Auto-Update: 2024-07-17T18:00:18.559637+00:00

This commit is contained in:
cad-safe-bot 2024-07-17 18:03:13 +00:00
parent 7523cc83bf
commit 8c97b46944
30 changed files with 1497 additions and 158 deletions

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2023-4976",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2024-07-17T16:15:03.233",
"lastModified": "2024-07-17T16:15:03.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw exists in Purity//FB whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@purestorage.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "psirt@purestorage.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://purestorage.com/security",
"source": "psirt@purestorage.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1394",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T13:00:08.037",
"lastModified": "2024-07-16T22:15:04.100",
"lastModified": "2024-07-17T16:15:03.460",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -168,6 +168,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:4581",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4591",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1394",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20296",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:12.367",
"lastModified": "2024-07-17T17:15:12.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit this vulnerability, an attacker would need at least valid Policy Admin credentials on the affected device.\r\n\r This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20323",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:12.607",
"lastModified": "2024-07-17T17:15:12.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Intelligent Node (iNode) Software could allow an unauthenticated, remote attacker to hijack the TLS connection between Cisco iNode Manager and associated intelligent nodes and send arbitrary traffic to an affected device.\r\n\r This vulnerability is due to the presence of hard-coded cryptographic material. An attacker in a man-in-the-middle position between Cisco iNode Manager and associated deployed nodes could exploit this vulnerability by using the static cryptographic key to generate a trusted certificate and impersonate an affected device. A successful exploit could allow the attacker to read data that is meant for a legitimate device, modify the startup configuration of an associated node, and, consequently, cause a denial of service (DoS) condition for downstream devices that are connected to the affected node."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-inode-static-key-VUVCeynn",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20395",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:12.833",
"lastModified": "2024-07-17T17:15:12.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information.\r\n\r This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-523"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20396",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:13.070",
"lastModified": "2024-07-17T17:15:13.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\n\r This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20400",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:13.300",
"lastModified": "2024-07-17T17:15:13.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.\r\n\r This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page.\r\n\r Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20401",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:13.540",
"lastModified": "2024-07-17T17:15:13.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\r\n\r This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\r\n\r Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20416",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:13.877",
"lastModified": "2024-07-17T17:15:13.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.\r\n\r This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-130"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-7pqFU2e",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20419",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:14.143",
"lastModified": "2024-07-17T17:15:14.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to change the password of any user, including administrative users.\r\n\r This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-620"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20429",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:14.497",
"lastModified": "2024-07-17T17:15:14.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20435",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-17T17:15:14.787",
"lastModified": "2024-07-17T17:15:14.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29120",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T15:15:14.090",
"lastModified": "2024-07-17T15:15:14.090",
"lastModified": "2024-07-17T16:15:04.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -25,6 +25,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/17/4",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/y3oqz7l8vd7jxxx3z2khgl625nvfr60j",
"source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35056",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T18:15:09.737",
"lastModified": "2024-05-22T12:46:53.887",
"lastModified": "2024-07-17T17:15:15.263",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://github.com/advisories/GHSA-gpgj-xrgw-8mx2",
"source": "cve@mitre.org"
},
{
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35057",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T18:15:09.820",
"lastModified": "2024-07-03T02:01:16.030",
"lastModified": "2024-07-17T16:15:04.577",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-jf28-v5f6-cvpr",
"source": "cve@mitre.org"
},
{
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35058",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T18:15:09.903",
"lastModified": "2024-07-03T02:01:16.830",
"lastModified": "2024-07-17T16:15:04.673",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-4gxj-5mmr-7pxq",
"source": "cve@mitre.org"
},
{
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35059",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T19:15:10.240",
"lastModified": "2024-07-03T02:01:17.657",
"lastModified": "2024-07-17T16:15:04.743",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-jqff-8g2v-642h",
"source": "cve@mitre.org"
},
{
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35060",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T19:15:10.313",
"lastModified": "2024-07-03T02:01:18.427",
"lastModified": "2024-07-17T16:15:04.813",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-45q4-h8rr-hgx2",
"source": "cve@mitre.org"
},
{
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35061",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T19:15:10.390",
"lastModified": "2024-07-03T02:01:19.220",
"lastModified": "2024-07-17T16:15:04.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,14 @@
}
],
"references": [
{
"url": "https://github.com/advisories/GHSA-jqff-8g2v-642h",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/advisories/GHSA-qv6x-53jj-vw59",
"source": "cve@mitre.org"
},
{
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36082",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-06-07T04:15:30.357",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-17T17:36:42.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,81 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Music Store - WordPress eCommerce anteriores a la 1.1.14 permiten que un atacante remoto autenticado con privilegios administrativos ejecute comandos SQL arbitrarios. El atacante puede obtener o modificar la informaci\u00f3n almacenada en la base de datos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:music_store:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.14",
