Auto-Update: 2024-08-22T16:00:17.779913+00:00

This commit is contained in:
cad-safe-bot 2024-08-22 16:03:14 +00:00
parent 007343481f
commit a2cb96d584
79 changed files with 3947 additions and 437 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2003-0063",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-03-03T05:00:00.000",
"lastModified": "2024-06-15T10:15:10.083",
"lastModified": "2024-08-22T15:35:00.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,6 +74,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-150"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9515",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-29T22:29:00.520",
"lastModified": "2024-07-19T14:15:02.500",
"lastModified": "2024-08-22T15:35:01.630",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "nvd@nist.gov",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31196",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-07-14T18:15:09.463",
"lastModified": "2024-08-22T01:00:01.277",
"vulnStatus": "Modified",
"lastModified": "2024-08-22T14:13:46.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-21",
"cisaActionDue": "2024-09-11",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-27486",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-08-13T16:15:07.693",
"lastModified": "2024-08-13T17:11:53.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:29:44.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5.0",
"versionEndExcluding": "5.6.2",
"matchCriteriaId": "31921E5A-497A-4BD6-9BE8-2307272F3FEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiddos:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "258903F9-C0F0-40CD-8895-43FF00C71709"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "561DFFB8-E39C-40D1-A7E7-255BDD6F9F73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.0",
"versionEndExcluding": "6.4.2",
"matchCriteriaId": "777DD368-CD36-4842-BA0F-C7C64E7D2A78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB1731B-7799-408B-8F8C-F5ABFEA7A180"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-047",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27540",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-06-28T19:15:03.407",
"lastModified": "2024-07-01T12:37:24.220",
"lastModified": "2024-08-22T15:35:02.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se ha identificado una posible vulnerabilidad de tiempo de verificaci\u00f3n a tiempo de uso (TOCTOU) en el BIOS de HP para ciertos productos de PC HP, que podr\u00eda permitir la ejecuci\u00f3n de c\u00f3digo arbitrario, denegaci\u00f3n de servicio y divulgaci\u00f3n de informaci\u00f3n. HP est\u00e1 lanzando actualizaciones de BIOS para mitigar la vulnerabilidad potencial."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_10810714-10810745-16/hpsbhf03948",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-30288",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-04T23:15:08.500",
"lastModified": "2024-08-03T07:15:50.983",
"lastModified": "2024-08-22T15:35:03.537",
"vulnStatus": "Modified",
"cveTags": [
{
@ -43,6 +43,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45862",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-08-13T16:15:07.977",
"lastModified": "2024-08-13T17:11:53.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:32:16.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.4.0",
"matchCriteriaId": "C73A0CBF-65BB-4C0A-9A4C-ABE88AF340DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.2.2",
"matchCriteriaId": "F1C48730-14E4-4B4A-AD08-BA23903D961E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.2.6",
"matchCriteriaId": "C84C7A2F-EE15-4CAA-BC3F-A7FDD8A4574F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.4.0",
"matchCriteriaId": "1F1595B0-CE4A-4B4E-9F5E-A411A012086F"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-445",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24068",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-23T07:15:10.967",
"lastModified": "2024-08-02T11:16:10.173",
"lastModified": "2024-08-22T15:35:03.853",
"vulnStatus": "Modified",
"cveTags": [
{
@ -43,6 +43,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26211",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-08-13T16:15:08.220",
"lastModified": "2024-08-13T17:11:53.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:33:54.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.3.3",
"matchCriteriaId": "3ECE9A3F-7C5F-4A34-ABB2-CD4E1997CE0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisoar:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C3F0E60-3285-43B0-83CD-98A0D5445114"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-088",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40110",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.420",
"lastModified": "2024-02-16T13:37:55.033",
"lastModified": "2024-08-22T14:35:01.077",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En m\u00faltiples funciones de MtpPacket.cpp, existe una posible escritura fuera de los l\u00edmites debido a un MtpPacket.cpp. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/53243faf690a49e00952b3d3956d2fff0b8d4a3c",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42945",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:51.140",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-08-22T14:35:01.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Una aplicaci\u00f3n puede obtener acceso no autorizado a Bluetooth."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213984",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47234",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T21:15:17.420",
"lastModified": "2024-04-28T07:15:08.703",
"lastModified": "2024-08-22T15:35:04.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52376",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T06:15:08.290",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-08-22T14:35:03.367",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de gesti\u00f3n de informaci\u00f3n en el m\u00f3dulo Galer\u00eda. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-225"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5517",
"sourceIdentifier": "security-officer@isc.org",
"published": "2024-02-13T14:15:45.510",
"lastModified": "2024-05-03T13:15:20.990",
"lastModified": "2024-08-22T14:35:04.137",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/13/1",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0038",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.157",
"lastModified": "2024-02-16T13:37:51.433",
"lastModified": "2024-08-22T14:35:04.960",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En injectInputEventToInputFilter de AccessibilityManagerService.java, existe una posible inyecci\u00f3n de evento de entrada arbitraria debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/3e88d987235f5a2acd50a9b6bad78dbbf39cb079",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21757",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-08-13T16:15:08.637",
