -239781,7 +239781,7 @@ CVE-2023-5755,0,0,7f6ba0a7c4b01d5120d6a335ca8978ecd013a757838cd48f12c434b5371b42
CVE-2023-5756,0,0,62a838fe7422fce25d6ce21c4fe62cd67a41d5b69922982dbb544a9de294f4b7,2023-12-12T22:33:17.393000
CVE-2023-5757,0,0,fb294f0740fc046c3fceca643755ad70b238cf0bc05adb857fa13ac6273b464d,2023-12-13T20:29:04.543000
CVE-2023-5758,0,0,0a3fa7e33ef2422e014e0a476006249a81fc6a79068118e7029a443602e6962e,2024-01-07T11:15:14.427000
CVE-2023-5759,0,0,df205f946b856a29fee3b47dda14f4d4714510f4f0c9adf20b1f56243cccab30,2023-11-15T20:17:01.213000
CVE-2023-5759,0,1,72653ca568be728691c820f248b65c9e7014e122e965494b04fb9111f629a701,2024-09-04T14:35:07.577000
CVE-2023-5760,0,0,65b4229f8e9f20621d5b1d8b0c8fa9ca44f72c667563409816b457ea05fc017a,2023-11-16T16:48:28.453000
CVE-2023-5761,0,0,81521c116d37fefe3e15d4b8cecf9df5e0b719d7c54d23c2a56cb9eeeebfb726,2023-12-12T15:50:05.353000
CVE-2023-5762,0,0,b7218df13e2a944a9a16a8453cb76e0c87656213b68c7094df785f006ed4f36b,2023-12-08T15:02:37.390000
@ -239927,7 +239927,7 @@ CVE-2023-5909,0,0,658773cdf3eaae71014e359a41875937566800fa04782a1c4991dd5815eefd
CVE-2023-5910,0,0,995776f497075fee04f84d3e6ec5286979cb993bde6400043e7b49c3b409db2d,2024-05-17T02:33:23.460000
CVE-2023-5911,0,0,e58397228084ce959d1977d43a36d7f9f7fe84df00018dfc01a737f697c6bb06,2024-01-11T19:43:17.143000
CVE-2023-5912,0,0,6e3282f3dac413022a44f49b9266504beda2d35c3b8412581990530a59480c3c,2024-04-08T18:49:25.863000
CVE-2023-5913,0,0,ed04061e816c877980596db073ba35094f63f321c4d724b4767e8a9fdce9a0eb,2023-11-16T17:00:33.503000
CVE-2023-5913,0,1,d2c6d95d88b40a1a7e2d5e07b6b68f684525b3bb17fa88b54939951d9b441d55,2024-09-04T14:35:08.320000
CVE-2023-5914,0,0,51541705eddc7daf25160fe6088f358c0dd9c4c902ccf7955bfc3111128949c0,2024-01-24T21:05:40.173000
CVE-2023-5915,0,0,8389bb95e02717b7c428e4442698f3bd895d69165fa7ff8815c222146489ed2c,2023-12-08T18:24:27.517000
CVE-2023-5916,0,0,24046d157bb58ab99914653f8f31bc50fc87f80c0c2494dbd8f62e901e06f1ee,2024-05-17T02:33:23.723000
@ -242509,9 +242509,9 @@ CVE-2024-1537,0,0,0fbbb428e5d6117794e506ac85f652d85cda102f4ab0cd6387f39041bf7253
CVE-2024-1538,0,0,9fc7289e31e07bb56b9eb9128e9d1b6ba097152ab59ee8378f006443d204bcca,2024-03-21T12:58:51.093000
CVE-2024-1540,0,0,8f40fefee3c1d81db1cb09d26a976b077353ff3be5e21ad7faf7c16fdb309e83,2024-04-16T12:15:09.617000
CVE-2024-1541,0,0,b86c8271de1114c26151c28b4a73ced0b46884833e2a03ab8cf945b436dc1143,2024-03-13T18:15:58.530000
CVE-2024-1543,0,0,f09e8bd144932cbfd26fcb94293719e93ce0739ea4f1a19f44970a086a000e18,2024-08-30T13:00:05.390000
CVE-2024-1543,0,1,1ca0ece89b899aa299bdd6da435c8cae0ada80542682775d0e63edd3d1df7138,2024-09-04T14:26:29.407000
CVE-2024-1544,0,0,265716934ae5f78af4714ddd5770ee1721802c8c59f6325c2998c6704d523a66,2024-08-28T12:57:39.090000
CVE-2024-1545,0,0,55d071a8f91f9fe9a6e28ba79bbc4b5afe73a0bde3190b952d49fd581990a5ce,2024-08-30T13:00:05.390000
CVE-2024-1545,0,1,d8e0173d8b8fcbb51639f3c2b86930fb23b89ce554a5c11bdf7942fe8d5f798f,2024-09-04T14:27:08.060000
CVE-2024-1546,0,0,25cf53baa34bb0b4805c5fe628b82b62aabfaaa6638a62497af9e0de14b093ff,2024-03-04T09:15:37.650000
CVE-2024-1547,0,0,8590deab7ee2956de6a0ef76618a6a96ff52727cdbc8e57258f00f60bb5d5bd4,2024-03-04T09:15:37.740000
CVE-2024-1548,0,0,6eee3f01728ed0fd4a2424a0afe7c369619c5f5c30c8c9a39afa9061aca1df3f,2024-03-04T09:15:37.787000
@ -245513,7 +245513,7 @@ CVE-2024-23751,0,0,9162dc4b42b5905d8dd88803aa2613495cbbe611df5d9d2ead982e210e469
CVE-2024-23752,0,0,b2bcc21873940c2a0980c29225225dbeb5e398b96bb8976a2b36657cd69cb30a,2024-01-29T19:27:17.040000
CVE-2024-23755,0,0,d38be966ccbea9093e3f38cc4a316cab8e8cf5496a4c06474494fc58b9fd5172,2024-08-16T17:35:04.600000
CVE-2024-23756,0,0,2bdfbaef90f9f936a849dec2c9c1d1a05a3f10092fc01318b2702eeb8348f878,2024-02-15T16:01:08.870000
CVE-2024-23758,0,0,3ffe01e5849c29350b16e72f283a186df16bf63db40bd56bdf04a6fdd9681114,2024-02-22T19:07:37.840000
CVE-2024-23758,0,1,704d7ab3235cda57c22d587e1486589d1ace0dd70c3489fe6494581e96f65a90,2024-09-04T15:35:22.740000
CVE-2024-23759,0,0,7b8f90d14164aaef0f5274ab8cd0cd35c941b0f2a4c75bb44f448c7d8d1f721f,2024-02-15T04:49:02.133000
CVE-2024-2376,0,0,9e2099f4b58a69061afc220ef5842f9c8951cb095f07ed94c7b9c40dacf75e0b,2024-07-08T14:18:14.030000
CVE-2024-23760,0,0,f7144fbe6a9c74fd889c91067d8f4928194181e3dd45af686646cd9099fcf68b,2024-02-15T04:49:31.847000
@ -246669,7 +246669,7 @@ CVE-2024-25634,0,0,a6c0976398d76132e45109770c34649b9cd1b53574ce636d0b3d3dba0d5b6
CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b4eb,2024-02-20T19:50:53.960000
CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000
CVE-2024-25637,0,0,6b107052af4924b87ae030a7574b9b21f62a146f03952919ea9b1d4b0e21ed3d,2024-06-27T12:47:19.847000
CVE-2024-25638,0,0,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000
CVE-2024-25638,0,1,3e36e5df83f2e69835f29119214fc1595bb4821d149b9088558eacbbbf558e37,2024-09-04T15:15:13.637000
CVE-2024-25639,0,0,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf568353474b7,2024-08-22T14:59:56.757000
CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000
CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000
@ -249025,7 +249025,7 @@ CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9
CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000
CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
CVE-2024-2881,0,0,05339d01a8e56f6d1bb06e81e53d928f3840cfb3810d654bd254a6621dd66fa6,2024-08-30T13:00:05.390000
CVE-2024-2881,0,1,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000
CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af9c2,2024-08-01T13:49:20.227000
CVE-2024-28816,0,0,6ee14c0c184476ced399e15a2ac6d0162b81cd21899a98e17bebc5eeaa09e33f,2024-03-11T12:47:42.653000
CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000
@ -253150,34 +253150,34 @@ CVE-2024-34633,0,0,dcc919d4fe3cd88a5fcb40687da081e03a0a9de314e12214fe0ef228c52e1
CVE-2024-34634,0,0,ca7a7dede48188d5d254d269b40f8d801c38580350c32ea8a5414c109ee76db9,2024-08-09T21:17:55.090000
CVE-2024-34635,0,0,f315481fa1588ad6ec51d6f8cc1b6dc04d19bc1ee3f7f3e279e9f419b1b04cd7,2024-08-09T21:18:43.303000
CVE-2024-34636,0,0,6d289e439c66cba4f752a544d7ace1fe5b0d959e931f99945923c8bb0b32e8a7,2024-08-29T16:47:17.790000
CVE-2024-34637,0,1,b2dbc5d3e2b8bd640acbcd8455d7cad1fdce5ceb29358ceadf517c157da6f558,2024-09-04T13:05:36.067000
CVE-2024-34638,0,1,4f0cf4319f2fb0aa7c7dd8d320d63c19f79bc6f56a5ea09b417b10a258c83de9,2024-09-04T13:05:36.067000
CVE-2024-34639,0,1,524dcf72795ba916828a0fb45debbb24e51bdef5371985ea7d095ff25c9b4343,2024-09-04T13:05:36.067000
CVE-2024-34637,0,0,b2dbc5d3e2b8bd640acbcd8455d7cad1fdce5ceb29358ceadf517c157da6f558,2024-09-04T13:05:36.067000
CVE-2024-34638,0,0,4f0cf4319f2fb0aa7c7dd8d320d63c19f79bc6f56a5ea09b417b10a258c83de9,2024-09-04T13:05:36.067000
CVE-2024-34639,0,0,524dcf72795ba916828a0fb45debbb24e51bdef5371985ea7d095ff25c9b4343,2024-09-04T13:05:36.067000
CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000
CVE-2024-34640,0,1,c64ad878a91921d11fdfda70cc73e24a8ab919d0be10907b6201fad83cf318f2,2024-09-04T13:05:36.067000
CVE-2024-34641,0,1,2b30fd1a9f5ae753629925215ca156579576fd060a975f5387ccb7d58dd694d8,2024-09-04T13:05:36.067000
CVE-2024-34642,0,1,e24e4fd425c8a82dbb8a14c2c33de8425f99b99315590c30438359d97d744a2b,2024-09-04T13:05:36.067000
CVE-2024-34643,0,1,9e9b311c0ce1e5994d97a341e46bd6d5397f2c637909e0411625853a41751d2e,2024-09-04T13:05:36.067000
CVE-2024-34644,0,1,c841c0880f2a0920930777aa376cbe647a2935362e16d6281569741fb5eaff83,2024-09-04T13:05:36.067000
CVE-2024-34645,0,1,2f99c158186706dbada71c0dac78c09379d069bd2cb9a84d4728594f76df8efa,2024-09-04T13:05:36.067000
CVE-2024-34646,0,1,82e7c60c64a3d6d703a9c5022f2ae80fb7cf092d075fe3b961a4a2a453e8a1ea,2024-09-04T13:05:36.067000
CVE-2024-34647,0,1,e317ed6496e4aa586bd11047d35b17feef7523f86ecd05c9da2f725afcae78f3,2024-09-04T13:05:36.067000
CVE-2024-34648,0,1,1e6dbbe77ed97622b756d3057162d26db67ca4ea112b590ffb36caf47d43295f,2024-09-04T13:05:36.067000
CVE-2024-34649,0,1,cb8c945b910593bb4442f9829c0aeb4b899de2f73eda03e4758d8aecda2a79cd,2024-09-04T13:05:36.067000
CVE-2024-34640,0,0,c64ad878a91921d11fdfda70cc73e24a8ab919d0be10907b6201fad83cf318f2,2024-09-04T13:05:36.067000
CVE-2024-34641,0,0,2b30fd1a9f5ae753629925215ca156579576fd060a975f5387ccb7d58dd694d8,2024-09-04T13:05:36.067000