"matchCriteriaId": "0EFA9577-4E22-45D4-B166-E8E2404CB09C"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN79213252/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?new=3085975%40music-store%2Ftrunk%2Fmusic-store.php&old=3079647%40music-store%2Ftrunk%2Fmusic-store.php",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://wordpress.org/plugins/music-store/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36965",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-08T13:15:57.820",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-17T17:32:46.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: remoteproc: mediatek: aseg\u00farese de que el b\u00fafer IPI encaje en L2TCM. La ubicaci\u00f3n del b\u00fafer IPI se lee desde el firmware que cargamos en el procesador System Companion, y no se garantiza que tanto la SRAM ( L2TCM) que se define en el nodo del \u00e1rbol de dispositivos es lo suficientemente grande para eso, y si bien esto es especialmente cierto para SCP de m\u00faltiples n\u00facleos, tambi\u00e9n es \u00fatil verificar las variantes de un solo n\u00facleo. No realizar esta verificaci\u00f3n puede hacer que este controlador realice operaciones de lectura y escritura fuera del l\u00edmite L2TCM, lo que resultar\u00e1 (en el mejor de los casos) en un p\u00e1nico en el kernel. Para solucionarlo, verifique que el b\u00fafer IPI encaje; de lo contrario, devolver\u00e1 una falla y se negar\u00e1 a iniciar el n\u00facleo SCP relevante (o el SCP en absoluto, si es de un solo n\u00facleo)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndIncluding": "5.15.160",
"matchCriteriaId": "EB1227F5-B622-45F2-80C8-F94E3F45859D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndIncluding": "6.1.92",
"matchCriteriaId": "D7E75569-629C-4E66-840F-75A9E1A870CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndIncluding": "6.6.32",
"matchCriteriaId": "9E9EFAF5-AF5B-459D-B215-645B1CE4A579"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndIncluding": "6.8.11",
"matchCriteriaId": "73BBA055-7988-4EAB-8218-196DA874ED2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndIncluding": "6.9.2",
"matchCriteriaId": "6539B4CE-9805-42AB-AEAF-91ED579F0F01"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/00548ac6b14428719c970ef90adae2b3b48c0cdf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1d9e2de24533daca36cbf09e8d8596bf72b526b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/26c6d7dc8c6a9fde9d362ab2eef6390efeff145e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/331f91d86f71d0bb89a44217cc0b2a22810bbd42",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/36c79eb4845551e9f6d28c663b38ce0ab03b84a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/838b49e211d59fa827ff9df062d4020917cffbdf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36967",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-08T13:15:58.000",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-17T17:03:53.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KEYS: confiable: corrige la p\u00e9rdida de memoria en tpm2_key_encode() 'scratch' nunca se libera. Solucione este problema llamando a kfree() en caso de \u00e9xito y de error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.160",
"matchCriteriaId": "795AB883-0972-406E-AFB1-7410C2556E94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.92",
"matchCriteriaId": "4E8DFDEB-F911-42FB-A55F-B84A9C556F01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.32",
"matchCriteriaId": "18199311-EF79-4480-85B0-6AD00C70A7BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.11",
"matchCriteriaId": "3B75CBAF-FD3C-40AE-85BB-0525E142C4C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.9.2",
"matchCriteriaId": "197A592B-2A2B-4A2F-8856-22638007413E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/189c768932d435045b1fae12bf63e53866f06a28",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1e6914fa8e7798bcf3ce4a5b96ea4ac1d5571cdf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5d91238b590bd883c86ba7707c5c9096469c08b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cf26a92f560eed5d6ddc3d441cc645950cbabc56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e62835264d0352be6086975f18fdfed2b5520b13",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ffcaa2172cc1a85ddb8b783de96d38ca8855e248",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36968",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-08T13:15:58.093",
"lastModified": "2024-06-12T10:15:31.153",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-17T16:59:39.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,114 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: corrige div-by-zero en l2cap_le_flowctl_init() l2cap_le_flowctl_init() puede causar tanto div-by-zero como un desbordamiento de enteros ya que hdev->le_mtu puede no caer el rango v\u00e1lido. Mueva MTU de hci_dev a hci_conn para validar MTU y detener el proceso de conexi\u00f3n antes si MTU no es v\u00e1lido. Adem\u00e1s, agregue una validaci\u00f3n faltante en read_buffer_size() y haga que devuelva un valor de error si la validaci\u00f3n falla. Ahora hci_conn_add() devuelve ERR_PTR() ya que puede fallar debido a una falla de kzalloc y un valor de MTU no v\u00e1lido. error de divisi\u00f3n: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 67 Comm: kworker/u5:0 Tainted: GW 6.9.0-rc5+ #20 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.15.0-1 01/04/2014 Cola de trabajo: hci0 hci_rx_work RIP: 0010:l2cap_le_flowctl_init+0x19e/0x3f0 net/bluetooth/l2cap_core.c:547 C\u00f3digo: e8 17 17 0c 00 66 41 89 9f 84 00 00 novio 01 00 00 00 41 b8 02 00 00 00 4c 89 fe 4c 89 e2 89 d9 e8 27 17 0c 00 44 89 f0 31 d2 <66> f7 f3 89 c3 ff c3 4d 8d b7 88 00 00 00 4c 89 f0 48 c1 e8 03 42 RSP: 0018:ffff88810bc0f858 EFLAGS: 00010246 RAX: 00000000000002a0 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 810bc0f7c0 RDI: ffffc90002dcb66f RBP: ffff88810bc0f880 R08: aa69db2dda70ff01 R09: 0000ffaaaaaaaaaa R10: 0084000000ffaaaa R11: 0000000000000000 R12 : ffff88810d65a084 R13: dffffc0000000000 R14: 00000000000002a0 R15: ffff88810d65a000 FS: 0000000000000000(0000) GS:ffff88811ac00000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 50033 CR2: 0000000020000100 CR3: 0000000103268003 CR4: 0000000000770ef0 PKRU: 55555554 Seguimiento de llamadas: l2cap_le_connect_req net /bluetooth/l2cap_core.c:4902 [en l\u00ednea] l2cap_le_sig_cmd net/bluetooth/l2cap_core.c:5420 [en l\u00ednea] l2cap_le_sig_channel net/bluetooth/l2cap_core.c:5486 [en l\u00ednea] l2cap_recv_frame+0xe59d/0x11710 net/bluetooth/l2cap_core.c: 6809 l2cap_recv_acldata+0x544/0x10a0 net/bluetooth/l2cap_core.c:7506 hci_acldata_packet net/bluetooth/hci_core.c:3939 [en l\u00ednea] hci_rx_work+0x5e5/0xb20 net/bluetooth/hci_core.c:4176 Process_one_work kernel/workqueue.c: 3254 [en l\u00ednea] Process_scheduled_works+0x90f/0x1530 kernel/workqueue.c:3335 trabajador_thread+0x926/0xe70 kernel/workqueue.c:3416 kthread+0x2e3/0x380 kernel/kthread.c:388 ret_from_fork+0x5c/0x90 arch/x86/kernel/ Process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 M\u00f3dulos vinculados en: ---[ end trace 0000000000000000 ]---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.39",
"versionEndExcluding": "6.6.32",
"matchCriteriaId": "503F0681-1131-42FA-98C3-26C06727BBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.11",
"matchCriteriaId": "3B75CBAF-FD3C-40AE-85BB-0525E142C4C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.9.2",