"lastModified": "2024-08-13T17:11:53.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:34:54.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +81,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.11",
"matchCriteriaId": "D5275A3C-5468-424E-B3BB-897221D2B8D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "6F3D28A9-5CFD-4838-9630-D6E09FB63CE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "CB15106A-8295-4A9E-B5C8-FA9654636B15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.11",
"matchCriteriaId": "5B1EF673-5967-401E-98E3-B7A2B1BEF037"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "4763E504-6974-42C5-B912-3E62A9CC312A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-467",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22243",
"sourceIdentifier": "security@vmware.com",
"published": "2024-02-23T05:15:08.143",
"lastModified": "2024-06-10T18:15:25.757",
"lastModified": "2024-08-22T15:35:05.027",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240524-0001/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23466",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-07-17T15:15:11.270",
"lastModified": "2024-07-18T12:28:43.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T15:23:31.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2023.2.4",
"matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58"
}
]
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm",
"source": "psirt@solarwinds.com"
"source": "psirt@solarwinds.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23472",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-07-17T15:15:12.627",
"lastModified": "2024-07-18T12:28:43.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T15:59:11.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2023.2.4",
"matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58"
}
]
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm",
"source": "psirt@solarwinds.com"
"source": "psirt@solarwinds.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24746",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-06T12:15:08.310",
"lastModified": "2024-05-01T18:15:14.767",
"lastModified": "2024-08-22T14:35:07.450",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Bucle con vulnerabilidad de condici\u00f3n de salida inalcanzable (\"bucle infinito\") en Apache NimBLE. La operaci\u00f3n GATT especialmente manipulada puede causar un bucle infinito en el servidor GATT que lleva a la denegaci\u00f3n de servicio en la pila o dispositivo Bluetooth. Este problema afecta a Apache NimBLE: hasta 1.6.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.7.0, que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -26,6 +49,16 @@
"value": "CWE-835"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25639",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T15:15:21.423",
"lastModified": "2024-07-08T15:49:22.437",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:59:56.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,20 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +85,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.13.0",
"matchCriteriaId": "2678B39E-00C3-4B4E-9857-FD3F90D30A7B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/khoj-ai/khoj/commit/1dfd6d7391862d3564db7f4875216880b73cb6cc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/khoj-ai/khoj/security/advisories/GHSA-h2q2-vch3-72qm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28992",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-07-17T15:15:13.623",
"lastModified": "2024-07-18T12:28:43.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T15:56:58.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2023.2.4",
"matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58"
}
]
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm",
"source": "psirt@solarwinds.com"
"source": "psirt@solarwinds.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28993",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-07-17T15:15:13.860",
"lastModified": "2024-07-18T12:28:43.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T15:54:56.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3",
"matchCriteriaId": "291497A0-F464-40AD-8060-A985A2F8D2D0"
}
]
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm",
"source": "psirt@solarwinds.com"
"source": "psirt@solarwinds.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30418",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.810",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-08-22T15:35:05.833",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,46 @@
"value": "Vulnerabilidad de verificaci\u00f3n de permisos insuficiente en el m\u00f3dulo de gesti\u00f3n de aplicaciones. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-280"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3016",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2024-05-14T15:39:46.243",
"lastModified": "2024-05-14T16:11:39.510",
"lastModified": "2024-08-22T15:35:08.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "NEC Platforms DT900 and DT900S Series 5.0.0.0 \u2013 v5.3.4.4, v5.4.0.0 \u2013 v5.6.0.20 permiten a un atacante acceder a una configuraci\u00f3n del sistema no documentada para cambiar la configuraci\u00f3n a trav\u00e9s de la red local con un usuario no autenticado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt-info@cyber.jp.nec.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34226",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T15:38:36.963",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-08-22T15:35:06.620",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en /php-sqlite-vms/?page=manage_visitor&id=1 en SourceCodester Visitor Management System 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s de los par\u00e1metros id."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/dovankha/CVE-2024-34226",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35386",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-21T14:15:12.400",
"lastModified": "2024-05-21T16:54:26.047",
"lastModified": "2024-08-22T15:35:07.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": " Un problema en Cesanta mjs 2.20.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n mjs_do_gc en el archivo mjs.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://github.com/cesanta/mjs/issues/286",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36439",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:15.883",
"lastModified": "2024-08-22T15:15:15.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain access to the administrative web interface via the device password's hash value, without knowing the actual device password."