CVE-2024-34642,0,0,e24e4fd425c8a82dbb8a14c2c33de8425f99b99315590c30438359d97d744a2b,2024-09-04T13:05:36.067000
CVE-2024-34643,0,0,9e9b311c0ce1e5994d97a341e46bd6d5397f2c637909e0411625853a41751d2e,2024-09-04T13:05:36.067000
CVE-2024-34644,0,0,c841c0880f2a0920930777aa376cbe647a2935362e16d6281569741fb5eaff83,2024-09-04T13:05:36.067000
CVE-2024-34645,0,0,2f99c158186706dbada71c0dac78c09379d069bd2cb9a84d4728594f76df8efa,2024-09-04T13:05:36.067000
CVE-2024-34646,0,0,82e7c60c64a3d6d703a9c5022f2ae80fb7cf092d075fe3b961a4a2a453e8a1ea,2024-09-04T13:05:36.067000
CVE-2024-34647,0,0,e317ed6496e4aa586bd11047d35b17feef7523f86ecd05c9da2f725afcae78f3,2024-09-04T13:05:36.067000
CVE-2024-34648,0,0,1e6dbbe77ed97622b756d3057162d26db67ca4ea112b590ffb36caf47d43295f,2024-09-04T13:05:36.067000
CVE-2024-34649,0,0,cb8c945b910593bb4442f9829c0aeb4b899de2f73eda03e4758d8aecda2a79cd,2024-09-04T13:05:36.067000
CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9c6,2024-05-17T02:39:57.623000
CVE-2024-34650,0,1,0bea05dfb800e065e239837393fd426986271bdca74d1d554e7707545e631960,2024-09-04T13:05:36.067000
CVE-2024-34651,0,1,4b29c983209fc312cb62ffd70012cb09e72c5e6d69abdd40f27d469d56f429f3,2024-09-04T13:05:36.067000
CVE-2024-34652,0,1,030d7fbafcab024f4f738079100dd15a72be63cfa630026ec72f58598e2aaa97,2024-09-04T13:05:36.067000
CVE-2024-34653,0,1,c3a7e954eae03c5034f7310465d52a6d651a7628b08f94570c9641d6a004f62f,2024-09-04T13:05:36.067000
CVE-2024-34654,0,1,1d61292010af329608ba714089b18097d9f4fab29ea3188e580a21180dff7fc9,2024-09-04T13:05:36.067000
CVE-2024-34655,0,1,2b9a720979634d406c7a6ab85768813b9644c17199100988da7cc12ecbddf162,2024-09-04T13:05:36.067000
CVE-2024-34656,0,1,4b5097936519572ad489ac32cb14e42c878e2a5293e1ee1278fd186194deceef,2024-09-04T13:05:36.067000
CVE-2024-34657,0,1,4bf0cfca4cb44c3261f66fcee7effbc520f0fd79be1676d2248fb8552205c9fc,2024-09-04T13:05:36.067000
CVE-2024-34658,0,1,f8066fb76a7ee7e5d439447a63e82a20df1b61f3242fe15647d0703b817399d9,2024-09-04T13:05:36.067000
CVE-2024-34659,0,1,c06e28926cfab31203ba6c123f00a847c6d2d461706e3df72227249c9b92d15d,2024-09-04T13:05:36.067000
CVE-2024-34650,0,0,0bea05dfb800e065e239837393fd426986271bdca74d1d554e7707545e631960,2024-09-04T13:05:36.067000
CVE-2024-34651,0,0,4b29c983209fc312cb62ffd70012cb09e72c5e6d69abdd40f27d469d56f429f3,2024-09-04T13:05:36.067000
CVE-2024-34652,0,0,030d7fbafcab024f4f738079100dd15a72be63cfa630026ec72f58598e2aaa97,2024-09-04T13:05:36.067000
CVE-2024-34653,0,0,c3a7e954eae03c5034f7310465d52a6d651a7628b08f94570c9641d6a004f62f,2024-09-04T13:05:36.067000
CVE-2024-34654,0,0,1d61292010af329608ba714089b18097d9f4fab29ea3188e580a21180dff7fc9,2024-09-04T13:05:36.067000
CVE-2024-34655,0,0,2b9a720979634d406c7a6ab85768813b9644c17199100988da7cc12ecbddf162,2024-09-04T13:05:36.067000
CVE-2024-34656,0,0,4b5097936519572ad489ac32cb14e42c878e2a5293e1ee1278fd186194deceef,2024-09-04T13:05:36.067000
CVE-2024-34657,0,0,4bf0cfca4cb44c3261f66fcee7effbc520f0fd79be1676d2248fb8552205c9fc,2024-09-04T13:05:36.067000
CVE-2024-34658,0,0,f8066fb76a7ee7e5d439447a63e82a20df1b61f3242fe15647d0703b817399d9,2024-09-04T13:05:36.067000
CVE-2024-34659,0,0,c06e28926cfab31203ba6c123f00a847c6d2d461706e3df72227249c9b92d15d,2024-09-04T13:05:36.067000
CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000
CVE-2024-34660,0,1,742e0d571b8a3d193f608a4833ac2251231e922fbd5e8e87397da3b1e5e017cb,2024-09-04T13:05:36.067000
CVE-2024-34661,0,1,86fb073227a0dd613057f3719ad39bcd8598c9a473c97cebd24947114c578627,2024-09-04T13:05:36.067000
CVE-2024-34660,0,0,742e0d571b8a3d193f608a4833ac2251231e922fbd5e8e87397da3b1e5e017cb,2024-09-04T13:05:36.067000
CVE-2024-34661,0,0,86fb073227a0dd613057f3719ad39bcd8598c9a473c97cebd24947114c578627,2024-09-04T13:05:36.067000
CVE-2024-3467,0,0,f97f520f5797999559b92a7c0577ac536f47706a8739d6dd391d5611a09166cd,2024-06-13T18:36:09.010000
CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000
CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000
@ -254843,7 +254843,7 @@ CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbac
CVE-2024-37133,0,0,00b1139f9174975ec5c3de34a64ed678ba7d69bbdd2f853dfe982f25e03c56e7,2024-07-03T18:01:19.487000
CVE-2024-37134,0,0,8ed9324b0e419d00f56c9177e18aa3c394712dc2a31ec456c168c8f73d2e83d7,2024-07-03T18:01:30.463000
CVE-2024-37135,0,0,1825f0bbd6a3644a5defcb06610c875a4d62a2c01b0edfc19cfb2bb9d9e24173,2024-08-01T12:42:36.933000
CVE-2024-37136,0,0,354b687906675efcee68cbf6a8f4d71e15af60bae9ebcdef0260d19ee8c861fb,2024-09-03T12:59:02.453000
CVE-2024-37136,0,1,6830bce2f72d2daf2ecb46a699466f4d0c58dc1c8dfcfb769d983f90ee324f83,2024-09-04T14:59:32.320000
CVE-2024-37137,0,0,015bdbe57b75c18c5c9568a3702d89c1497d9ae0c088b4ae375896212249bae1,2024-06-28T10:27:00.920000
CVE-2024-37138,0,0,0a1a2faf5915443beb4b9b146b70944e6a09572b5304f90b5e8531aa017e41a8,2024-06-26T12:44:29.693000
CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12acf,2024-06-26T12:44:29.693000
@ -256000,7 +256000,7 @@ CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045f
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38858,0,0,2f858b37341b9cd82cec2df6dc84acb547b815109da6bbf39427e4186c1a6ff3,2024-09-03T12:59:02.453000
CVE-2024-38858,0,1,c2e046d5d75320cc690e509cc93285ebeb3c1c26a8f79c6f003385d5db961fad,2024-09-04T14:39:10.203000
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
CVE-2024-3886,0,0,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
@ -256648,7 +256648,7 @@ CVE-2024-39918,0,0,a01d13ae0b603735ac5bf07d7a2e68692283e08ddeecd7e6f7dcec848231b
CVE-2024-39919,0,0,ef22e6bc228ea2cf3764fb5e5dab9f5aabfb0f60858f62004efb01879ab42cf0,2024-07-16T13:43:58.773000
CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe7336d,2024-08-07T19:08:22.713000
CVE-2024-39920,0,0,6bef49e28b0964791fd5773db4da2a4c4749e9b59fc7a5ce56343d0a0b5eb623,2024-08-05T19:35:13.550000
CVE-2024-39921,0,1,6d51ec02a9a494d84e38366d7cb1930e8bea139baba2f827955126486e443542,2024-09-04T13:05:36.067000
CVE-2024-39921,0,0,6d51ec02a9a494d84e38366d7cb1930e8bea139baba2f827955126486e443542,2024-09-04T13:05:36.067000
CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae3450561de,2024-08-13T12:58:25.437000
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
@ -257105,7 +257105,7 @@ CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b
CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181c4a,2024-07-16T13:43:58.773000
CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
CVE-2024-41011,0,1,b0207a6a6873053056b21e09a5f963f63c6f04f19391bdd4b4864f31eea2a935,2024-09-04T12:15:04.280000
CVE-2024-41011,0,0,b0207a6a6873053056b21e09a5f963f63c6f04f19391bdd4b4864f31eea2a935,2024-09-04T12:15:04.280000
CVE-2024-41012,0,0,100aa94909001769d833a9407cf1a1d29626a5b74fec5cc1935ff6c4fd015723,2024-07-29T07:15:05.083000
CVE-2024-41013,0,0,e60bba3e408ef7ae0e4e783aa0f35051774aa2a8d236b750438ef4fbd7846f74,2024-07-29T14:12:08.783000
CVE-2024-41014,0,0,705963fa55cb8c9deb35bac026b5f0f3c8c6d9abda445da5a02c7d95e767c33f,2024-07-29T14:12:08.783000
@ -257198,7 +257198,7 @@ CVE-2024-41094,0,0,fd3c100ca3cf33e414c8572772cb645c4163d4d9a6ad8085d9e85c0721dd0
CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000
CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000
CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000
CVE-2024-41098,0,1,237dbea03703cdca512eadfee5b46e503b7d4deeacfff8f1388ee9743f950b5e,2024-09-04T12:15:04.447000
CVE-2024-41098,0,0,237dbea03703cdca512eadfee5b46e503b7d4deeacfff8f1388ee9743f950b5e,2024-09-04T12:15:04.447000
CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000
CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000
CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000
@ -257238,7 +257238,7 @@ CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994
CVE-2024-41150,0,0,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000
CVE-2024-41157,0,0,a94bacd0f1c84873ca8cc979b40a340e47641af6ca2054dc073610b1d6453c3e,2024-09-03T12:59:02.453000
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
CVE-2024-41160,0,1,c0920d41376b4b993499c5c93e0a74a0acac6253f6f64c5dc59a1e46c1bca107,2024-09-04T12:00:59.630000
CVE-2024-41160,0,0,c0920d41376b4b993499c5c93e0a74a0acac6253f6f64c5dc59a1e46c1bca107,2024-09-04T12:00:59.630000
CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413824,2024-08-20T17:09:50.647000
CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000
CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000
@ -257309,7 +257309,7 @@ CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
CVE-2024-41345,0,0,ebfe2de1698c778225ce129d764399fd9c8e2701cd9f886e923d11bdfb8b2cb1,2024-08-30T13:00:05.390000
CVE-2024-41345,0,1,ad86d7e7395244aeefb4513ee22ed35e62fdc5af64583f081b4b5d8d7fb51f54,2024-09-04T14:17:57.747000
CVE-2024-41346,0,0,42661e5058004473797db6f1d9dbf113bd8033baec39d03e654b0a8142c6b669,2024-08-30T14:35:04.550000
CVE-2024-41347,0,0,89a9504ea9ee2a5c8ecde7062a87dadb645c768c7135b7d1367bd472cc86fc01,2024-08-30T14:35:05.457000
CVE-2024-41348,0,0,50ed5721bc7d3535ca5c903d1069021e321cb28c79b83af6694b32cbc2906455,2024-08-30T14:35:06.393000
@ -257345,8 +257345,8 @@ CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb2
CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000
CVE-2024-4143,0,0,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000
CVE-2024-41432,0,0,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000
CVE-2024-41433,0,1,101df7fcd12dc7cf9b6ee0a3247a1faf86fdd07c6c084f9f41abfa56626da6f3,2024-09-04T13:05:36.067000
CVE-2024-41434,0,1,e363fe2bed7444bdb2de9c8885c651dbbb0e16373bba11f9e9cb4b809e591bef,2024-09-04T13:05:36.067000
CVE-2024-41433,0,0,101df7fcd12dc7cf9b6ee0a3247a1faf86fdd07c6c084f9f41abfa56626da6f3,2024-09-04T13:05:36.067000
CVE-2024-41434,0,0,e363fe2bed7444bdb2de9c8885c651dbbb0e16373bba11f9e9cb4b809e591bef,2024-09-04T13:05:36.067000
CVE-2024-41435,0,0,fc6deb86b1015db3578929804d6979e1f1c7393ef59e7b78e9c471d919ca2b09,2024-09-03T21:35:10.947000
CVE-2024-41436,0,0,462819a65c0ca030d06775c8a58b44143e4b4b01d45eae43f44a397a6cfa1d54,2024-09-03T20:35:15.853000
CVE-2024-41437,0,0,fef9bc933390244a77d828781007c83a4899c964ddf0b6340d9dcc001af583ec,2024-08-23T02:07:29.513000
@ -257478,7 +257478,7 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
CVE-2024-41716,0,1,54bddb7387420b087deb55d437adf686fe9c70e1499656ad96e7b31226164aac,2024-09-04T13:05:36.067000
CVE-2024-41716,0,0,54bddb7387420b087deb55d437adf686fe9c70e1499656ad96e7b31226164aac,2024-09-04T13:05:36.067000
CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
@ -257597,7 +257597,7 @@ CVE-2024-41918,0,0,444713f57f29ae6ab3503ccd6ce1c7bde4d2698bbfadab74cd1692649dedb
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
CVE-2024-41927,0,1,3f14dee01fa3694f7158b974636fe5732c1b814a7e4bf1d4bb902d85a63f55ab,2024-09-04T13:05:36.067000
CVE-2024-41927,0,0,3f14dee01fa3694f7158b974636fe5732c1b814a7e4bf1d4bb902d85a63f55ab,2024-09-04T13:05:36.067000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000
CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000
@ -257663,7 +257663,7 @@ CVE-2024-42035,0,0,6b8dfff574bfd16549a63efaa6a6ef8c6312b08584556c837fd0226045be6
CVE-2024-42036,0,0,9fa3f6bbe36cdb97c5a73a0d11595979b8342bbc24fd98d5ed835c13ac0fc904,2024-08-08T13:04:18.753000
CVE-2024-42037,0,0,296bbbcc38bf4dc1ee22bb6312f79d292e4b7d911256417ad66b6bb658d995e3,2024-08-08T13:04:18.753000
CVE-2024-42038,0,0,eb94dedf88ce1c88ce5bfbc4f90e50df94d98b05443b426e18ed40ec47c0c549,2024-08-08T13:04:18.753000
CVE-2024-42039,0,1,d107a7a3f9aaf8f70090b8441bfdceafa6164f586e18d681e51f92b592dd0dd6,2024-09-04T13:05:36.067000
CVE-2024-42039,0,0,d107a7a3f9aaf8f70090b8441bfdceafa6164f586e18d681e51f92b592dd0dd6,2024-09-04T13:05:36.067000
CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000
CVE-2024-42040,0,0,7c75367ff650806d23d160b17618dc17ae59219f450da0367a1d490a5a6ad6d0,2024-08-23T16:18:28.547000
CVE-2024-42049,0,0,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000
@ -257809,7 +257809,7 @@ CVE-2024-42224,0,0,be03c0669f567c4c43069feb6297d1d0b39887abc231ab7cb6117aeb87386
CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000
CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13993,2024-08-12T13:38:33.853000
CVE-2024-42227,0,0,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000
CVE-2024-42228,0,1,0ae392214e4cd38d69b9c0524e1f98193a3bc48ffe7d83b9db409a124ec5bb0e,2024-09-04T12:15:04.577000
CVE-2024-42228,0,0,0ae392214e4cd38d69b9c0524e1f98193a3bc48ffe7d83b9db409a124ec5bb0e,2024-09-04T12:15:04.577000
CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d3a6,2024-07-30T19:46:56.943000
CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000
CVE-2024-42230,0,0,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
@ -257901,7 +257901,7 @@ CVE-2024-42310,0,0,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25c
CVE-2024-42311,0,0,eb71587cbf92c585852c3f2bf1b53b5b14ac311404c1605c56f92f75f9539278,2024-09-03T17:38:24.210000
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
CVE-2024-42313,0,0,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
CVE-2024-42314,0,1,314d452fe762aab5e2ef3c4f7ab19f27341f2a9fa533616441dcdf17b55d642a,2024-09-04T12:15:04.723000
CVE-2024-42314,0,0,314d452fe762aab5e2ef3c4f7ab19f27341f2a9fa533616441dcdf17b55d642a,2024-09-04T12:15:04.723000
CVE-2024-42315,0,0,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
CVE-2024-42316,0,0,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a573,2024-08-19T12:59:59.177000
@ -258546,11 +258546,11 @@ CVE-2024-4374,0,0,3d209a7da2a70008bba3efc6941e41bec948a9636ca11ef89a139bc0159118
CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b39a,2024-07-05T13:30:13.850000
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
CVE-2024-43772,0,1,7297107a23dc16d1d705abb3658b9be9738cd3c6f64b998fe580ef95204d1bb8,2024-09-04T12:11:13.073000
CVE-2024-43773,0,1,8c0c6d6cc6b93c34cfa09ef3705fb324f136fe885f1952674b354433c7d54205,2024-09-04T12:26:08.270000
CVE-2024-43774,0,1,8a1a7395e0266f26fabce42b3d201bdd365872f3bb986b16a4813718545afbb5,2024-09-04T12:26:42.387000
CVE-2024-43775,0,1,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0dc22,2024-09-04T12:27:22.670000
CVE-2024-43776,0,1,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000
CVE-2024-43772,0,0,7297107a23dc16d1d705abb3658b9be9738cd3c6f64b998fe580ef95204d1bb8,2024-09-04T12:11:13.073000
CVE-2024-43773,0,0,8c0c6d6cc6b93c34cfa09ef3705fb324f136fe885f1952674b354433c7d54205,2024-09-04T12:26:08.270000
CVE-2024-43774,0,0,8a1a7395e0266f26fabce42b3d201bdd365872f3bb986b16a4813718545afbb5,2024-09-04T12:26:42.387000
CVE-2024-43775,0,0,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0dc22,2024-09-04T12:27:22.670000
CVE-2024-43776,0,0,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000
CVE-2024-43782,0,0,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d808,2024-08-23T16:18:28.547000
@ -258619,7 +258619,7 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec
CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000
CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
CVE-2024-43853,0,1,3a6c96c14ae012eaed5b1ef682d62a9cbd9b79ece1f1039255ad0f2a7b3d5c29,2024-09-04T12:15:04.827000
CVE-2024-43853,0,0,3a6c96c14ae012eaed5b1ef682d62a9cbd9b79ece1f1039255ad0f2a7b3d5c29,2024-09-04T12:15:04.827000
CVE-2024-43854,0,0,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000
CVE-2024-43855,0,0,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
CVE-2024-43856,0,0,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
@ -258653,7 +258653,7 @@ CVE-2024-43880,0,0,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d
CVE-2024-43881,0,0,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000
CVE-2024-43882,0,0,3803376d9d9ae5da1816a09b7e0a9b8193c25debe96b7f6f5c22536f8966aeab,2024-09-03T13:25:39.747000
CVE-2024-43883,0,0,91d9dc24243e1eb7439b854fe03a12be52a8a2651dc7ad627233ff467dccabae,2024-08-23T16:18:28.547000
CVE-2024-43884,0,1,8855d9ae2c31e31bcdb4b964e2ea59c1af3388d7a4ae33aa27b44c6e1351565b,2024-09-04T12:15:04.927000
CVE-2024-43884,0,0,8855d9ae2c31e31bcdb4b964e2ea59c1af3388d7a4ae33aa27b44c6e1351565b,2024-09-04T12:15:04.927000
CVE-2024-43885,0,0,11114407819a3f9e00d8d9cb1392c069e87eaa286d3f0b384cc6ce2d553b62cd,2024-08-27T14:37:37.887000
CVE-2024-43886,0,0,e1250be1137132d32f51f141081958e76d96de370d77286a8411bf00a519b833,2024-08-27T14:37:45.377000
CVE-2024-43887,0,0,376d550e40434349f0ec085b772876fe107bf2fe9c2438232db402487dd1f398,2024-08-26T12:47:20.187000
@ -258661,7 +258661,7 @@ CVE-2024-43888,0,0,e54f63212ceaa42960fe94aef21d508a624b7b901f30a84146e78625f3a09
CVE-2024-43889,0,0,5465d7ffa5fc173afac72302c5033ac280f7187ac42839effc5a469d05fb8493,2024-08-27T14:38:09.340000
CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000
CVE-2024-43890,0,0,4f712d05ce91a4751f64280bf4157d384fca158e731343a0c38233f08c451c0c,2024-08-26T12:47:20.187000
CVE-2024-43891,0,1,4ef44ee5af8e139ccdf34375791750ab6c7298629aa1445de91887e9d89cc011,2024-09-04T12:15:05.050000
CVE-2024-43891,0,0,4ef44ee5af8e139ccdf34375791750ab6c7298629aa1445de91887e9d89cc011,2024-09-04T12:15:05.050000
CVE-2024-43892,0,0,deb8528aa31e26463fac79d269b1f10d2a832a9d2bc865cbcc002e5906dfe3d4,2024-08-26T12:47:20.187000
CVE-2024-43893,0,0,43d0e9d62118f7a5f6c9bfc09f584d8b53fd652e6e40996287fc9d1d1f10383c,2024-08-26T12:47:20.187000
CVE-2024-43894,0,0,7a0da327bf71c13dadb4c3586216ee65cc1ccf79c9e17e8e4e11aa7af72ebd02,2024-08-26T12:47:20.187000
@ -258692,8 +258692,8 @@ CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c5969
CVE-2024-43917,0,0,763320422d1f5f6b627e67997133b73d2d81c353f19b439bce5f72673e32a57d,2024-08-30T13:00:05.390000
CVE-2024-43918,0,0,6f6745b88f3678813198257c945602dc7ab029c467f62ff1519da2102b72bdb4,2024-08-30T13:00:05.390000
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
CVE-2024-43920,0,0,a695b54b1880d4ad16b5fca3a028d8998ad113b1206f302d672996fdee5a3625,2024-08-30T13:00:05.390000
CVE-2024-43921,0,0,4ac16237b70ac91152081ef9ca629f09fcd83b198259a5ccaf7180a65dd90db1,2024-08-30T13:00:05.390000
CVE-2024-43920,0,1,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000
CVE-2024-43921,0,1,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000
CVE-2024-43922,0,0,4db0f3ea885d72565e9f11bea2f1b6d243fb7f7791c6b176e0c5482e9efab43f,2024-08-30T13:00:05.390000
CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
@ -258703,12 +258703,12 @@ CVE-2024-43935,0,0,507740bb6b2ff7008debdb7eb0a31d10ff2310284bc85a28c8516e97f01a5
CVE-2024-43936,0,0,13ff2ee8ac37d656ed3cfb9bac7c332b5831e52f7ec68739f3804a7d224b4b07,2024-09-03T15:20:22.557000
CVE-2024-43939,0,0,d426ea6c624de2aac782301aee13dd37ea340c14d42e40cc8485be204e0f41b4,2024-08-30T16:29:15.177000
CVE-2024-43940,0,0,1c00f3798e1667265ee707181635deee289bf65cd84317a4bdc295f8b6b4065a,2024-08-30T16:27:22.270000
CVE-2024-43941,0,1,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2eb1,2024-09-04T13:40:41.620000
CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2eb1,2024-09-04T13:40:41.620000
CVE-2024-43942,0,0,e407f19e5fd9829011f6787f9c7691b398ead09a08db45a3953ea472df2a562a,2024-08-30T13:00:05.390000
CVE-2024-43943,0,0,3e393391698d09fd81d5d7be23db1feaee575a46747a1104ac77289691928f07,2024-08-30T13:00:05.390000
CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000
CVE-2024-43946,0,0,f240acba317febcf1e96ae7507bd3580d8fecd1103a0412511da00f09d6e888f,2024-09-03T15:21:07.167000
CVE-2024-43947,0,0,edb3b36ddc37170b66cbc416c5321e1a097a5eee8071b3a104c96d4792d08460,2024-08-30T13:00:05.390000
CVE-2024-43947,0,1,00adf93b652a6a1fea9f57602f2aa8edc17efc755f7abf02b222226d3eb2a44e,2024-09-04T14:16:00.423000
CVE-2024-43948,0,0,f60ff73d80da3808d8af4258622a438dd588d368d767678c8fd4008f71ea0306,2024-09-03T15:22:20.567000
CVE-2024-43949,0,0,cc0b0ff1d506bbeb4d87dfd06e13cfce58f6eea6e88f017130cb84c36a4aa029,2024-09-03T15:27:40.883000
CVE-2024-4395,0,0,7eb8bb55518c25270e2cdb5da345e646a2437fce6bdd0ba1dda9f1e27539a52c,2024-07-03T02:07:30.800000
@ -258732,7 +258732,7 @@ CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd
CVE-2024-43986,0,0,8c6098ff4ca468ef6cb988aff8c48a1d885b4130f177878606668301c5eb4e22,2024-08-29T13:25:27.537000
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000
CVE-2024-4401,0,0,2ed184a8338a261d4b70ca8ae7248d5bf67aa2a87f738c5fae28a2a86cef6ed1,2024-08-30T13:00:05.390000
CVE-2024-4401,0,1,48f8e641129f81284635fb93c6fe88c5c5fc547b585fa75e650b46a3bc3c0b8f,2024-09-04T14:33:01.807000
CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000
CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000
CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000
@ -258773,13 +258773,13 @@ CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da6
CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000
CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000
CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000
CVE-2024-44383,1,1,0e4c0a933324471489b05de56efdd1ab47a8a919aedcb555f3f0d2f3980a0c77,2024-09-04T13:15:06.753000
CVE-2024-44383,0,1,4fa3d65f6a22a0c7636c303e4a657228e678f88a58663cfa9769b9f1f820b976,2024-09-04T14:35:11.040000
CVE-2024-44386,0,0,22e44353838544d5af3c6c1b599355e6c28d0abe3355a29bf08b92b0bac131e5,2024-08-23T19:35:18.987000
CVE-2024-44387,0,0,f40bbfc4dd5c4303dcc7ceb337218443a73c6de292a9dc96408915cc8c9cbcd7,2024-08-27T14:48:04.820000
CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000
CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000
CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000
CVE-2024-44400,1,1,914b3c1b3298917eae703ff014186a6e4b69786b90cfc763b0a46689db401979,2024-09-04T13:15:06.867000
CVE-2024-44400,0,1,a3cf29eaa71c7eed8d8437fbab7987e3337a37a187d9355824af05bd8699bdd5,2024-09-04T14:35:11.890000
CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
@ -258842,9 +258842,11 @@ CVE-2024-44795,0,0,f9348c862b893d90addc6562eec87c7c0ce5090e93e9e7ffbd3fc77a1c96e
CVE-2024-44796,0,0,ea2f83fd317230dba37a019c6df79333d03496931fcac69fc846f82ae10f3010,2024-08-27T13:02:05.683000
CVE-2024-44797,0,0,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
CVE-2024-44809,0,1,9673c7561e1a526cf33339de5233996cc4cc5ffdd8e4fc82a41f12474f889589,2024-09-04T13:05:36.067000
CVE-2024-44809,0,1,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
CVE-2024-44819,1,1,b137d926b83d6c06a0a9e7d334c07df7336905273b641d869b8d2a97cd44139a,2024-09-04T15:15:13.910000
CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000
CVE-2024-44820,1,1,520d3ea14f434131bf62a0d2f92f31856292b4371d1227bf6b7336185616a154,2024-09-04T15:15:13.997000
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
@ -258861,10 +258863,10 @@ CVE-2024-44916,0,0,268f2c861c0c259cfc6a8f5831922421cd3f20b464855cae3b767189bdeba
CVE-2024-44918,0,0,3a0c5f40de5f64cdd7c350975f1e36ef79f8fc6234af40bbc8a6ef2e7aab0507,2024-09-03T12:59:02.453000
CVE-2024-44919,0,0,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
CVE-2024-44920,0,0,84638f3c3ee39bcd12288ad180ed29f9fae2d4198dab0d886510f94c084ef06d,2024-09-03T16:35:07.800000
CVE-2024-44921,0,0,06f254602a1eef462ffbe3a380ba0f268b83e51110a6f26504911783cb01b895,2024-09-03T17:35:01.983000
CVE-2024-44920,0,1,12f1b6eb8fb8d99f08a0b224eeeb570d2ee08178391a3e25e8980965db9b7928,2024-09-04T14:59:58.250000
CVE-2024-44921,0,1,b581e2c2532137589de006c20122d6cbe14e56f4b907946bd0416f760b5174f5,2024-09-04T15:00:15.103000
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
CVE-2024-44930,0,1,ccfe4178f37ca11e98870ca68b3d0fae67b251b0a1299929ef5cddd35da08fc4,2024-09-04T12:59:00.510000
CVE-2024-44930,0,0,ccfe4178f37ca11e98870ca68b3d0fae67b251b0a1299929ef5cddd35da08fc4,2024-09-04T12:59:00.510000
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
CVE-2024-44932,0,0,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000
CVE-2024-44933,0,0,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000
@ -258881,8 +258883,8 @@ CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c43
CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000
CVE-2024-44944,0,0,9d04637232a0ef520df300c879d5cc54bad658bb5749e19928008538f4b841f0,2024-09-03T14:49:19.227000
CVE-2024-44945,0,0,a3745a898858327b7fbd2ec8b66c922f7135590f07273b0fe5d696fead01dfa7,2024-09-03T12:59:02.453000
CVE-2024-44946,0,1,baba486800f48daca091ce86b0b3099b94d8fc83c17e121f4572ead5091851fa,2024-09-04T12:15:05.150000
CVE-2024-44947,0,1,8e7576eeaecebace9aa0ff7eb570fdf62eb9d08c76ce62f6b739027bbd7f2e78,2024-09-04T12:15:05.240000
CVE-2024-44946,0,0,baba486800f48daca091ce86b0b3099b94d8fc83c17e121f4572ead5091851fa,2024-09-04T12:15:05.150000
CVE-2024-44947,0,0,8e7576eeaecebace9aa0ff7eb570fdf62eb9d08c76ce62f6b739027bbd7f2e78,2024-09-04T12:15:05.240000
CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000
@ -258927,7 +258929,7 @@ CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0
CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
CVE-2024-45180,0,1,972956c14c3744d5d70c795422903443a3c866a60353a62faa079ebc718a4b11,2024-09-04T13:05:36.067000
CVE-2024-45180,0,0,972956c14c3744d5d70c795422903443a3c866a60353a62faa079ebc718a4b11,2024-09-04T13:05:36.067000