"matchCriteriaId": "197A592B-2A2B-4A2F-8856-22638007413E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4d3dbaa252257d20611c3647290e6171f1bbd6c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a5b862c6a221459d54e494e88965b48dcfa6cc44",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad3f7986c5a0f82b8b66a0afe1cc1f5421e1d674",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d2b2f7d3936dc5990549bc36ab7ac7ac37f22c30",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfece2b4e3759759b2bdfac2cd6d0ee9fbf055f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36969",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-08T13:15:58.170",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-17T16:50:29.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,130 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige la divisi\u00f3n por cero en setup_dsc_config Cuando slice_height es 0, la divisi\u00f3n por slice_height en el c\u00e1lculo del n\u00famero de sectores provocar\u00e1 un bloqueo del controlador de divisi\u00f3n por cero. Esto deja el kernel en un estado que requiere un reinicio. Este parche a\u00f1ade un check para evitar la divisi\u00f3n por cero. El seguimiento de la pila a continuaci\u00f3n es para el kernel 6.8.4. Reproduje el problema en un Thinkpad Lenovo Z16 Gen 2 con un monitor Apple Studio Display conectado a trav\u00e9s de Thunderbolt. El controlador amdgpu fall\u00f3 con esta excepci\u00f3n cuando reinici\u00e9 el sistema con el monitor conectado. kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) kernel:? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) n\u00facleo amdgpu:? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175) kernel:? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) n\u00facleo amdgpu:? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminador 2)) kernel:? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) n\u00facleo amdgpu:? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548) n\u00facleo:? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) kernel amdgpu: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc /dc_dsc.c:1109) amdgpu Despu\u00e9s de aplicar este parche, el controlador ya no falla cuando se conecta el monitor y se reinicia el sistema. Creo que este es el mismo problema informado para 3113."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.160",
"matchCriteriaId": "A357705C-6EC2-43FB-8A62-037B6F823106"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.92",
"matchCriteriaId": "4E8DFDEB-F911-42FB-A55F-B84A9C556F01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.32",
"matchCriteriaId": "18199311-EF79-4480-85B0-6AD00C70A7BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.8.11",
"matchCriteriaId": "3B75CBAF-FD3C-40AE-85BB-0525E142C4C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.9.2",
"matchCriteriaId": "197A592B-2A2B-4A2F-8856-22638007413E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/130afc8a886183a94cf6eab7d24f300014ff87ba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/308de6be0c9c7ba36915c0d398e771725c0ea911",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7e4f50dfc98c49b3dc6875a35c3112522fb25639",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/91402e0e5de9124a3108db7a14163fcf9a6d322f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a32c8f951c8a456c1c251e1dcdf21787f8066445",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f187fcbbb8f8bf10c6687f0beae22509369f7563",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-38446",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-17T17:15:15.340",
"lastModified": "2024-07-17T17:15:15.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NATO NCI ANET 3.4.1 mishandles report ownership. A user can create a report and, despite the restrictions imposed by the UI, change the author of that report to an arbitrary user (without their consent or knowledge) via a modified UUID in a POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://www.linkedin.com/pulse/idors-ncia-anet-v341-visionspace-technologies-hepxe",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38870",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-07-17T17:15:15.407",
"lastModified": "2024-07-17T17:15:15.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine OpManager, OpManager Plus, OpManager MSP and OpManager Enterprise Edition versions before 128104, from 128151 before 128238, from 128247 before 128250 are vulnerable to Stored XSS vulnerability in reports module."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2024-38870.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5042",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-05-17T14:15:21.123",
"lastModified": "2024-05-20T06:15:08.723",
"lastModified": "2024-07-17T16:15:05.160",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:4591",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-5042",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-6830",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-17T16:15:05.540",
"lastModified": "2024-07-17T16:15:05.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Inventory Management System 1.0. Affected is an unknown function of the file action.php of the component Order Handler. The manipulation of the argument order_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271812."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Xu-Mingming/cve/blob/main/sql1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.271812",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.271812",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.375233",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-17T16:00:19.050379+00:00
2024-07-17T18:00:18.559637+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-17T15:48:39.097000+00:00
2024-07-17T17:36:42.157000+00:00
```
### Last Data Feed Release
@ -33,62 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257381
257395
```
### CVEs added in the last Commit
Recently added CVEs: `18`
Recently added CVEs: `14`
- [CVE-2023-7272](CVE-2023/CVE-2023-72xx/CVE-2023-7272.json) (`2024-07-17T15:15:10.457`)
- [CVE-2024-23465](CVE-2024/CVE-2024-234xx/CVE-2024-23465.json) (`2024-07-17T15:15:10.977`)
- [CVE-2024-23466](CVE-2024/CVE-2024-234xx/CVE-2024-23466.json) (`2024-07-17T15:15:11.270`)
- [CVE-2024-23467](CVE-2024/CVE-2024-234xx/CVE-2024-23467.json) (`2024-07-17T15:15:11.500`)
- [CVE-2024-23468](CVE-2024/CVE-2024-234xx/CVE-2024-23468.json) (`2024-07-17T15:15:11.730`)
- [CVE-2024-23469](CVE-2024/CVE-2024-234xx/CVE-2024-23469.json) (`2024-07-17T15:15:11.947`)
- [CVE-2024-23470](CVE-2024/CVE-2024-234xx/CVE-2024-23470.json) (`2024-07-17T15:15:12.167`)
- [CVE-2024-23471](CVE-2024/CVE-2024-234xx/CVE-2024-23471.json) (`2024-07-17T15:15:12.403`)
- [CVE-2024-23472](CVE-2024/CVE-2024-234xx/CVE-2024-23472.json) (`2024-07-17T15:15:12.627`)
- [CVE-2024-23474](CVE-2024/CVE-2024-234xx/CVE-2024-23474.json) (`2024-07-17T15:15:12.840`)
- [CVE-2024-23475](CVE-2024/CVE-2024-234xx/CVE-2024-23475.json) (`2024-07-17T15:15:13.057`)
- [CVE-2024-28074](CVE-2024/CVE-2024-280xx/CVE-2024-28074.json) (`2024-07-17T15:15:13.417`)
- [CVE-2024-28992](CVE-2024/CVE-2024-289xx/CVE-2024-28992.json) (`2024-07-17T15:15:13.623`)
- [CVE-2024-28993](CVE-2024/CVE-2024-289xx/CVE-2024-28993.json) (`2024-07-17T15:15:13.860`)
- [CVE-2024-29120](CVE-2024/CVE-2024-291xx/CVE-2024-29120.json) (`2024-07-17T15:15:14.090`)
- [CVE-2024-6765](CVE-2024/CVE-2024-67xx/CVE-2024-6765.json) (`2024-07-17T14:15:04.327`)
- [CVE-2024-6833](CVE-2024/CVE-2024-68xx/CVE-2024-6833.json) (`2024-07-17T15:15:14.783`)
- [CVE-2024-6834](CVE-2024/CVE-2024-68xx/CVE-2024-6834.json) (`2024-07-17T15:15:14.970`)
- [CVE-2023-4976](CVE-2023/CVE-2023-49xx/CVE-2023-4976.json) (`2024-07-17T16:15:03.233`)
- [CVE-2024-20296](CVE-2024/CVE-2024-202xx/CVE-2024-20296.json) (`2024-07-17T17:15:12.367`)
- [CVE-2024-20323](CVE-2024/CVE-2024-203xx/CVE-2024-20323.json) (`2024-07-17T17:15:12.607`)
- [CVE-2024-20395](CVE-2024/CVE-2024-203xx/CVE-2024-20395.json) (`2024-07-17T17:15:12.833`)
- [CVE-2024-20396](CVE-2024/CVE-2024-203xx/CVE-2024-20396.json) (`2024-07-17T17:15:13.070`)
- [CVE-2024-20400](CVE-2024/CVE-2024-204xx/CVE-2024-20400.json) (`2024-07-17T17:15:13.300`)
- [CVE-2024-20401](CVE-2024/CVE-2024-204xx/CVE-2024-20401.json) (`2024-07-17T17:15:13.540`)
- [CVE-2024-20416](CVE-2024/CVE-2024-204xx/CVE-2024-20416.json) (`2024-07-17T17:15:13.877`)
- [CVE-2024-20419](CVE-2024/CVE-2024-204xx/CVE-2024-20419.json) (`2024-07-17T17:15:14.143`)
- [CVE-2024-20429](CVE-2024/CVE-2024-204xx/CVE-2024-20429.json) (`2024-07-17T17:15:14.497`)
- [CVE-2024-20435](CVE-2024/CVE-2024-204xx/CVE-2024-20435.json) (`2024-07-17T17:15:14.787`)
- [CVE-2024-38446](CVE-2024/CVE-2024-384xx/CVE-2024-38446.json) (`2024-07-17T17:15:15.340`)
- [CVE-2024-38870](CVE-2024/CVE-2024-388xx/CVE-2024-38870.json) (`2024-07-17T17:15:15.407`)
- [CVE-2024-6830](CVE-2024/CVE-2024-68xx/CVE-2024-6830.json) (`2024-07-17T16:15:05.540`)
### CVEs modified in the last Commit
Recently modified CVEs: `29`
Recently modified CVEs: `14`
- [CVE-2017-16531](CVE-2017/CVE-2017-165xx/CVE-2017-16531.json) (`2024-07-17T15:31:25.197`)
- [CVE-2017-16532](CVE-2017/CVE-2017-165xx/CVE-2017-16532.json) (`2024-07-17T15:30:45.170`)
- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-17T14:15:03.083`)