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000
@ -258936,7 +258938,7 @@ CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943
CVE-2024-45191,0,0,8410bc983e36e5828d4c81d5e10811b72eb1342d768b1b1249b7ba20875ec3a3,2024-09-01T22:15:13.697000
CVE-2024-45192,0,0,5da4aeb150ce1f250e3c04f3741f974ba0c69f3ea24005aed7598a0020d8fabe,2024-09-01T22:15:13.880000
CVE-2024-45193,0,0,1554745324792bf9e818f523be327d3eb138b0a7e9f93b1f1c9abf081b45aade,2024-09-01T22:15:13.943000
CVE-2024-45195,0,1,95907c73b5510b864422388cc99943bd86b2dcf627d10d8651e99fe7186587bb,2024-09-04T13:05:36.067000
CVE-2024-45195,0,0,95907c73b5510b864422388cc99943bd86b2dcf627d10d8651e99fe7186587bb,2024-09-04T13:05:36.067000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
@ -258987,11 +258989,11 @@ CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d17235
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000
CVE-2024-45388,0,0,87aadeebbefbe550f2f2d99c25976fcd0d0df9773b7c9434898bbe4baee7a94d,2024-09-03T12:59:02.453000
CVE-2024-45389,0,1,9f0fa9283a2a5f874fd0dba70c8232c3ec84e221a6ccb67b23537b0164ce9e0f,2024-09-04T13:05:36.067000
CVE-2024-45389,0,0,9f0fa9283a2a5f874fd0dba70c8232c3ec84e221a6ccb67b23537b0164ce9e0f,2024-09-04T13:05:36.067000
CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000
CVE-2024-45390,0,1,332342778ea7f712e3a75a5f422837c59f0b8fc1cd3d7840f34f23531141c0dc,2024-09-04T13:05:36.067000
CVE-2024-45391,0,1,9c5789b02ec0149b6dd4c299f7c2076a4f5ab5f425e6ba50511de158538b434d,2024-09-04T13:05:36.067000
CVE-2024-45394,0,1,2ba0026e07469dbf430ebd158b45587c8559adbe0d6d259ad77063b3124f324c,2024-09-04T13:05:36.067000
CVE-2024-45390,0,0,332342778ea7f712e3a75a5f422837c59f0b8fc1cd3d7840f34f23531141c0dc,2024-09-04T13:05:36.067000
CVE-2024-45391,0,0,9c5789b02ec0149b6dd4c299f7c2076a4f5ab5f425e6ba50511de158538b434d,2024-09-04T13:05:36.067000
CVE-2024-45394,0,0,2ba0026e07469dbf430ebd158b45587c8559adbe0d6d259ad77063b3124f324c,2024-09-04T13:05:36.067000
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
@ -259000,26 +259002,27 @@ CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797
CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000
CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000
CVE-2024-45440,0,0,9239656ddb6aeda0c2c6efeace5c8dd620d5a27bf71f1e1bdb521249d601edd3,2024-09-03T18:15:08.967000
CVE-2024-45441,0,1,cc95800eacd4a409644c50c2e99659b2320195778e3ff42b199a8b4fa829f44f,2024-09-04T13:05:36.067000
CVE-2024-45442,0,1,2c6961d1d58c78433d275cad97385307540e57f4ac06bb8459d4fa71156da060,2024-09-04T13:05:36.067000
CVE-2024-45443,0,1,64b48e6b4d508a3b47619ce678b599d805684e6ff3e89d76ed0e3b781c25f26f,2024-09-04T13:05:36.067000
CVE-2024-45444,0,1,ef3fa86cf436bc05fb593eb3b64f445671c6a08f43279b01c469756c07bf65fe,2024-09-04T13:05:36.067000
CVE-2024-45445,0,1,c519a5238007f18fa29c55aa82335d5ab926c8bdb649113d8e002a4e54c6f777,2024-09-04T13:05:36.067000
CVE-2024-45446,0,1,8eeeac4c0f558dd1ae996c12e7f896e6c8c39087a3aee9dc30eaec10b0f5f7e5,2024-09-04T13:05:36.067000
CVE-2024-45447,0,1,e42099412998fdb6eb1847c3692348897eb18af9a010eac106f09831cb60c645,2024-09-04T13:05:36.067000
CVE-2024-45448,0,1,a03bcda0dbaa0fba892faf51db889c52eae6fa5919c1e27c6680cadfc8e8fd81,2024-09-04T13:05:36.067000
CVE-2024-45449,0,1,ca75a5fec52aea90cbaac2cb16d5730874e6238683b38adee96cd2d054441131,2024-09-04T13:05:36.067000
CVE-2024-45441,0,0,cc95800eacd4a409644c50c2e99659b2320195778e3ff42b199a8b4fa829f44f,2024-09-04T13:05:36.067000
CVE-2024-45442,0,0,2c6961d1d58c78433d275cad97385307540e57f4ac06bb8459d4fa71156da060,2024-09-04T13:05:36.067000
CVE-2024-45443,0,0,64b48e6b4d508a3b47619ce678b599d805684e6ff3e89d76ed0e3b781c25f26f,2024-09-04T13:05:36.067000
CVE-2024-45444,0,0,ef3fa86cf436bc05fb593eb3b64f445671c6a08f43279b01c469756c07bf65fe,2024-09-04T13:05:36.067000
CVE-2024-45445,0,0,c519a5238007f18fa29c55aa82335d5ab926c8bdb649113d8e002a4e54c6f777,2024-09-04T13:05:36.067000
CVE-2024-45446,0,0,8eeeac4c0f558dd1ae996c12e7f896e6c8c39087a3aee9dc30eaec10b0f5f7e5,2024-09-04T13:05:36.067000
CVE-2024-45447,0,0,e42099412998fdb6eb1847c3692348897eb18af9a010eac106f09831cb60c645,2024-09-04T13:05:36.067000
CVE-2024-45448,0,0,a03bcda0dbaa0fba892faf51db889c52eae6fa5919c1e27c6680cadfc8e8fd81,2024-09-04T13:05:36.067000
CVE-2024-45449,0,0,ca75a5fec52aea90cbaac2cb16d5730874e6238683b38adee96cd2d054441131,2024-09-04T13:05:36.067000
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
CVE-2024-45450,0,1,c06e5e6343abf6ab1ba08a36cd39179f5f795e20e409c99cf975d7573fa7a254,2024-09-04T13:05:36.067000
CVE-2024-45450,0,0,c06e5e6343abf6ab1ba08a36cd39179f5f795e20e409c99cf975d7573fa7a254,2024-09-04T13:05:36.067000
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000
CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000
CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000
CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde15796,2024-07-03T02:07:44.057000
CVE-2024-45490,0,0,540514ff834e3c0b6fe4ca0c9a351c7af66437b260e35f3424d90136724978ba,2024-08-30T19:35:07.050000
CVE-2024-45491,0,0,d50817a58309934ce1e6c9f069c18968451a3af67ad0b3f9c4ed58ff8571c85d,2024-08-30T14:35:09.057000
CVE-2024-45492,0,0,cab4c5ca84baf34dea16b84281c2356a238ac9571c230c2d937a4646809be15a,2024-08-30T14:35:09.790000
CVE-2024-45507,0,1,53235a21c0265f708b91a2bd9d4a8efebb8123e94e227e9ac629270d6ef80e02,2024-09-04T13:05:36.067000
CVE-2024-45490,0,1,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000
CVE-2024-45491,0,1,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000
CVE-2024-45492,0,1,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000
CVE-2024-45506,1,1,8184def11cdbcc102d96bd317c1ae8c01d258f33a1320434eb4310aaadd39589,2024-09-04T15:15:14.080000
CVE-2024-45507,0,0,53235a21c0265f708b91a2bd9d4a8efebb8123e94e227e9ac629270d6ef80e02,2024-09-04T13:05:36.067000
CVE-2024-45508,0,0,ede56f3905b1dcc10c04b3d644571c8107eb04ace8141ef25c182c6bbe150155,2024-09-03T15:35:11.293000
CVE-2024-45509,0,0,7ae0701701e527eeb1a65d0426f01f3918ecf13457164c0117e7a52864e5dc08,2024-09-03T15:35:12.080000
CVE-2024-4551,0,0,5eadeaa2a7f21f0b3297f45277617c137a52e984170b931f9145e745d378c040,2024-06-17T12:42:04.623000
@ -259033,19 +259036,19 @@ CVE-2024-4555,0,0,2d6c47296afeedb2c6a7f60677f2d88681b96e578cfefc1913928dc16b7bb8
CVE-2024-4556,0,0,7d09fa247082252ffb6b7dda6aa600cf3ff3bf7dd0d9af7b07da29fff8c7a6fb,2024-08-28T12:57:17.117000
CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000
CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e147b,2024-07-30T02:15:08.293000
CVE-2024-45586,0,1,e206a9f9f52d6df31e8745674bc07b4799319b79462f9d7a84cd2e9a2bd105dc,2024-09-04T12:15:05.320000
CVE-2024-45587,0,1,0131eba1114d110e01e395a66f8c68816d231f10bed8e8f9e00161c4edaf0484,2024-09-04T12:15:05.530000
CVE-2024-45588,0,1,7fb04f846e0d14b9a2876b98b70ef6e3701ca14d55fb8c54290d798cd0a7dd22,2024-09-04T12:15:05.673000
CVE-2024-45586,0,0,e206a9f9f52d6df31e8745674bc07b4799319b79462f9d7a84cd2e9a2bd105dc,2024-09-04T12:15:05.320000
CVE-2024-45587,0,0,0131eba1114d110e01e395a66f8c68816d231f10bed8e8f9e00161c4edaf0484,2024-09-04T12:15:05.530000
CVE-2024-45588,0,0,7fb04f846e0d14b9a2876b98b70ef6e3701ca14d55fb8c54290d798cd0a7dd22,2024-09-04T12:15:05.673000
CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-45615,0,1,c29a2be6085b691318a4a4d498b3a267c0999f9f4f086bc9697b98e33fcab674,2024-09-04T13:05:36.067000
CVE-2024-45616,0,1,4a6e01bfc0dbf4591fc3341eb75c449087f9103efab35dbb8d45cbd25b3479d2,2024-09-04T13:05:36.067000
CVE-2024-45617,0,1,c1fb82fefc998d09ca71907f370f454f8642094b36f685a15fd3c9a89559f032,2024-09-04T13:05:36.067000
CVE-2024-45618,0,1,7d523333a35185b5c4d36162f8d68dc543d2276c8525a0184b3ca8d3dd0c4087,2024-09-04T13:05:36.067000
CVE-2024-45619,0,1,07c017cdbb9e8a145f5800a529b0549827885155cef05bbf2c66adc8b680a2e2,2024-09-04T13:05:36.067000
CVE-2024-45615,0,0,c29a2be6085b691318a4a4d498b3a267c0999f9f4f086bc9697b98e33fcab674,2024-09-04T13:05:36.067000
CVE-2024-45616,0,0,4a6e01bfc0dbf4591fc3341eb75c449087f9103efab35dbb8d45cbd25b3479d2,2024-09-04T13:05:36.067000
CVE-2024-45617,0,0,c1fb82fefc998d09ca71907f370f454f8642094b36f685a15fd3c9a89559f032,2024-09-04T13:05:36.067000
CVE-2024-45618,0,0,7d523333a35185b5c4d36162f8d68dc543d2276c8525a0184b3ca8d3dd0c4087,2024-09-04T13:05:36.067000
CVE-2024-45619,0,0,07c017cdbb9e8a145f5800a529b0549827885155cef05bbf2c66adc8b680a2e2,2024-09-04T13:05:36.067000