- [CVE-2024-26184](CVE-2024/CVE-2024-261xx/CVE-2024-26184.json) (`2024-07-17T14:58:41.847`)
- [CVE-2024-28899](CVE-2024/CVE-2024-288xx/CVE-2024-28899.json) (`2024-07-17T14:58:25.510`)
- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-17T14:15:03.677`)
- [CVE-2024-30013](CVE-2024/CVE-2024-300xx/CVE-2024-30013.json) (`2024-07-17T14:53:41.397`)
- [CVE-2024-30061](CVE-2024/CVE-2024-300xx/CVE-2024-30061.json) (`2024-07-17T15:22:46.897`)
- [CVE-2024-30071](CVE-2024/CVE-2024-300xx/CVE-2024-30071.json) (`2024-07-17T15:22:16.003`)
- [CVE-2024-30079](CVE-2024/CVE-2024-300xx/CVE-2024-30079.json) (`2024-07-17T15:21:48.743`)
- [CVE-2024-30081](CVE-2024/CVE-2024-300xx/CVE-2024-30081.json) (`2024-07-17T15:20:04.197`)
- [CVE-2024-30098](CVE-2024/CVE-2024-300xx/CVE-2024-30098.json) (`2024-07-17T15:17:02.427`)
- [CVE-2024-32987](CVE-2024/CVE-2024-329xx/CVE-2024-32987.json) (`2024-07-17T15:12:16.427`)
- [CVE-2024-35261](CVE-2024/CVE-2024-352xx/CVE-2024-35261.json) (`2024-07-17T15:48:39.097`)
- [CVE-2024-35266](CVE-2024/CVE-2024-352xx/CVE-2024-35266.json) (`2024-07-17T15:03:10.610`)
- [CVE-2024-35267](CVE-2024/CVE-2024-352xx/CVE-2024-35267.json) (`2024-07-17T15:02:22.937`)
- [CVE-2024-35270](CVE-2024/CVE-2024-352xx/CVE-2024-35270.json) (`2024-07-17T15:00:46.870`)
- [CVE-2024-36823](CVE-2024/CVE-2024-368xx/CVE-2024-36823.json) (`2024-07-17T14:41:44.227`)
- [CVE-2024-37984](CVE-2024/CVE-2024-379xx/CVE-2024-37984.json) (`2024-07-17T15:48:09.993`)
- [CVE-2024-4390](CVE-2024/CVE-2024-43xx/CVE-2024-4390.json) (`2024-07-17T14:10:55.550`)
- [CVE-2024-4565](CVE-2024/CVE-2024-45xx/CVE-2024-4565.json) (`2024-07-17T14:14:08.750`)
- [CVE-2024-5213](CVE-2024/CVE-2024-52xx/CVE-2024-5213.json) (`2024-07-17T14:36:39.397`)
- [CVE-2024-5605](CVE-2024/CVE-2024-56xx/CVE-2024-5605.json) (`2024-07-17T14:02:16.537`)
- [CVE-2024-5686](CVE-2024/CVE-2024-56xx/CVE-2024-5686.json) (`2024-07-17T14:00:51.097`)
- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-07-17T14:15:04.210`)
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-07-17T16:15:03.460`)
- [CVE-2024-29120](CVE-2024/CVE-2024-291xx/CVE-2024-29120.json) (`2024-07-17T16:15:04.157`)
- [CVE-2024-35056](CVE-2024/CVE-2024-350xx/CVE-2024-35056.json) (`2024-07-17T17:15:15.263`)
- [CVE-2024-35057](CVE-2024/CVE-2024-350xx/CVE-2024-35057.json) (`2024-07-17T16:15:04.577`)
- [CVE-2024-35058](CVE-2024/CVE-2024-350xx/CVE-2024-35058.json) (`2024-07-17T16:15:04.673`)
- [CVE-2024-35059](CVE-2024/CVE-2024-350xx/CVE-2024-35059.json) (`2024-07-17T16:15:04.743`)
- [CVE-2024-35060](CVE-2024/CVE-2024-350xx/CVE-2024-35060.json) (`2024-07-17T16:15:04.813`)
- [CVE-2024-35061](CVE-2024/CVE-2024-350xx/CVE-2024-35061.json) (`2024-07-17T16:15:04.877`)
- [CVE-2024-36082](CVE-2024/CVE-2024-360xx/CVE-2024-36082.json) (`2024-07-17T17:36:42.157`)
- [CVE-2024-36965](CVE-2024/CVE-2024-369xx/CVE-2024-36965.json) (`2024-07-17T17:32:46.323`)
- [CVE-2024-36967](CVE-2024/CVE-2024-369xx/CVE-2024-36967.json) (`2024-07-17T17:03:53.860`)
- [CVE-2024-36968](CVE-2024/CVE-2024-369xx/CVE-2024-36968.json) (`2024-07-17T16:59:39.987`)
- [CVE-2024-36969](CVE-2024/CVE-2024-369xx/CVE-2024-36969.json) (`2024-07-17T16:50:29.427`)
- [CVE-2024-5042](CVE-2024/CVE-2024-50xx/CVE-2024-5042.json) (`2024-07-17T16:15:05.160`)
## Download and Usage

View File

@ -73188,7 +73188,7 @@ CVE-2014-9706,0,0,dab087de637f6b43c09aedf7472b036f0a3d789fc04a22c39262cd1c4a35c9
CVE-2014-9707,0,0,f3f0da0dd23176009bff7b48793751e03810f0cb1f74e70d9f379145a5f7b68d,2018-10-09T19:55:10.497000
CVE-2014-9708,0,0,a58485dd5d13f63313201e171ccbf4c7071f2f78afb86fdda3d0c62c0b05a8ea,2023-06-22T19:49:41.650000
CVE-2014-9709,0,0,522fd8cb1ed3ac15385200e838c2f111b54be02bf3dbdc2c42e4561b41bea449,2022-11-09T03:04:19.033000
CVE-2014-9710,0,1,f514e062cb8031246b8fab363c970bc7255f8574eab40cdc6d15e956627c3fbf,2024-07-17T15:28:07.730000
CVE-2014-9710,0,0,f514e062cb8031246b8fab363c970bc7255f8574eab40cdc6d15e956627c3fbf,2024-07-17T15:28:07.730000
CVE-2014-9711,0,0,74ddc290b0d1e2a5603379cbfcfe3b06afce0cdd6e5c04339b6543682c30ea3b,2018-10-09T19:55:11.637000
CVE-2014-9712,0,0,35c320e642c4b46324ab583a30f538ccf7280d37fff2ebe44a09a52d0a4799e0,2016-06-23T12:00:12.700000
CVE-2014-9713,0,0,74f4c7c34888648b86caaa075d3e9cf7c284e774722aeec4d6562e6b7b33af53,2016-12-22T02:59:22.157000
@ -74941,7 +74941,7 @@ CVE-2015-1415,0,0,27e2033e7708e4292f45315d9efacf9ba2357e40053e705ee349e51776068b
CVE-2015-1416,0,0,e78d9818ce7f02ac252b29f7ebb59bb505db486527f79515b54ba2201040f66e,2018-03-13T19:53:21.370000
CVE-2015-1417,0,0,a713a1ab4bd04039083c62289ba181a9e17107cba005092cefee267e62fc949c,2019-03-20T13:14:14.760000
CVE-2015-1418,0,0,04da0bc1ffe67b74f0d82eda4e20fdb936dfa45de6969a561c537a291fb7af5a,2018-04-07T01:29:00.797000
CVE-2015-1419,0,1,71bb42f98c277af7ba19dc3cb196797209eb411d4a05b574de1f736927e30233,2024-07-17T15:31:01.647000
CVE-2015-1419,0,0,71bb42f98c277af7ba19dc3cb196797209eb411d4a05b574de1f736927e30233,2024-07-17T15:31:01.647000
CVE-2015-1420,0,0,c70b358eaeeca6a9b12930ef5b666d981eba8b52cafe5aa1bf2d98fb7d7215ee,2016-12-28T02:59:03.993000
CVE-2015-1421,0,0,d5af7249a77359d287124baab3d49fe5adefb485af5bae54f795a8716ff8bd45,2023-11-07T02:24:49.410000
CVE-2015-1422,0,0,3d4a7635e292a4fc28b2f7e515ea195e9aeacfafdb4698ba46a457f4f1c10f6f,2017-09-08T01:29:48.590000
@ -76318,7 +76318,7 @@ CVE-2015-2918,0,0,c5245d3a26f0c6a68a5c625e920d0810e8a3635cf19c7aa98da2dbcaad8e2a
CVE-2015-2922,0,0,c0dc316ab84447b71020dd57885a3479764daba11aa959b88217d58d987c9354,2023-11-07T02:25:27.527000
CVE-2015-2923,0,0,33dd8ca4615352fb493502fa36d142a93a656d58526c085aae03d656d816b628,2020-02-28T16:22:06.510000
CVE-2015-2924,0,0,e84980de3880a13f53e750257c73f750c29fa2061c377f71bc7be6b2a31f11e9,2016-12-07T18:10:51.847000
CVE-2015-2925,0,1,3c28180a24aa89b9c75cb270e0ad02c91d307eeaff5053993709348b82e9ff48,2024-07-17T15:29:49.973000
CVE-2015-2925,0,0,3c28180a24aa89b9c75cb270e0ad02c91d307eeaff5053993709348b82e9ff48,2024-07-17T15:29:49.973000
CVE-2015-2926,0,0,69d172d0b77f69b932f80d09c94f134dc86fbbdb77a842f4bdab90e12e731dc8,2018-10-09T19:56:33.577000
CVE-2015-2927,0,0,ffd7ce087dfc59efe5f3d6125dca76b5a742860c486d2ef8d889285d921f86ff,2023-11-07T02:25:27.703000
CVE-2015-2928,0,0,b6faa23d4a4831562f8f330fb27e2484439c80f79aa6bfe750bfe0e228f24be4,2020-02-01T16:12:19.540000
@ -80424,7 +80424,7 @@ CVE-2015-7609,0,0,b3ed793e317b388e4df3c4254c9fd73168dba5ccf7cfe4e0a006ec63fdd329
CVE-2015-7610,0,0,7f7d199eab0f8e668767075f26785d2d7eb1038a4eff38b9de50136621e92e94,2020-06-04T12:32:29.300000
CVE-2015-7611,0,0,d378e5c062d9dd631447cf9e8a348f5456ab262df8836d37cd6121c2a326fa99,2018-10-09T19:58:15.847000
CVE-2015-7612,0,0,3c03e1a393d0da175e1f53969884063953eae98bbcfaabecc1a377a1c26a0bcb,2015-10-02T20:41:02.967000
CVE-2015-7613,0,1,ea176d4e582d6f3613fe74428e81d1cc8f3fa11daefbccbe8faeca9f24496017,2024-07-17T15:30:18.973000
CVE-2015-7613,0,0,ea176d4e582d6f3613fe74428e81d1cc8f3fa11daefbccbe8faeca9f24496017,2024-07-17T15:30:18.973000
CVE-2015-7614,0,0,e8e90f026ea013adb76beb3f4e6ef849639271285d18ce67da27fa78ea0561f7,2021-09-08T17:19:32.473000
CVE-2015-7615,0,0,bfc98948031926b140f767798f01d41790e7c6e15ef264a16b22a44d6a399012,2021-09-08T17:19:32.493000
CVE-2015-7616,0,0,6e65c0a9c608a3693fe140889452347283c1b5c7b17d3c2a46b39159263ff1de,2021-09-08T17:19:32.520000
@ -99907,8 +99907,8 @@ CVE-2017-16528,0,0,237b3a2ee754e48698ebaa6cd26aea81efd1e7fff70138cd43fc84d6b36c3
CVE-2017-16529,0,0,2b3941077a92e4ed0b4011c2f57bae3e61c49cee86471aaf37c82a576b6a5c9d,2024-03-14T19:58:06.937000
CVE-2017-1653,0,0,8ab21d9a1331a4d095d829a637ba01b8d9157939795ade2d4075c21fb428c10a,2018-02-09T20:06:20.293000
CVE-2017-16530,0,0,50fd66f706bdcb993e18c5bfc3c3a62fbc421e149bb50c5c3608e38a541c8dae,2024-03-14T19:57:49.287000
CVE-2017-16531,0,1,976f745a3c0092480b539393bf29511fcc3986a459796883946c7e4b965b7134,2024-07-17T15:31:25.197000
CVE-2017-16532,0,1,213881c9e987797335665db708986449bcb186d4878330af326c2d59db46e607,2024-07-17T15:30:45.170000
CVE-2017-16531,0,0,976f745a3c0092480b539393bf29511fcc3986a459796883946c7e4b965b7134,2024-07-17T15:31:25.197000
CVE-2017-16532,0,0,213881c9e987797335665db708986449bcb186d4878330af326c2d59db46e607,2024-07-17T15:30:45.170000
CVE-2017-16533,0,0,7c64f19973f9ebdf8a6947b62af74ad333316d704521a748acd5b7fb29af8566,2024-03-12T17:38:46.927000
CVE-2017-16534,0,0,e9dbfe036bb34aa2fcb4c43386f348d2e09f0253e02e3e633c22f6485a5de9a1,2024-02-16T18:54:37.580000