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
CVE-2024-45620,0,1,ba10e60a5c67c192a32c7c86f8253b80c1be7a9e07f1ae67f22581cd914e05e6,2024-09-04T13:05:36.067000
CVE-2024-45620,0,0,ba10e60a5c67c192a32c7c86f8253b80c1be7a9e07f1ae67f22581cd914e05e6,2024-09-04T13:05:36.067000
CVE-2024-45621,0,0,b1d8555717f8cc1664b959fa6eacae6272c01d212d833a21d986fc1607f3d4e8,2024-09-03T12:59:02.453000
CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000
@ -259054,7 +259057,7 @@ CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a9
CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
CVE-2024-45678,0,1,693ea2059e5782af88748cb6a47ab17c5e2b747f0badd3c534ee2c1a86fd5624,2024-09-04T13:05:36.067000
CVE-2024-45678,0,0,693ea2059e5782af88748cb6a47ab17c5e2b747f0badd3c534ee2c1a86fd5624,2024-09-04T13:05:36.067000
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000
@ -259110,7 +259113,7 @@ CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc9
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
CVE-2024-4629,0,1,62901fb4aa88c611b46556ea905fb77fb6c2c000fa9d191e58dad891e7d4ae65,2024-09-04T13:05:36.067000
CVE-2024-4629,0,0,62901fb4aa88c611b46556ea905fb77fb6c2c000fa9d191e58dad891e7d4ae65,2024-09-04T13:05:36.067000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000
@ -259454,7 +259457,7 @@ CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845
CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000
CVE-2024-5022,0,0,0ed043d616e9fb9347e4abec6b2a3f19c9cd15ea7715d52174611d64d6e50bde,2024-05-20T13:00:34.807000
CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000
CVE-2024-5024,0,0,ae4133b2dede2e4674bb925706d556d1f2e66905e29e2d3db9a09c8acda5e292,2024-08-30T13:00:05.390000
CVE-2024-5024,0,1,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76e5,2024-09-04T14:33:57.200000
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
@ -260300,7 +260303,7 @@ CVE-2024-6013,0,0,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2
CVE-2024-6014,0,0,6f9e64ff8fbf43e19b3d7e24c13ad8adc071c58e85b8bf9a829322ea55abcf8f,2024-07-19T14:18:17.607000
CVE-2024-6015,0,0,c2460029f18cca819988d11dbd49466b5328ee3d26de8c6ec6e0519debb7ea98,2024-07-19T14:13:10.463000
CVE-2024-6016,0,0,db11fa4e2db5dca1bf67cd82c1ae54777d6d6de86c83abed9806f80a5c1a5385,2024-07-19T14:02:04.600000
CVE-2024-6020,0,1,d391ab867af8b5c14e577aa2bf7fef429da389b36f06a7138bf30e2f045fed30,2024-09-04T13:05:36.067000
CVE-2024-6020,0,1,074b02a1424aae1978150f09e7d5889851f8afbaedf8d5213fe33ca18fe17c85,2024-09-04T15:35:25.307000
CVE-2024-6021,0,0,89bc3fbda68691de22c48372ad0a77a2b4849fdf02c26c23812a34a3700d835a,2024-08-01T14:00:08.097000
CVE-2024-6022,0,0,55d2fd1c662113ade487c32b8dfaf0e98bea6d5629f505bd14ff7aba829d2368,2024-08-02T19:46:23.360000
CVE-2024-6023,0,0,cd2c0e7b36e1e40887d2ed8be432339827f85cc697ccdbb3b794ffcc2d845549,2024-08-02T19:47:08.777000
@ -260478,7 +260481,7 @@ CVE-2024-6227,0,0,4dda552b45e491a3aea14a6a0cebc6297d597cc5b3fd65f2a3ad4f72b81980
CVE-2024-6229,0,0,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000
CVE-2024-6230,0,0,bf151baddd2ddda2ffc17d61da16c35249c79c364900f3698bb671ab91ccc431,2024-08-01T22:15:41.963000
CVE-2024-6231,0,0,17c4018e99632a925bda52d838c86b1f2075d6f0c7798f87d32fed09cbff22a1,2024-08-01T14:00:16.470000
CVE-2024-6232,0,0,629882aaeef7964aa911e1d69872df627112a97706741cebb586d7ff6d15bb41,2024-09-03T15:15:16.597000
CVE-2024-6232,0,1,b10849edb74155befde493514a5a3bc5e06301aa31027c6e698a48e536ccbb30,2024-09-04T15:01:04.183000
CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000
CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000
CVE-2024-6237,0,0,42d974b137e9f6fa213536980d088f395c1fe724ef5f0786bbfbf5436af83280,2024-08-29T18:15:14.947000
@ -260812,9 +260815,9 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
CVE-2024-6669,0,0,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000
CVE-2024-6670,0,0,c7aab235f5523c8cca855eac0187db93fcb9a02d74ddfe109f0b8410dd670d5d,2024-08-30T13:00:05.390000
CVE-2024-6671,0,0,b885ca7bc1aa2b73fde42f7ffc6bcebf037d1997b209727772d02de2abbeb61c,2024-08-30T13:00:05.390000
CVE-2024-6672,0,0,ee4e0f300056a093eb851ed0e23fc509fcabd94f369802fd235ad4106a6f365f,2024-08-30T13:00:05.390000
CVE-2024-6670,0,1,226bd66946aa27d22585c8fa0010802631c3a534f5b788695a6d24e231c7329f,2024-09-04T14:23:37.033000
CVE-2024-6671,0,1,0f334db29395e8161e019908d1c259201b627ca1c9d0cfd40be71a12cb877045,2024-09-04T15:53:07.733000
CVE-2024-6672,0,1,f03acb9d245a8919bddd732053bec54770cb0a4b96386add16d0f2ae9269f678,2024-09-04T14:23:58.403000
CVE-2024-6675,0,0,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
@ -260840,11 +260843,11 @@ CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b6
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
CVE-2024-6715,0,0,d290c381da39798f53cf462904e8106c0aead5b473a12d3d5e5f927ed1696225,2024-08-26T15:35:18.010000
CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000
CVE-2024-6716,0,1,ca1708114f36d8444701fefa878a89a05247338f5f098a766e8f3a056ffc732b,2024-09-04T14:15:14.457000
CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
CVE-2024-6722,0,1,ce45334a3ec54b6dec9cb49f1bb88a00f735e5080702fad911b2021658f61b6b,2024-09-04T13:05:36.067000
CVE-2024-6722,0,1,703a21dd5b88a7779498c521e3d50e4d788d54c0da4855e87bfa30931015fa08,2024-09-04T15:35:25.590000
CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f22d,2024-08-13T15:35:30.033000
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
@ -260939,8 +260942,8 @@ CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1
CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
CVE-2024-6888,0,1,27521c46c1a9e212ca3a61f5a553c72fd64c7d62eed84dc908354ea69df0755c,2024-09-04T13:05:36.067000
CVE-2024-6889,0,1,87845ad252a5de570f17618cfa8fa76faabdf6d8971dd1492926f87f73bcd753,2024-09-04T13:05:36.067000
CVE-2024-6888,0,1,7821f6ad756a40ba9974e9367cfa80ba14bf6ad061fb58534103c07dbd9c83c7,2024-09-04T15:35:25.820000
CVE-2024-6889,0,1,0d71ba8db5d6e12f2200830434e214b33ddf0e478787afb192cd93b07991608f,2024-09-04T15:35:26.040000
CVE-2024-6890,0,0,a4b61d6d84db517405e5620d04c7a39034adaee98aaff7a0c1a327ff7affb43d,2024-08-08T20:53:15.917000
CVE-2024-6891,0,0,0319d5fe5c9f95304d92792a4ec9eb62a36bb2ecf00a0444185d206c61336dba,2024-08-08T20:53:26.090000
CVE-2024-6892,0,0,94014e6ee35e3929306c8f74e16e30b86ead304734b682c8817df82d89ee99e2,2024-08-09T16:35:06.330000
@ -260971,7 +260974,7 @@ CVE-2024-6920,0,0,4e2168a5bc841b192cbc25aefcd43482a6d40cf51f3f3ae15a599ffdc08698
CVE-2024-6921,0,0,580a413feab2195e09e1accd12ff68082339edeb14f38ea81ed4dd2ca60cee1b,2024-09-03T12:59:02.453000
CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000
CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000
CVE-2024-6926,0,1,8f8f9261a4387921597dbd81404f2edb716067d5b50737229626cb222eebf3f5,2024-09-04T13:05:36.067000
CVE-2024-6926,0,1,8f7a980eaebe48aff3a265873ac088d8aab7ac9e61e313ad47eb901f8ccee0e3,2024-09-04T15:35:26.253000
CVE-2024-6927,0,0,c6c32d7d70ee084dae2db926c974bf0a3365e62a1e0657f5800453d990661577,2024-08-29T20:37:07.310000
CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000
@ -261040,6 +261043,7 @@ CVE-2024-7006,0,0,7b1756fb2cfad09038677fd148fad8aa6904b9302513849bd1123796cbd5e3
CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000
CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000
CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000
CVE-2024-7012,1,1,3ba4702513bc5491b3b256e57f4b86526ff598bc29b17d5e4d633e99f7af6003,2024-09-04T15:15:14.237000
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
@ -261064,6 +261068,9 @@ CVE-2024-7067,0,0,edbddb223a917ac8e1a9e4a55d4a5029d93724357fc61dc50ee8384e13f8f4
CVE-2024-7068,0,0,d3dd5dc06b13cea6ca5e0ca06538fc2c3e10b3dda31b16ef6e21ea77c7fa728b,2024-07-25T17:47:18.717000
CVE-2024-7069,0,0,739e886131312a7d1c8ccd6a4f98d25c3687954f1471fb4fef37a66c2cb88966,2024-07-25T17:33:53.777000
CVE-2024-7071,0,0,aa4d5566fa9986369b04898e3cb9a48a60e9dce9bca40572b84743b3df14ef33,2024-08-30T13:56:33.083000
CVE-2024-7076,1,1,461c64c63adecb0f65e9c3feb1d7a8196ecaefb7c93b3b21d6ead904a156455c,2024-09-04T15:15:14.333000
CVE-2024-7077,1,1,7146b53ed7337643d0a11083f6661927e68cce95a66752b9dfcf5415eccd70cd,2024-09-04T15:15:14.447000
CVE-2024-7078,1,1,420091d902e67f085d8788c290360c4537da09348677a3facb021052ef76a9d6,2024-09-04T15:15:14.583000