CVE-2017-16535,0,0,6620f681481fb3ae54c2dfde88a506872957e8a6b8b1c9dde17a859f19229d17,2018-08-24T10:29:01.163000
@ -236822,6 +236822,7 @@ CVE-2023-49751,0,0,d66e187adcfb0f3f264a3e475492bf374826e35a8fde24bd18ae6e258db35
CVE-2023-49752,0,0,8f7e4984dc1eed4166d4c69d35220ef08212b1cfdb0c5ac668f3f9f2ec5cfdda,2023-12-30T03:13:36.437000
CVE-2023-49753,0,0,089fb4a8ca464297348c1d7baf66332d8a87b277f25d1ba0398acaed5e7c446e,2024-05-17T18:36:05.263000
CVE-2023-49759,0,0,7151cd9cab4ee2f6b2a6c617750d4e1c2871172704f111ef4a22e0fedc83ee27,2023-12-21T04:56:56.160000
CVE-2023-4976,1,1,f6247632809e53e13a67a506da682aaef52d38db41f83c4664009b0e197116c9,2024-07-17T16:15:03.233000
CVE-2023-49760,0,0,00db1e11f20a615e84ea6f027680da52f5eebadc8eaf9cc28c10b4e3d1fd846b,2023-12-21T04:57:19.577000
CVE-2023-49761,0,0,c2890b9a47c12957c2b3369e4854a28b3ae644be248b250f495c7bf4f2e083d7,2023-12-21T04:55:01.263000
CVE-2023-49762,0,0,b5e808d7b4edd56804efe5478c0dd690eacc474add793a15fdb6b2630c383c08,2023-12-29T03:47:20.780000
@ -238453,7 +238454,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000
CVE-2023-52291,0,1,d44513110b3abde7b95c470c0ec221718d8a2ddfa2c61afda0ba26cf36a11001,2024-07-17T14:15:03.083000
CVE-2023-52291,0,0,d44513110b3abde7b95c470c0ec221718d8a2ddfa2c61afda0ba26cf36a11001,2024-07-17T14:15:03.083000
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
@ -240813,7 +240814,7 @@ CVE-2023-7259,0,0,48e34f6790939be91bf1f945206235146161db18f274c444cfe683dbe37045
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
CVE-2023-7272,1,1,ae2ee3a0e6eeeceac88d7f0f726112744f2985f44308818239d9a83fc4a998fc,2024-07-17T15:15:10.457000
CVE-2023-7272,0,0,ae2ee3a0e6eeeceac88d7f0f726112744f2985f44308818239d9a83fc4a998fc,2024-07-17T15:15:10.457000
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000
CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c05,2024-02-15T06:23:39.303000
@ -242050,7 +242051,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d
CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000
CVE-2024-1394,0,0,6f0e92f47ef2345a2d749a80c5d074999c4de135a0d0479ae3bac3f052ef68c4,2024-07-16T22:15:04.100000
CVE-2024-1394,0,1,0068af5eef87733e8d147d39dd3361c5a47e23ae2b95306fe985857bc8bb4088,2024-07-17T16:15:03.460000
CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000
CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000
CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000
@ -242732,6 +242733,7 @@ CVE-2024-20292,0,0,9fda1d46c19c90bac6f8d81c3a2ae5d97f0e489d0e9bdc7810f6ed453d2cc
CVE-2024-20293,0,0,616028e08a52b8ee6918b00b66aa203f272bb9f0716f3e2ece06ab3be6edaad2,2024-05-22T18:59:20.240000
CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1c54,2024-02-29T13:49:29.390000
CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000
CVE-2024-20296,1,1,7a9d3c5fd0eab4e4556236179228065ba6842463882109a1e8fbd1a86b4a2493,2024-07-17T17:15:12.367000
CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000
CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000
CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000
@ -242755,6 +242757,7 @@ CVE-2024-2032,0,0,6c9fab941a4b444e93407737c1e5c294d8f201f8109308d2a41aae9e970336
CVE-2024-20320,0,0,fd0786fa2f7ef51279d0c4fc73d926adfc689f7fdd27a0ba95adedfd6d2d5266,2024-03-13T18:15:58.530000
CVE-2024-20321,0,0,9f164e85a915a5a4f862704d6bb8cef452f44797e3d6049905a588daf1644aa7,2024-03-04T22:45:23.647000
CVE-2024-20322,0,0,5515197bc9b4076f0571c114c5eb66a73e81fb48b28f32d0ba7271f33bf23fb1,2024-03-13T18:15:58.530000
CVE-2024-20323,1,1,299af4dba1ed5ac758a8bf330e33abe550470127982dafa5b55c53160fbeacac,2024-07-17T17:15:12.607000
CVE-2024-20324,0,0,16b07310c8a18de284f24c33796dfd7cb4fe5472c0d1e88f721937f9ace3fe69,2024-03-27T17:48:21.140000
CVE-2024-20325,0,0,54ea99e12b48a3199864bbc6b8e057b2420390f797e4ed26add8a6233c894845,2024-02-22T19:07:27.197000
CVE-2024-20326,0,0,fc15c10256dd5a166a1027ec5ae4c1e91a980e0789f9cd1c71ded8bffcb2bc99,2024-07-03T01:46:03.803000
@ -242801,13 +242804,21 @@ CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a93345
CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000
CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000
CVE-2024-20395,1,1,ad42781652d3f722616a76e3dd30d1ff5168c930794164deec1985af6c7b5436,2024-07-17T17:15:12.833000
CVE-2024-20396,1,1,3f437c5a90d6c3836c59fa0dfaadd99cad2dadd82b171a91795c543a6c9974ce,2024-07-17T17:15:13.070000
CVE-2024-20399,0,0,3444b8848702aea256ab827839689885201c8a881aff9e7e34cb07cc0d115aad,2024-07-10T19:15:09.840000
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
CVE-2024-20400,1,1,7091da83dbd9e48a9acbcefe8d4a95daea5bbb17ddd36efe5556e162c7749eb9,2024-07-17T17:15:13.300000
CVE-2024-20401,1,1,83fa2701255e55c2c2313048194daa5b041cf42625adaca90019b4bc478cd0db,2024-07-17T17:15:13.540000
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20416,1,1,431aeafb72e36e0d87b738d751078c83d193479cd7dfe1b8095037f503d85a61,2024-07-17T17:15:13.877000
CVE-2024-20419,1,1,8a3761f71894e42f8b34c340cecf09bf611c6689d9bff7eaa5c76756b6d30192,2024-07-17T17:15:14.143000
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
CVE-2024-20429,1,1,9a8820753052a21887447bdde9162b68861fba053fac5c2b962b383a81479ebd,2024-07-17T17:15:14.497000
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
CVE-2024-20435,1,1,e28fa6d2c159a87fe6e0ebdeeca010e9fd913877c8c0ef99e2204fc0fecc06bd,2024-07-17T17:15:14.787000
CVE-2024-2044,0,0,18ef6f7655f9f95707cfbf1a13de0d80a7ff66dee83ae08307be87037636e53d,2024-03-23T03:15:12.063000
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
@ -244814,18 +244825,18 @@ CVE-2024-2346,0,0,640c5da33542a8ab660efed3d2946f8775e8451ffcd15e019bca38e32d876d
CVE-2024-23461,0,0,72d0c2f7bbc9dd939c336de42f6456e6f6d8135fca52976b9db25f6fb6a54540,2024-05-02T13:27:25.103000
CVE-2024-23462,0,0,89eee1bc8417ec5c165498a10c45118559ef0ab7b53f75c35dd8c8aeefb822d1,2024-05-02T13:27:25.103000
CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d98980c9,2024-04-30T17:52:35.057000
CVE-2024-23465,1,1,f1ec77c661799102a7b1421cce4cd375c01d8bf91a971d7fd09209c9de34c392,2024-07-17T15:15:10.977000
CVE-2024-23466,1,1,fed74f7f59c72c6e4fdc811eccb5bde2d6654847f1822e33536cbdf79d893c79,2024-07-17T15:15:11.270000
CVE-2024-23467,1,1,949a6280921197210225f26cc891195222cc4a3db86bbe4240a9a9a3b22cac1f,2024-07-17T15:15:11.500000
CVE-2024-23468,1,1,272480792e95f7111308dfb6ea4bc9e5ddb5d50935493c3e4f42d43bce1702d1,2024-07-17T15:15:11.730000
CVE-2024-23469,1,1,1b44b465b8d57cdd083c9fc728844632fcc9d4c7c068d0fefcf1e3b567bdbb8f,2024-07-17T15:15:11.947000
CVE-2024-23465,0,0,f1ec77c661799102a7b1421cce4cd375c01d8bf91a971d7fd09209c9de34c392,2024-07-17T15:15:10.977000
CVE-2024-23466,0,0,fed74f7f59c72c6e4fdc811eccb5bde2d6654847f1822e33536cbdf79d893c79,2024-07-17T15:15:11.270000
CVE-2024-23467,0,0,949a6280921197210225f26cc891195222cc4a3db86bbe4240a9a9a3b22cac1f,2024-07-17T15:15:11.500000
CVE-2024-23468,0,0,272480792e95f7111308dfb6ea4bc9e5ddb5d50935493c3e4f42d43bce1702d1,2024-07-17T15:15:11.730000
CVE-2024-23469,0,0,1b44b465b8d57cdd083c9fc728844632fcc9d4c7c068d0fefcf1e3b567bdbb8f,2024-07-17T15:15:11.947000
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
CVE-2024-23470,1,1,5eabfe63c8ba98278ac23e30a2492bccbdff433e73fb512dd704f644a43bb45b,2024-07-17T15:15:12.167000
CVE-2024-23471,1,1,eeb79ead1eaa99467929603e528a9ba9d65bd27cb882a7e17f3bbe7402b2037c,2024-07-17T15:15:12.403000
CVE-2024-23472,1,1,43d514c4def55a5eb486f68f7bd824677d6635efe7be4b4c49b9a6da09f141ab,2024-07-17T15:15:12.627000
CVE-2024-23470,0,0,5eabfe63c8ba98278ac23e30a2492bccbdff433e73fb512dd704f644a43bb45b,2024-07-17T15:15:12.167000
CVE-2024-23471,0,0,eeb79ead1eaa99467929603e528a9ba9d65bd27cb882a7e17f3bbe7402b2037c,2024-07-17T15:15:12.403000
CVE-2024-23472,0,0,43d514c4def55a5eb486f68f7bd824677d6635efe7be4b4c49b9a6da09f141ab,2024-07-17T15:15:12.627000
CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000
CVE-2024-23474,1,1,7af299bd4bf325489dc4a3f21f783c968098487d372dd1902f3b19a37320d0d5,2024-07-17T15:15:12.840000
CVE-2024-23475,1,1,427781f3a8683b3d7f3db9124024942f38d9011fe6a74edacfa85b9ca77a7945,2024-07-17T15:15:13.057000
CVE-2024-23474,0,0,7af299bd4bf325489dc4a3f21f783c968098487d372dd1902f3b19a37320d0d5,2024-07-17T15:15:12.840000
CVE-2024-23475,0,0,427781f3a8683b3d7f3db9124024942f38d9011fe6a74edacfa85b9ca77a7945,2024-07-17T15:15:13.057000
CVE-2024-23476,0,0,a2c65553196c393fba0546e96e2c79c80a38d2a88710430b47bc32db3cc80706,2024-02-20T20:39:10.033000
CVE-2024-23477,0,0,e880885242607136a306f6f57a9dc9e7844660b8142f6c1ca2dcb4c28aff7c18,2024-02-20T20:38:43.587000
CVE-2024-23478,0,0,3a3388743ecb2899ec7137490ac6797073063468079fd9a11b0d285be141ba41,2024-02-20T20:39:52.377000
@ -246600,7 +246611,7 @@ CVE-2024-26180,0,0,9000d855a74862f32d3fa0ed30042aefa93c161366835c3c92187e7b78b64
CVE-2024-26181,0,0,f85adedc45ce0ef17d2924f5d1f3eede91ec057ddbc953f28c8597cd9192de3d,2024-06-11T16:15:20.530000
CVE-2024-26182,0,0,2dd8ff2b71d4772f8e1652bd45aa416135058f5ea1a2de181bc25a4627f2ba81,2024-04-11T20:15:34.707000
CVE-2024-26183,0,0,4d74cd74f15c42ef83e07da0fea854b9308a2d6867480d27e88f16b8021a572d,2024-04-10T13:24:00.070000
CVE-2024-26184,0,1,9a9469b525a1c0948733fdbbefd0c134cd0d1bfb19cc88ca9e1172b5dc220da3,2024-07-17T14:58:41.847000
CVE-2024-26184,0,0,9a9469b525a1c0948733fdbbefd0c134cd0d1bfb19cc88ca9e1172b5dc220da3,2024-07-17T14:58:41.847000
CVE-2024-26185,0,0,9feef43ee36b690f774d8b3be3682410d3a24414bd3e53eb7eb31b5bf9351714,2024-05-29T00:15:37.420000
CVE-2024-26188,0,0,f211739728663bae1418bea21124610d1eca871de3fac0df538712e0d37e5a9a,2024-06-11T15:16:04.713000
CVE-2024-26189,0,0,2a49ee8d4a0ba2f801fc699ef40f2bf3b0913e4387987b37ad42d4a5aa46f00e,2024-04-10T13:24:00.070000
@ -248079,7 +248090,7 @@ CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
CVE-2024-28072,0,0,0388ddd739145e873f566e470af31e5a6e103b572069aea4be2de66f0edda6c1,2024-05-03T12:48:41.067000
CVE-2024-28073,0,0,cadc3783842c38ba6ba61a0c45fedc9b4d6302da33bfc50f751b346c540f6d66,2024-04-17T20:08:21.887000
CVE-2024-28074,1,1,5027b3400d78cb486d814a3b9c5ed2ca869be4bc800d385392a6b3906b93934e,2024-07-17T15:15:13.417000
CVE-2024-28074,0,0,5027b3400d78cb486d814a3b9c5ed2ca869be4bc800d385392a6b3906b93934e,2024-07-17T15:15:13.417000
CVE-2024-28075,0,0,acb66f607b88e170574f583eec5f7c1a4911ba67af1b2bf08e9d24973400217b,2024-05-14T16:13:02.773000
CVE-2024-28076,0,0,7c257d304897e65890bc306f57dddbb8d08174369e3efd3f8b92793bad3c8aa3,2024-04-19T14:15:11.080000
CVE-2024-2808,0,0,e0d3d3b9e325ca6ee7276bd88e3baf37c479e9082bd582fafdd638b137fbd54f,2024-05-17T02:38:31.233000
@ -248525,7 +248536,7 @@ CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390
CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000
CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000
CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000
CVE-2024-28899,0,1,fe8eba7dbe9024e13ed7d63297296d3985c62f24be0c5c9749515ed49342aa50,2024-07-17T14:58:25.510000
CVE-2024-28899,0,0,fe8eba7dbe9024e13ed7d63297296d3985c62f24be0c5c9749515ed49342aa50,2024-07-17T14:58:25.510000
CVE-2024-2890,0,0,9145153c62723ee7e49f3ca1acfeda5a8485eb432feca5d0a512548ba9b8f021,2024-03-28T12:42:56.150000
CVE-2024-28900,0,0,2bc55895bc4ad7b643642c3643964561a9ea84ad48c52a8b405f069c5af07b45,2024-04-10T13:24:00.070000
CVE-2024-28901,0,0,7ccda862f4452d0cfeec56bcbe787ffa93cef01fb8ea325187c1a29815bd0d34,2024-04-10T13:24:00.070000
@ -248604,8 +248615,8 @@ CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
CVE-2024-28992,1,1,19a63c4052cdaff0d7746db7eeae97f54e5681bf9669cce818ddbbe24f83c37f,2024-07-17T15:15:13.623000
CVE-2024-28993,1,1,eb2584493870b2cc973f87466125031a7ce8888dd862a361e8286f2ec84e3c54,2024-07-17T15:15:13.860000
CVE-2024-28992,0,0,19a63c4052cdaff0d7746db7eeae97f54e5681bf9669cce818ddbbe24f83c37f,2024-07-17T15:15:13.623000
CVE-2024-28993,0,0,eb2584493870b2cc973f87466125031a7ce8888dd862a361e8286f2ec84e3c54,2024-07-17T15:15:13.860000
CVE-2024-28995,0,0,676b16f660765af69774a2536c884c955247c2299098c9e12021fd7eab69b47f,2024-06-11T17:47:22.867000
CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000
CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000
@ -248715,7 +248726,7 @@ CVE-2024-29116,0,0,d85dc6ae194d83c2dbd05b4e1cc8c25eaf9e91cd72cd7e6ae549c7eb131b7
CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba209,2024-03-19T16:33:58.680000
CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000
CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000
CVE-2024-29120,1,1,57c69d0a65b3be3d0141e020fc6744b979b3f4106915daeb8a4d6dccf1146ae4,2024-07-17T15:15:14.090000
CVE-2024-29120,0,1,1564385a8634243b0bf6719fe348c3c8819fbd8e4f6ed133da34ee226bba0ad6,2024-07-17T16:15:04.157000
CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000
CVE-2024-29122,0,0,661ef3e986563bd80f846a4ddab64b8b192e2d4e3524465144ceb6bed1a37def,2024-03-19T16:33:58.680000
CVE-2024-29123,0,0,ebf9249691adeb2d60017b147325d5448759ac253d439ee41cb427cd5527b99e,2024-03-19T16:33:58.680000
@ -248976,7 +248987,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
CVE-2024-29737,0,1,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000
CVE-2024-29737,0,0,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
@ -249254,7 +249265,7 @@ CVE-2024-3001,0,0,157ee6d688c61b76ec7ba619d8738893e2c3dd046dfcff3cfe2620de606162
CVE-2024-30010,0,0,960cee1392de0c41bedaaa06380ebec569c80eb1e0c43d5be6b9f599be25316a,2024-05-14T19:17:55.627000
CVE-2024-30011,0,0,38c790406b87ab6b2ddbb41025ef4821371b3f2d3c13d0b393df41ab8dbbad42,2024-05-14T19:17:55.627000
CVE-2024-30012,0,0,89616779728136c0e63e8233b5f02065551f689a98f1954d65a3da837e43a7e5,2024-05-14T19:17:55.627000
CVE-2024-30013,0,1,f478157eeb1833ae51e2ac0ceb6afdb627ef67dde6d178eb99f5ca6d25e1ddb1,2024-07-17T14:53:41.397000
CVE-2024-30013,0,0,f478157eeb1833ae51e2ac0ceb6afdb627ef67dde6d178eb99f5ca6d25e1ddb1,2024-07-17T14:53:41.397000
CVE-2024-30014,0,0,99781d294061af674406e31c02c7e8e39a8b8590cdd6b6fcdac0c38c893838d9,2024-05-14T19:17:55.627000
CVE-2024-30015,0,0,ad2627333c54aa111a2c46b1d45b1e88ff33bfeb60da921a4a7323324f35b320,2024-05-14T19:17:55.627000
CVE-2024-30016,0,0,6be84956c51ebe9ac11523a4363502971eaa1a12ef6e760cd6ca43427e081ae1,2024-05-14T19:17:55.627000
@ -249306,7 +249317,7 @@ CVE-2024-30058,0,0,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4
CVE-2024-30059,0,0,63a2dab80c660c9c44dee394d6c5e0990ac774d032d077b9543992d53c1c870c,2024-05-14T19:17:55.627000
CVE-2024-3006,0,0,ec8b37c3fe07f44a3179e7ebf781c249c3b3c8917cb2a412d723e57af1e94421,2024-05-17T02:39:40.117000
CVE-2024-30060,0,0,170f06dd18b0242e35e93fc627100402871706522f8f1a46d4997e07766785e5,2024-05-17T18:36:05.263000
CVE-2024-30061,0,1,47e89b718a221df676ebdc38f53a8432f70601d8b30297d685a6b467348435f5,2024-07-17T15:22:46.897000
CVE-2024-30061,0,0,47e89b718a221df676ebdc38f53a8432f70601d8b30297d685a6b467348435f5,2024-07-17T15:22:46.897000
CVE-2024-30062,0,0,4bfd7750976332cbf3138fa7bc5c8220095dd88b267408654f472c79216ff00b,2024-07-02T14:23:40.820000
CVE-2024-30063,0,0,a6c18ee19af78813a7336be786c53d09e4ab4504175485aac84c4fe78f9e753b,2024-07-02T14:17:47.710000
CVE-2024-30064,0,0,7a179afa450eed85d7ee628ffb2feb5ee613adc6c371f16fb51f2d7c19805799,2024-07-02T13:51:08.770000
@ -249317,17 +249328,17 @@ CVE-2024-30068,0,0,40e0501da9121c8921f48e54ff9fa8bfd0e783172677a105bbf10481729a1
CVE-2024-30069,0,0,deb50ce8845cbfc107c18b1f615c5e79d1900e91fb30c5e5400bb2a0a03756b4,2024-06-24T20:53:31.637000
CVE-2024-3007,0,0,e54b5032410fd6611f6f329a659224824e2d3526a1f829a3bd944d33dfe7d4c8,2024-05-17T02:39:40.200000
CVE-2024-30070,0,0,adcd33c65d2107ae368f3f42d041f903793454e0586bb07bd95af34f1010c4e3,2024-06-24T20:57:17.147000
CVE-2024-30071,0,1,44d2f1eb1bb49f1e98b0a0f9d04ebf8c83efe40aeafeb84e5e474c59a9ceb532,2024-07-17T15:22:16.003000
CVE-2024-30071,0,0,44d2f1eb1bb49f1e98b0a0f9d04ebf8c83efe40aeafeb84e5e474c59a9ceb532,2024-07-17T15:22:16.003000
CVE-2024-30072,0,0,97d5f63ada8ab1315d025e356ee152997d3218d241b1f758da64c2c6bba26351,2024-06-24T20:57:43.443000
CVE-2024-30074,0,0,ee343b6e3d8710663ab4373173304b773ce84c2ec9a4e2e7e71a3ef83693d6a1,2024-06-24T20:52:05.630000
CVE-2024-30075,0,0,20afea693ae588057c67b37c402ad96cc0e98db5bd0babb8ba4d0c72bc655415,2024-06-24T20:52:28.660000
CVE-2024-30076,0,0,31ac0642686a106a28c09e097ab78925435d7322de2d4346e2edff0182857b6f,2024-06-21T19:41:03.030000
CVE-2024-30077,0,0,9a30770d4bf93041f649ff379997b0a3f4cc9a380975d61cb6c6f7f6e9014e8b,2024-06-21T19:47:55.517000
CVE-2024-30078,0,0,4b74deca517b3ec468c53d0180c45487018849a36429ef886b99be12d4a468a0,2024-06-21T19:48:29.993000
CVE-2024-30079,0,1,660c9b7657fdec59db5564b153edc9c4243fb2af5ed73417166113ba6323c7af,2024-07-17T15:21:48.743000