CVE-2024-7079,0,0,432b6c38d04c17da8e2aeea6e5677915e33a84f70f04ebe0988a953bc8892b6d,2024-07-26T10:15:02.840000
CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04d2,2024-07-26T13:22:43.387000
CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000
@ -261542,7 +261549,7 @@ CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf5
CVE-2024-7778,0,0,3bccf24c2d6c26e9b97b53b6049aaebd5856252add9958ab8944d96a94251b86,2024-08-22T12:48:02.790000
CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000
CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000
CVE-2024-7786,0,1,42e83a1b71d66654230fea5096d780e01387f81c9b9114246fe1f54ee9fd0506,2024-09-04T13:05:36.067000
CVE-2024-7786,0,1,bc9bd7c5c069bb8c59f5ac773821571e1c9df29939aac0b9b15b34e792ea7a51,2024-09-04T15:35:26.560000
CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000
CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000
CVE-2024-7792,0,0,780efb1d4f2f4b2b409fe743d3f22e99dbfd1dd19ca4b6135b1d10d208fddc9f,2024-08-20T19:08:12.970000
@ -261569,7 +261576,7 @@ CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f
CVE-2024-7831,0,0,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000
CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000
CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000
CVE-2024-7834,1,1,b872ca4a8529e6fbb54c224be4877483814f9b26b534f52674996d1f06bd1517,2024-09-04T13:15:07.030000
CVE-2024-7834,0,0,b872ca4a8529e6fbb54c224be4877483814f9b26b534f52674996d1f06bd1517,2024-09-04T13:15:07.030000
CVE-2024-7836,0,0,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
@ -261591,7 +261598,7 @@ CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc06
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000
CVE-2024-7870,0,1,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000
CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000
CVE-2024-7871,0,0,2c328bdd5eb833a0c2cdd650bf9983700c0e0f359ad3da892ab737e8787bc1bc,2024-09-03T12:59:02.453000
CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
@ -261622,6 +261629,7 @@ CVE-2024-7919,0,0,1863f3ded361827cbb07eac1eea3f3ab9748bf8576157da3db06c534b87a21
CVE-2024-7920,0,0,03604c94082c1da3fc5c107dc3e686ed281b4a09d67a2a74662346c68cad27ae,2024-08-21T12:31:20.663000
CVE-2024-7921,0,0,0f227aa56af57464e66f96a1f8f7af9df81009de406656147353a8e23b801955,2024-08-21T12:34:04.490000
CVE-2024-7922,0,0,c7a8281cc30c452535b1935299b85a2bdb852d82530dc7a36d8d5dc42009e9db,2024-08-20T16:20:25.403000
CVE-2024-7923,1,1,f27b4de2e73b72ba82bb435bee4c5682c7abe247d7a7b9fbc4f7063f4f9acc6e,2024-09-04T15:15:14.710000
CVE-2024-7924,0,0,2cf76ea42b1644543678da9fb702b4f7d4bee65303ff016d26c15c306f799b7f,2024-08-20T16:07:26.443000
CVE-2024-7925,0,0,34a7774a8c3accfc943090e80e03d9858b71da046812c3f4a53477aade0cc157,2024-08-20T16:06:31.663000
CVE-2024-7926,0,0,96fa4895d6c7573e91e2a98dde52944f42d7ba88cdd8d8bade11bc21ef00bfee,2024-08-20T15:44:20.567000
@ -261630,14 +261638,14 @@ CVE-2024-7928,0,0,671a039a8258001c6ef11e23ca79fcb6be7f38f136ccb6e85345eff1e57a63
CVE-2024-7929,0,0,a805877edcd3cdd34f9befcb94d499b15f392a2db9c65471420306feafc6b5f3,2024-08-21T14:10:01.937000
CVE-2024-7930,0,0,100658e5f06d4675f601c6d01184159576ab92141783db14fc9e9c2655e99e3e,2024-08-21T14:09:28.830000
CVE-2024-7931,0,0,863f45f588d3a95c5820542bfd54aa0c5198b18b9403ddeaa589881d711878b9,2024-08-21T14:08:54.820000
CVE-2024-7932,0,0,132178e9a38bf69ca603e09e02680c92b62f6bc83efe8b783a00d35f870296e2,2024-09-03T12:59:02.453000
CVE-2024-7932,0,1,76b4bef3950511267ce92a9fa48bb92becab9a9eff770b154c53074c95f49795,2024-09-04T14:52:06.830000
CVE-2024-7933,0,0,4c4d1784cb4756567970ab7962609b658773d623a89ad02de59731f72704024d,2024-08-23T19:53:54.260000
CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bbc5,2024-08-23T19:54:37.790000
CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000
CVE-2024-7936,0,0,031afbd95ed3099dc254ea3d5976503b2e92208fcd0c3be15e33867bddad8093,2024-09-03T20:43:55.790000
CVE-2024-7937,0,0,58f817c63d0d354ded52ec3007f0bc413c02bdd9e5e4a4484a57dcc393e99498,2024-09-03T20:43:08.620000
CVE-2024-7938,0,0,71c76a168f984eb2594619b16fb35a03af413a28911706e87dbe2fe632ac88a6,2024-09-03T12:59:02.453000
CVE-2024-7939,0,0,f6e364f59c7c33705de522b56b9ba94d838fac045fa029dd33a211191e8d6db3,2024-09-03T12:59:02.453000
CVE-2024-7938,0,1,05885971f29247a07809090893658b29d0c486ec3695696a5efeaad9575e9baa,2024-09-04T14:53:13.887000
CVE-2024-7939,0,1,4b7069eae0518b4820db13af93e87ba3f296d2255e89954eb0066ce56b0321c7,2024-09-04T14:54:22.290000
CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
CVE-2024-7941,0,0,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
CVE-2024-7942,0,0,10ad4e44439e447affdd92c4cf521f51989afe951a6ccfba24c688ebb8095c63,2024-09-03T20:39:07.790000
@ -261648,7 +261656,7 @@ CVE-2024-7946,0,0,55b44492c55caac843a1ad836ee11f9cccc3723d88087e17cb61194f5c6947
CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193e5,2024-08-21T13:53:38.750000
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
CVE-2024-7950,0,1,b51a61cdc7833f69fe0a174cb3081029b1669ec8306ef6c1fd438a91efe05d06,2024-09-04T13:05:36.067000
CVE-2024-7950,0,0,b51a61cdc7833f69fe0a174cb3081029b1669ec8306ef6c1fd438a91efe05d06,2024-09-04T13:05:36.067000
CVE-2024-7954,0,0,6a2899e124500642b11f066150da1a99cd00d32205a3315b85d4ae7956fdacda,2024-08-23T18:46:31.730000
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000
@ -261657,7 +261665,7 @@ CVE-2024-7966,0,0,f366846d49db9477cb2ea061c491dcdaebf29f4e555fa7612b32a771fd61b7
CVE-2024-7967,0,0,3b754d3fe60ade3dbaf2ceedb5cb492adc3a6d1342157a48ed7f67b8f6c5338c,2024-08-27T13:35:03.800000
CVE-2024-7968,0,0,d42fbdf1e125bc5bdd13768ccbb0014f1ef469a1fb717c432eb8628bcf97d06a,2024-08-27T13:35:04.780000
CVE-2024-7969,0,0,004186edac2fefffd328a41ea15a25fa627c517f8fe839d3b4b4abc33a5fb6ab,2024-08-28T23:15:05.320000
CVE-2024-7970,0,1,0ea8d6befe56133391e46d6fd9a47ae5c097409f0c85161fab41721d8f6dca27,2024-09-04T13:05:36.067000
CVE-2024-7970,0,1,4bb992b64808219b839c5254e00c2c7348ddd7f9644ca29d4ab55ca307fec90f,2024-09-04T14:35:15.343000
CVE-2024-7971,0,0,46adb6d7721c1dfcc60ee3fda6e97e01d50ab2f0fa3271375a72069a513c0516,2024-08-27T01:00:02.883000
CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829d6,2024-08-26T15:11:35.017000
CVE-2024-7973,0,0,57e1fa2533e5bc6ff8715efadca7a59b7db56c81e1c88635dd66a97401e58114,2024-08-26T15:13:04.650000
@ -261675,7 +261683,7 @@ CVE-2024-7988,0,0,31ba418bb216f0cdf4aa0ee92a25e534a5433a935c38bab3a1d21f5262b5de
CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8004,0,0,db1d0703fd67b99450cd4bcb70ccf12e9916eeaf63b2d3709541c9d3cb76dfe7,2024-09-03T12:59:02.453000
CVE-2024-8004,0,1,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
CVE-2024-8006,0,0,f29e0f84ecce5e9cce65c8acd10e6e8b7aca42dd66f5b800ff3eaa57046f8edb,2024-09-03T12:59:02.453000
CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000
@ -261706,18 +261714,18 @@ CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800d
CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000
CVE-2024-8088,0,0,0e34ecb2e337ae3a8395dc18d49e45879b242135953d92e92bf685b3a17972e3,2024-09-03T16:15:07.343000
CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000
CVE-2024-8102,0,1,b248349fbfc7dc91a8cfc6b19ccb236f9e343d641f8d646df8f93156d2650dcc,2024-09-04T13:05:36.067000
CVE-2024-8104,0,1,84b5ca88c3348bad2756ea80feacbfeef298cd2f3fb9043558081353a7574b54,2024-09-04T13:05:36.067000
CVE-2024-8102,0,0,b248349fbfc7dc91a8cfc6b19ccb236f9e343d641f8d646df8f93156d2650dcc,2024-09-04T13:05:36.067000
CVE-2024-8104,0,0,84b5ca88c3348bad2756ea80feacbfeef298cd2f3fb9043558081353a7574b54,2024-09-04T13:05:36.067000
CVE-2024-8105,0,0,6cd123057443a6d5affcf89562c6f3c6a2170e0a192f0587b00965446f3cfd3c,2024-08-30T21:15:14.577000
CVE-2024-8106,0,1,6878bd47d940628eb98bdee69aff2b282e2816ef8e41d4ec034ea7fb862475e9,2024-09-04T13:05:36.067000
CVE-2024-8106,0,0,6878bd47d940628eb98bdee69aff2b282e2816ef8e41d4ec034ea7fb862475e9,2024-09-04T13:05:36.067000
CVE-2024-8108,0,0,60015ebbd181aea00918abf3b3af4bc88fba5109d0b4aa167c5902152afce1db,2024-09-03T12:59:02.453000
CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000
CVE-2024-8113,0,0,663828d204cb9ecb17f530ae295b4541dee23e7a4b7b9d658530d5cb44ff87e3,2024-08-23T16:18:28.547000