CVE-2024-30079,0,0,660c9b7657fdec59db5564b153edc9c4243fb2af5ed73417166113ba6323c7af,2024-07-17T15:21:48.743000
CVE-2024-3008,0,0,aa1ee66fe6c6288575f75f6aed231bba9bb6b91d0c1d395345dcded74ac78eb9,2024-05-17T02:39:40.280000
CVE-2024-30080,0,0,4b4af52675429142241752bb6e7498a5bdc562b265b368499568e94d687a9e67,2024-06-12T14:19:52.130000
CVE-2024-30081,0,1,2fdbba21e85b2e93940a1c7176943daeaab2e69717246f7e1024195ac06a6f83,2024-07-17T15:20:04.197000
CVE-2024-30081,0,0,2fdbba21e85b2e93940a1c7176943daeaab2e69717246f7e1024195ac06a6f83,2024-07-17T15:20:04.197000
CVE-2024-30082,0,0,ea52be258af0ce937157d122cbbf2c3c68f6371dd3a4567cc0c605f77673a9c1,2024-06-21T19:49:24.627000
CVE-2024-30083,0,0,ba9e747112ee6bd7a6e7408864801325657bb33753f6ea63b5d9a9dce79423cd,2024-06-21T19:02:52.253000
CVE-2024-30084,0,0,2ff230b9f7ca79d2e13580712575b84ad5e2b5c2664fbf927cd3b01799152a96,2024-06-21T19:03:20.890000
@ -249344,7 +249355,7 @@ CVE-2024-30094,0,0,514619b1cab4b16ee2b8cc0a712a19212d3722a46e562ecc92a699aeb81d9
CVE-2024-30095,0,0,3ca723811cbcc22a7cbe54c86ce8532c877297a00e3a867feee4bb18679188e3,2024-06-20T18:07:39
CVE-2024-30096,0,0,c59073294a7980b121661d62726a35e5b0fa89f36897dbefb926306f5bb60913,2024-06-20T18:07:54.607000
CVE-2024-30097,0,0,f361afbd70ccc890d692f083fd284f120dfac451b933c5b40f4e41c071d8eca6,2024-06-20T17:51:00.143000
CVE-2024-30098,0,1,09c5b6409d3e95ced7b00a5061b997d5ad6d5a991002dfb4be505b85d375aa03,2024-07-17T15:17:02.427000
CVE-2024-30098,0,0,09c5b6409d3e95ced7b00a5061b997d5ad6d5a991002dfb4be505b85d375aa03,2024-07-17T15:17:02.427000
CVE-2024-30099,0,0,db3c3d3c9e3886f5309ac400fba039a8c973cea5a32a1f27eb983b80e99639dd,2024-06-20T17:48:07.827000
CVE-2024-3010,0,0,668693db697792f1de7ebacb601ecaac4e994b5f7b4a01f36e6acdb1feb8c944,2024-05-17T02:39:40.450000
CVE-2024-30100,0,0,14f6b9813ac638b86d717febb4a15a85c4096212ce5140313ca121a45e513d65,2024-06-20T17:31:07.867000
@ -251401,7 +251412,7 @@ CVE-2024-32983,0,0,7489fbad6376785f49f56ce362b652d6fa65a99d3abef06273a5e7cd5b544
CVE-2024-32984,0,0,cf23c5c25b44382dc62969ab40994ebd20f92f606203e0df0758e1f5fd04d250,2024-05-01T13:01:51.263000
CVE-2024-32985,0,0,97f6a9c9297a9183e90a31c05f9f9e4b47eb6199c5c52e0c990fbed76f951b64,2024-05-14T16:12:23.490000
CVE-2024-32986,0,0,671f263f68a441853ebd089c75e8acc8cd4334ffc16795c16c078d2e79568d60,2024-05-03T12:48:41.067000
CVE-2024-32987,0,1,3dbdad061c9240280d4dc8231b0393e26308cad2764cd77f3d1444baaef0b376,2024-07-17T15:12:16.427000
CVE-2024-32987,0,0,3dbdad061c9240280d4dc8231b0393e26308cad2764cd77f3d1444baaef0b376,2024-07-17T15:12:16.427000
CVE-2024-32988,0,0,b75452c4939042145070e3930ee08a16366c08052457addaa745b6ead2778cf4,2024-07-03T01:57:22.273000
CVE-2024-32989,0,0,930c4066a7d7ffe138e3e94b521b0b534bff3256282035d886a74b2481f4351c,2024-06-14T08:15:40.147000
CVE-2024-3299,0,0,0bc35e84cd3916be2956d4a01095bdb7e2b9b6d734c61138badfae1815ded68d,2024-04-04T16:33:06.610000
@ -252546,12 +252557,12 @@ CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502
CVE-2024-35049,0,0,7f4be420d91d9a8f87262bac46be64324b444d7ac3ac1587575b0d32b81ff685,2024-07-03T02:01:14.393000
CVE-2024-3505,0,0,07b0949681fcc5ca8054aa7f9f47a8f95432c3a4c9c46506fc21cb30ad4bc3b4,2024-04-15T13:15:31.997000
CVE-2024-35050,0,0,b0236daac2c3966aba94745c646c21ffa4a26fe8fffa2e95528779869a71d061,2024-07-03T02:01:15.190000
CVE-2024-35056,0,0,16dc4275b0cfbca58cc27c0abc7f1bb6be6c851eb5ff9928c2e1727e56db4f0b,2024-05-22T12:46:53.887000
CVE-2024-35057,0,0,47daba873776057e2d4f676fce8093d9bdbcad7aad68b4565ea6ee9e1578c2b8,2024-07-03T02:01:16.030000
CVE-2024-35058,0,0,4c978a9f2fc0df6f46d5cd8467aac76a67a01324702f33fa24c016ab3c438d5f,2024-07-03T02:01:16.830000
CVE-2024-35059,0,0,32912879e1c71e5bdf72eb54227af1385b5c1aeaf3f83f89bda60480d159c776,2024-07-03T02:01:17.657000
CVE-2024-35060,0,0,dc3ef8cd004453780e3b8edd242ed99b58513de18965db0f3e2846c3a0b0c40c,2024-07-03T02:01:18.427000
CVE-2024-35061,0,0,1c542ec6e66af9696bb08f80c7cf7f3caa0aed339c06075b5f11bddb7ba214b6,2024-07-03T02:01:19.220000
CVE-2024-35056,0,1,8565a05e21722b6468100569afab64d032af5dd0d84afa306557ca3914cda2b4,2024-07-17T17:15:15.263000
CVE-2024-35057,0,1,d8b1391320f9fe3f708b665b55b5674c28a9f0e4154226e928eddc897ac177b6,2024-07-17T16:15:04.577000
CVE-2024-35058,0,1,04c708d4f2b869ae5964d1930cfec2987e068cdd18122deca793d922c4c5f892,2024-07-17T16:15:04.673000
CVE-2024-35059,0,1,dfcf8d668815ccc0d32854da2c20a083e119b7332e8581c76bd10f4eac9a5fc5,2024-07-17T16:15:04.743000
CVE-2024-35060,0,1,afba2b727938592df1bdc4e63013255006d044a72a697f992c598613bec84c11,2024-07-17T16:15:04.813000
CVE-2024-35061,0,1,0df2890e20c38a1c44b9989903bccbfb46c27c7aacdaa254a5eaf724f2825eba,2024-07-17T16:15:04.877000
CVE-2024-3507,0,0,e1e1d417278f9c0917e2f747f1a5409d7cbe66638a172abe25b5d37d3cb7fea7,2024-05-09T09:15:09.623000
CVE-2024-35079,0,0,e84edcd2514df6046335465f030b9492060083fdead2f3e795ca695702202f46,2024-05-24T01:15:30.977000
CVE-2024-3508,0,0,2b43f9e122cbb6c5d0ee83530dba132ab3fde8d83c6c2582c0a69215807219e4,2024-07-03T02:06:18.367000
@ -252670,13 +252681,13 @@ CVE-2024-35255,0,0,dd2820217033d300b334ae05889b3c3f413c0da4e96707fa039fcafe96b24
CVE-2024-35256,0,0,f2176a2df1a1016e0c34600dbc0c04e96b8b2ff9ee36a42a63c8d07aa875d956,2024-07-09T18:18:38.713000
CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a875,2024-05-17T02:39:59.067000
CVE-2024-35260,0,0,bae5987a3d9c4653f4a8ff7faa6c237ff82527372850961d3f63629ac612e217,2024-06-28T23:15:11.457000
CVE-2024-35261,0,1,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
CVE-2024-35263,0,0,f00bc0132870d05293845d05b9562badae38c6c7b9bb0d9a00ba1c99b84818b6,2024-06-20T16:32:31.287000
CVE-2024-35264,0,0,93e7c701e1ef80d310b24809194d2644700ad22a6619971e5ca319f8f5a7b423,2024-07-09T18:18:38.713000
CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a65fe,2024-06-20T16:33:28.080000
CVE-2024-35266,0,1,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
CVE-2024-35267,0,1,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
CVE-2024-35270,0,1,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
CVE-2024-35271,0,0,ee259a85b11b42f5d67859c38048c87bcc97aeeff99de7fbccf3c51a87496287,2024-07-09T18:18:38.713000
CVE-2024-35272,0,0,55d3634b78756e5083c3b18df66ba37f596f725525c674e71f12fc5934283aaf,2024-07-09T18:18:38.713000
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
@ -253295,7 +253306,7 @@ CVE-2024-36079,0,0,1e2dcd2fe0cc0022dd8426ccc07dbea151a33827bd6b4942f04e6d514f334
CVE-2024-3608,0,0,75396bd996e12a3ce8a9ff63abbadebbd8d739cc9bf3ff2fa94cd5f3927fb0bc,2024-07-09T18:19:14.047000
CVE-2024-36080,0,0,da30944dd5f9aaf294ce90387953495c39dbdb27b4381b7b68cb89306c216ee7,2024-05-20T13:00:04.957000
CVE-2024-36081,0,0,c544e7869c5ec75fe9184642046715e701981d636db6ea51043baf583a03d0a7,2024-05-20T13:00:04.957000
CVE-2024-36082,0,0,b8e7b6d9e14eaf4d125a408e307f9f5abe41cd99981b6293786ad11f7aff5d20,2024-06-07T14:56:05.647000
CVE-2024-36082,0,1,f7d91a74fa3aead10b2ec52a9288bf7d0bfd73f843bd97503d83eff0dca4633d,2024-07-17T17:36:42.157000
CVE-2024-3609,0,0,98f712ab6d3428e860037aa84c451c639120d9d1fac4fc19a3b7a77c0372bf73,2024-05-17T18:36:05.263000
CVE-2024-3610,0,0,10f31cdf4f921aa769d51886cc413a224f2abfc93c76d4774c45d5585f195bb4,2024-07-17T03:06:50.080000
CVE-2024-36103,0,0,fcc35d49dc45666e220585dc55b1ab5f98eb767c9d2a7ebae31a9f259d616b20,2024-07-08T14:18:36.887000
@ -253693,7 +253704,7 @@ CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44d
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
CVE-2024-36821,0,0,bcd10931e6c0a8f8cf295a0a0e9e50fc33c10d8062ba9f55622804927e2b8c50,2024-06-17T21:15:50.960000
CVE-2024-36823,0,1,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000
CVE-2024-36823,0,0,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000
CVE-2024-36827,0,0,d5b65af3d7b9322aad3b5478f72ede9b79c676edb352f8fbc888d8aac5e59f92,2024-06-07T19:24:09.243000
CVE-2024-36829,0,0,28d6b2d4311b85588cbd36851085bf0d595d08bf8e4f0076b3a54116663e3c85,2024-06-27T12:47:19.847000
CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000
@ -253800,11 +253811,11 @@ CVE-2024-36961,0,0,4e4b446649db320a139f4aa3bca09c9bc55ac839253094093faf8717c1669
CVE-2024-36962,0,0,59e83fa3c9b67ee4ca190998e86f2192864a4ec787e1574961ab1bfb7f8942b2,2024-06-03T14:46:24.250000
CVE-2024-36963,0,0,9babc41f15278c97e25649f1d781a93b01c025406e91090bbc0d7680e835d154,2024-06-03T14:46:24.250000
CVE-2024-36964,0,0,49af3173fdbcf36d2da73042cc4bf87777abec14f46c8d6af8dee65266d543cb,2024-06-27T12:15:28.493000
CVE-2024-36965,0,0,f5d385c4e0bd3f04df0a14fe5ec7122b321dc981e94b27b487212e71aecb371a,2024-06-10T02:52:08.267000
CVE-2024-36965,0,1,f3145e6076d1b300dfd59296285f95e07925904a4fe3d12b79e2e88ad523ab1d,2024-07-17T17:32:46.323000
CVE-2024-36966,0,0,326aa1456c7d6a589fd3d080fdabfec28366683a9b29eb8845eaaecfa92989d4,2024-06-10T02:52:08.267000
CVE-2024-36967,0,0,e7a974a7fd2dc60a097bc75137c728f9243c3523fb643de85996d962d67d6606,2024-06-10T02:52:08.267000
CVE-2024-36968,0,0,a0da1398753fc8cfd97d5d7debc45c35c6f32a9f14377a9e19abee766fb7a4c7,2024-06-12T10:15:31.153000
CVE-2024-36969,0,0,676b08aa072aadbde6876e459297c3d8e0afc87c846527c689dd2f6bcfff6567,2024-06-10T02:52:08.267000
CVE-2024-36967,0,1,5a5412327937f70e23b817f9208c62be87df3af9d3355a5d62da2596debd75c7,2024-07-17T17:03:53.860000
CVE-2024-36968,0,1,a995bed3e48bd8c81f02b7e9d11197af7d121a937f63236c67c72482dd84f10b,2024-07-17T16:59:39.987000
CVE-2024-36969,0,1,e622ab8131a3dbc40ec2fb2b416de8073d7058b237c224b8ddf44dea78c18b59,2024-07-17T16:50:29.427000
CVE-2024-3697,0,0,6e56c636d90d09536d9c0a6418223e2755a5c4ad9d107f96b9c5e19a7cee17c5,2024-06-04T19:20:23.323000
CVE-2024-36970,0,0,0be07b4bb0193dcb8a27320342404deac5519d2395e7535b8d9bd5f09d14f42b,2024-06-10T02:52:08.267000
CVE-2024-36971,0,0,de65a190b8fa52a05c781885192c5cd5695d332f2566b571c1075e1e0d1946f8,2024-07-15T07:15:06.480000
@ -254308,7 +254319,7 @@ CVE-2024-37977,0,0,fc6cdf1fcb13c0b297637d2640fd367e1afe7a1dfb5055043578b69faed9f
CVE-2024-37978,0,0,a3d0955f8e935b6424318b62f7dfa6459b27869862422e3f5ad0e3ba6b11fd8e,2024-07-16T16:39:11.783000
CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e752003573,2024-07-12T10:15:01.757000
CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000
CVE-2024-37984,0,1,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000
CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000
CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000
CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd53a,2024-07-12T18:51:17.253000
CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000
@ -254500,6 +254511,7 @@ CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d9
CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000
CVE-2024-38441,0,0,a973f5143c6734e984ff9aea01be1b9a40b4154f243a146a34adc1cd56beda46,2024-07-03T02:05:01.423000
CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f7ac,2024-07-03T02:05:02.417000
CVE-2024-38446,1,1,b04d7515b675c405f0f45f4e3ae58147e1e5c76f8dea8c6f0942db8e3e7e52a0,2024-07-17T17:15:15.340000
CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000
CVE-2024-38449,0,0,8da6f80ac88bb7ae3e1140e6ee8382a2d6cd1d0a7f86d02f23b41c1048f2d2ac,2024-06-20T12:44:22.977000
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
@ -254715,6 +254727,7 @@ CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
CVE-2024-38870,1,1,fb5c3c06e47864ea011fc924b12dcd6de68c4dd7aef6db354e1586605c77e41d,2024-07-17T17:15:15.407000
CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000
CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
@ -255695,7 +255708,7 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
CVE-2024-4387,0,0,e174205a853415a731f22788a3c678b3fe9a7067078ee3c331ab7c9e4e787abd,2024-06-11T10:15:13.637000
CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed80c,2024-07-03T02:07:30.200000
CVE-2024-4390,0,1,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000
CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000
CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
@ -255846,7 +255859,7 @@ CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000
CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000
CVE-2024-4565,0,1,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
@ -256248,7 +256261,7 @@ CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cb
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
CVE-2024-5042,0,0,c3d6fb16f7772dc95314f5d39db0c2c7a2e9ceddf7ac90a69b75b86287dc9853,2024-05-20T06:15:08.723000
CVE-2024-5042,0,1,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000
CVE-2024-5043,0,0,e8af684a96b52a20f139d3c6a27bd63fd7606ea9b2bbde97322bc475920cc410,2024-06-04T19:20:57.007000
CVE-2024-5044,0,0,a4e177741479e530ad4105167bd81efc2f0690ac50664dc5a5f1c197ba9e227b,2024-06-04T19:20:57.117000
CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38befe,2024-06-20T20:15:20.153000
@ -256392,7 +256405,7 @@ CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca44
CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000
CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000
CVE-2024-5211,0,0,98a88a37609463fc748729234fb7fa88ed6b19a9a862440dab2a89ae616c7fd0,2024-06-13T18:36:09.010000
CVE-2024-5213,0,1,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000
CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000
CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000
@ -256707,7 +256720,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000
CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
CVE-2024-5605,0,1,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000
CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
@ -256766,7 +256779,7 @@ CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a40205
CVE-2024-5683,0,0,d868b38bbdf38c932e73ada9d6770c9e54d9ba7e4690e6e76a9813e02684500a,2024-06-24T12:57:36.513000
CVE-2024-5684,0,0,6dc10e55a9350eba996ce70432d644a2a60e5231b687551b107b8ab41fb44f1c,2024-06-11T18:13:30.163000
CVE-2024-5685,0,0,08c398f5d772f4e953acbb7297cc0e7eb76495399d04b916942753d822d0eb8a,2024-06-19T09:15:12.173000
CVE-2024-5686,0,1,cbff644a511c56c86a9bc5a9eadb1558b8ef31726954231e162a4de347930b71,2024-07-17T14:00:51.097000
CVE-2024-5686,0,0,cbff644a511c56c86a9bc5a9eadb1558b8ef31726954231e162a4de347930b71,2024-07-17T14:00:51.097000
CVE-2024-5687,0,0,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a49,2024-07-03T02:09:09.507000
CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000
CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000
@ -257342,7 +257355,7 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812
CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000
CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000
CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000
CVE-2024-6716,0,1,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000
CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
CVE-2024-6729,0,0,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000
@ -257363,7 +257376,7 @@ CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744
CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000
CVE-2024-6745,0,0,707134dd0252b920cb08895baec52c5557bd805c744814b8ecb19c1d5a8e997c,2024-07-15T13:00:34.853000
CVE-2024-6746,0,0,5be3956d6b4bf01a386e4ceaf78307e768b453c5db30b63143d293a79513dc46,2024-07-15T13:00:34.853000
CVE-2024-6765,1,1,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6772,0,0,7a4dce423c8b75d7fc80a06f5d75b304a1c3cb61b88f44b30dd94156af9ab8e1,2024-07-17T13:34:20.520000
CVE-2024-6773,0,0,654a62798e16ce714df475111f6e31ff6e77aaddc1afe3d8197169aa0cc75c10,2024-07-17T13:34:20.520000
CVE-2024-6774,0,0,0f3cc582272659253674ecee7c57df9b3dd3beface4cf327560cfa540ecb6546,2024-07-17T13:34:20.520000
@ -257378,5 +257391,6 @@ CVE-2024-6802,0,0,386226bce7b12b7500a7728e6323db5d69291b7883c492fa520631c141d51c
CVE-2024-6803,0,0,698fb954222e7db5d1598623eedb3617e795f993f29a35b3e0ac7c1569604491,2024-07-17T13:34:20.520000
CVE-2024-6807,0,0,60acf58925408625a444a0bb6ffc77398b3b984199e5b0e4e7ba5e371b31f55b,2024-07-17T13:34:20.520000
CVE-2024-6808,0,0,3a00e9424f53f949f24f8fa3178541f767416b62c1774aa92b0bd33913b590b8,2024-07-17T13:34:20.520000
CVE-2024-6833,1,1,3413cde71be04af9401438f2e88082472da182157d5228c0b22197695cc5f3e4,2024-07-17T15:15:14.783000
CVE-2024-6834,1,1,99f8ea29fa03e31a6af2ce064aa9fd7b4382ba6feca62446a99f21c128c9ffca,2024-07-17T15:15:14.970000
CVE-2024-6830,1,1,60f28c1fb50141725412922ce0efd210649f557c584d5f897664d0d4bae9b210,2024-07-17T16:15:05.540000
CVE-2024-6833,0,0,3413cde71be04af9401438f2e88082472da182157d5228c0b22197695cc5f3e4,2024-07-17T15:15:14.783000
CVE-2024-6834,0,0,99f8ea29fa03e31a6af2ce064aa9fd7b4382ba6feca62446a99f21c128c9ffca,2024-07-17T15:15:14.970000

Can't render this file because it is too large.