CVE-2024-8117,0,1,3304f3a8e649018272c617d5a4c22042deb493552acdfb80f1b6c94a1d472f49,2024-09-04T13:05:36.067000
CVE-2024-8119,0,1,de71332bbf2daa535714ab7c6635b40b17fee9eae8063b754941246023647aec,2024-09-04T13:05:36.067000
CVE-2024-8117,0,0,3304f3a8e649018272c617d5a4c22042deb493552acdfb80f1b6c94a1d472f49,2024-09-04T13:05:36.067000
CVE-2024-8119,0,0,de71332bbf2daa535714ab7c6635b40b17fee9eae8063b754941246023647aec,2024-09-04T13:05:36.067000
CVE-2024-8120,0,0,01c88c2799a0f705aef2a62e6160ed1b8715b8884806e83ea99e7deea744cebf,2024-08-26T12:47:20.187000
CVE-2024-8121,0,1,b80dfa5aa35e220dcd36f253d48d989dd2c56c8b0ff45638f2b63fdf32130eb6,2024-09-04T13:05:36.067000
CVE-2024-8123,0,1,1fa10852b0c44f9e6a0a92aac1a13bc404f38a6cc3179f59936ca29f0c28ac97,2024-09-04T13:05:36.067000
CVE-2024-8121,0,0,b80dfa5aa35e220dcd36f253d48d989dd2c56c8b0ff45638f2b63fdf32130eb6,2024-09-04T13:05:36.067000
CVE-2024-8123,0,0,1fa10852b0c44f9e6a0a92aac1a13bc404f38a6cc3179f59936ca29f0c28ac97,2024-09-04T13:05:36.067000
CVE-2024-8127,0,0,5102baf959cfebdfcce1f9ebf5537e39c68d598c19a75f9e8284fbe283c6efe3,2024-08-27T14:53:45.257000
CVE-2024-8128,0,0,d07e75d47fb86cf66a48a7ed0955a75ebdca9af77e0b6c43500f577ad4f51a7f,2024-08-27T15:32:47.997000
CVE-2024-8129,0,0,39dbf19e98dba6341432a7bc1b8c1b6b77a667d2938ed3ce971d1f146a38e875,2024-08-27T15:33:23.187000
@ -261759,7 +261767,7 @@ CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ad
CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000
CVE-2024-8173,0,0,df3f4daf54afccb31b2d0dbd1ade86a4fd2b61ea5ed1b3d3f6de3c93aae29da5,2024-08-26T19:10:09.607000
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
CVE-2024-8181,0,1,3c630c74e0a5e892a66667409ec22f499f363f5b25e34ef38a41031abbd935c0,2024-09-04T12:15:05.833000
CVE-2024-8181,0,0,3c630c74e0a5e892a66667409ec22f499f363f5b25e34ef38a41031abbd935c0,2024-09-04T12:15:05.833000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
@ -261802,19 +261810,19 @@ CVE-2024-8260,0,0,80de48284b9b1f60542ccd162f62ac34372df44b6034ef82705622d907f322
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000
CVE-2024-8285,0,0,3b0be068594bf7034dac9ef4fa68f5d83c55fdc692ee8082bd0a6e0eca73c78a,2024-09-03T12:59:02.453000
CVE-2024-8289,0,1,467fc9efc781d965e4dfcdbf18dc548134b443dd6865d68147179f804aa4f762,2024-09-04T13:05:36.067000
CVE-2024-8289,0,0,467fc9efc781d965e4dfcdbf18dc548134b443dd6865d68147179f804aa4f762,2024-09-04T13:05:36.067000
CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000
CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000
CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000
CVE-2024-8297,0,0,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000
CVE-2024-8298,0,1,908da60f30ca3c3afa19b305cc0058d178aa922b6d0d48bb7b9dd9364a746926,2024-09-04T13:05:36.067000
CVE-2024-8298,0,0,908da60f30ca3c3afa19b305cc0058d178aa922b6d0d48bb7b9dd9364a746926,2024-09-04T13:05:36.067000
CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
CVE-2024-8302,0,0,bda50b555854cd31882c0ef2167f779bd3ff1746a67f4e225a03fe8a32f42f3f,2024-08-30T13:00:05.390000
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
CVE-2024-8304,0,0,02fe3479f6e17fb07e472eabe123127bcfa4991aa0aa38b065a739eef0a9393c,2024-08-30T13:00:05.390000
CVE-2024-8318,0,1,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000
CVE-2024-8325,0,1,6acbe28b7e23bada826026212a2fb1b0115adaa2c5e690e584f377990b0f6742,2024-09-04T13:05:36.067000
CVE-2024-8325,0,0,6acbe28b7e23bada826026212a2fb1b0115adaa2c5e690e584f377990b0f6742,2024-09-04T13:05:36.067000
CVE-2024-8327,0,0,90ce1c0d5f2bf16169e6685e1181bb32bc7482e79f281a32577436dff63843d4,2024-08-30T13:00:05.390000
CVE-2024-8328,0,0,5f490374d5b11796dfce2078f9042be0941b35283306bedbe7ef168cf9839d70,2024-08-30T13:00:05.390000
CVE-2024-8329,0,0,7ba7a0e6a1a272c4c31ea51643a4fe86d206714a3976a3e4e0fe1f38b2e9c68f,2024-08-30T13:00:05.390000
@ -261837,23 +261845,29 @@ CVE-2024-8345,0,0,bf6c1505f6fb25b9caf134b3d8f496de168512e4de6e4d28868034084605a3
CVE-2024-8346,0,0,56264e0f81d0818644c6295b4bf953d30c7656c9ea4318e3b1437cb53e53f98d,2024-09-03T12:59:02.453000
CVE-2024-8347,0,0,f378304bad132e1fe8ab7ce77e9900ef7bd30b779db5a43daec9479c5b4ff2cb,2024-09-03T12:59:02.453000
CVE-2024-8348,0,0,e9c7a689c9c3358ae92d1f6cfe0169cecaa626880b5382f148983a377fe43677,2024-09-03T12:59:02.453000
CVE-2024-8362,0,1,ab493a12e3b10a36bb554224cf98157a9e15c08949d513c9f294e5722f969e48,2024-09-04T13:05:36.067000
CVE-2024-8365,0,0,6b096e2916d276a090b51412ab1dac14b65c506c007678b1e1eba80f19fe636f,2024-09-03T12:59:02.453000
CVE-2024-8362,0,1,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8365,0,1,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000
CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000
CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000
CVE-2024-8368,0,0,e7e5b26d7b7405775320cdcede5a20a801cf8fd2fd5d2c94eef71d16b702c5d1,2024-09-03T12:59:02.453000
CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
CVE-2024-8374,0,0,4f80f55becbb7c7a1bdcff55c8c8caebb4200525c557f5f15c3a81de804dfdac,2024-09-03T12:59:02.453000
CVE-2024-8380,0,0,50231b6cf68aafd45090da0e392d43e9cc47c26432970ae1967b30772bd6b092,2024-09-03T12:59:02.453000
CVE-2024-8381,0,0,e7a1bf0fa21e3d466a6fe92dcf40cfe4bc9e0605365847dc55036f65d031a9b8,2024-09-03T16:35:13.350000
CVE-2024-8382,0,0,efd4d504583c7fd076b33c9f6fec5965d98116cc01276bd9e89c0d8d9e8a8b82,2024-09-03T15:12:16.467000
CVE-2024-8383,0,0,fec7a51695855938374dc21d81327e9189c73e4230cde7f08d9fe1ac79cc2e67,2024-09-03T22:15:05.977000
CVE-2024-8384,0,0,5362a6ace2b158a32cc1b8122c1c95d212b2ab5fdc71dfd06d7a76d1a9880d06,2024-09-03T16:35:14.610000
CVE-2024-8385,0,0,3eda89923dec7f419638dbbbda1a0bd1a1d6a52329ca274edcb6c542c6f6acdb,2024-09-03T16:35:15.653000
CVE-2024-8386,0,0,dda2399ada658560d8a6dac1ee98f2a881d2fb65f5accf10b74309695e1e8264,2024-09-03T15:12:16.467000
CVE-2024-8387,0,0,a3a4ffd386669c751e51534334429c7aa7719b496d6c236587ca9f3124ab594b,2024-09-03T16:35:16.810000
CVE-2024-8388,0,0,fe5700fbfa44251541892935d34e117d24a52d265fc210840d61b4c99ed842ff,2024-09-03T15:12:16.467000
CVE-2024-8389,0,0,2a0ca530b7b6eb915d2e5cb6434892ad982bd6d94765b32fce372846982f2195,2024-09-03T16:35:17.947000
CVE-2024-8399,0,1,3faa142573b2658da1828ae3d2ac176955aecf342f632daae5bde690c496cf4c,2024-09-04T13:05:36.067000
CVE-2024-8413,0,1,900f1056e9a2a3b1e1d77cb3bdcbf9982b6395625770ef6d932b5516213c20a5,2024-09-04T13:05:36.067000
CVE-2024-8380,0,1,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
CVE-2024-8381,0,1,873ddabbe1ea7126699754013df74027e5a6b78d9bcb49c6bbca3db63c8f7e51,2024-09-04T15:02:54.417000
CVE-2024-8382,0,1,4497b58a7dd538aed67e17ea3178c7d765a561d529d3de9c16c2a182286aedbd,2024-09-04T15:10:09.713000
CVE-2024-8383,0,1,d0679fa9efa3791de0cf5eecfd2e51e64b58b0dddec9290ff1b20bea9ada9093,2024-09-04T15:09:52.937000
CVE-2024-8384,0,1,b7c733fd8d78e29ce6154a2d6a01411ee3aaf60c3d431c3394eaf21030291575,2024-09-04T15:50:28.300000
CVE-2024-8385,0,1,ff4ba23b943024fe5e860de5aec53eac4c6926e2cd7431bde2616351cf7794bb,2024-09-04T15:43:57.797000
CVE-2024-8386,0,1,98c8b0053aadc06b4825adcb2958d67457b6ae5e5478d1432e7a1db07426ffc7,2024-09-04T15:44:30.137000
CVE-2024-8387,0,1,cccfa2a9463c00af390408978c7133aa456cc8cd4e2c49e9e0114842d3fd1cfb,2024-09-04T15:44:52.153000
CVE-2024-8388,0,1,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f97c,2024-09-04T15:49:19.170000
CVE-2024-8389,0,1,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000
CVE-2024-8399,0,0,3faa142573b2658da1828ae3d2ac176955aecf342f632daae5bde690c496cf4c,2024-09-04T13:05:36.067000
CVE-2024-8407,1,1,9c76853350f74bf0dbd5e1e41f6e7514845f26fba9d684f457ecb86992ffc8a2,2024-09-04T14:15:15.113000
CVE-2024-8408,1,1,005ec2ff0fb0e04e29f483cb1a66052172b9844e07f68175ea171a2ffe21f3dc,2024-09-04T14:15:15.413000
CVE-2024-8409,1,1,4244274e98dd4b1e64e6fff8b71d92657ed483f16c0d32a221f4d3b27b6fbeb8,2024-09-04T15:15:14.980000
CVE-2024-8410,1,1,b98b1f0f302824d405897ceeb6e60cdd46127147f653cc198f6706c3877badff,2024-09-04T15:15:15.260000
CVE-2024-8411,1,1,bd3972563a3e2010d44d3b47e5c4303a079965cf5d8009459bb08f61e2985209,2024-09-04T15:15:15.510000
CVE-2024-8413,0,0,900f1056e9a2a3b1e1d77cb3bdcbf9982b6395625770ef6d932b5516213c20a5,2024-09-04T13:05:36.067000
CVE-2024-8418,1,1,59b6c1d6baeaa071ea197f58909aa2f003cf606aa20927626c54270dac42b1b7,2024-09-04T15:15:15.773000

Can't render this file because it is too large.