}
],
"metrics": {},
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-038.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36440",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:15.977",
"lastModified": "2024-08-22T15:15:15.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used."
}
],
"metrics": {},
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-037.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36442",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:16.047",
"lastModified": "2024-08-22T15:15:16.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cgi-bin/fdmcgiwebv2.cgi on Swissphone DiCal-RED 4009 devices allows an authenticated attacker to gain access to arbitrary files on the device's file system."
}
],
"metrics": {},
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-039.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36443",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T14:15:08.443",
"lastModified": "2024-08-22T14:15:08.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP."
}
],
"metrics": {},
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-036.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36444",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:16.117",
"lastModified": "2024-08-22T15:15:16.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cgi-bin/fdmcgiwebv2.cgi on Swissphone DiCal-RED 4009 devices allows an unauthenticated attacker to gain access to device logs."
}
],
"metrics": {},
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-040.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T15:15:16.187",
"lastModified": "2024-08-22T15:15:16.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-035.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36505",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-08-13T16:15:08.970",
"lastModified": "2024-08-13T17:11:53.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:36:31.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.13",
"versionEndIncluding": "6.4.15",
"matchCriteriaId": "B26D3CC8-B77D-4C5C-B3AC-096679F47877"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.12",
"versionEndExcluding": "7.0.15",
"matchCriteriaId": "F754A050-02F5-4848-9065-5E15117B227E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.5",
"versionEndExcluding": "7.2.8",
"matchCriteriaId": "14113139-B64B-4069-A88F-D1999ED7EC18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "1FDDB5F3-D229-4208-9110-8860A03C8B59"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-012",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36775",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-06T22:15:10.753",
"lastModified": "2024-07-16T14:20:42.573",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T15:35:07.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3858",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-04-16T16:15:08.613",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-08-22T15:35:08.807",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Era posible mutar un objeto JavaScript para que el JIT pudiera fallar mientras lo rastreaba. Esta vulnerabilidad afecta a Firefox < 125."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888892",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39308",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T15:15:22.080",
"lastModified": "2024-07-08T15:49:22.437",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:22:34.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,30 +83,73 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rails_admin_project:rails_admin:*:*:*:*:*:ruby:*:*",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "5835771A-4E7F-409A-939E-8442D2E9A5CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rails_admin_project:rails_admin:*:*:*:*:*:ruby:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.1.3",
"matchCriteriaId": "516887D9-E69F-452C-B73F-7812CC6B4731"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/railsadminteam/rails_admin/commit/b5a287d82e2cbd1737a1a01e11ede2911cce7fef",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/railsadminteam/rails_admin/commit/d84b39884059c4ed50197cec8522cca029a17673",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/railsadminteam/rails_admin/issues/3686",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/railsadminteam/rails_admin/security/advisories/GHSA-8qgm-g2vv-vwvc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://rubygems.org/gems/rails_admin/versions/2.3.0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://rubygems.org/gems/rails_admin/versions/3.1.3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41054",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:13.557",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T14:11:42.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: ufs: core: solucione el problema de ejecuci\u00f3n de ufshcd_clear_cmd Cuando ufshcd_clear_cmd corre con el ISR de finalizaci\u00f3n, el ISR establecer\u00e1 la etiqueta completada del puntero mq_hctx de la solicitud en NULL. Y la llamada de ufshcd_clear_cmd a ufshcd_mcq_req_to_hwq obtendr\u00e1 un puntero NULL KE. Devuelve el \u00e9xito cuando ISR completa la solicitud porque sq no necesita limpieza. El flujo de ejecuci\u00f3n es: Hilo A ufshcd_err_handler paso 1 ufshcd_try_to_abort_task ufshcd_cmd_inflight(true) paso 3 ufshcd_clear_cmd ... ufshcd_mcq_req_to_hwq blk_mq_unique_tag rq->mq_hctx->queue_num paso 5 Hilo ufs_mtk_mcq_int r(cq completar ISR) paso 2 scsi_done ... __blk_mq_free_request rq-> mq_hctx = NULO; paso 4 A continuaci\u00f3n se muestra el rastreo de KE: ufshcd_try_to_abort_task: cmd pendiente en el dispositivo. etiqueta = 6 No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000194 pc: [0xffffffd589679bf8] blk_mq_unique_tag+0x8/0x14 lr: [0xffffffd5862f95b4] ufshcd_mcq_sq_cleanup+0x6c/0x1cc _mod_ise] Cola de trabajo: ufs_eh_wq_0 ufshcd_err_handler [ufs_mediatek_mod_ise] Seguimiento de llamadas: dump_backtrace+0xf8 /0x148 show_stack+0x18/0x24 dump_stack_lvl+0x60/0x7c dump_stack+0x18/0x3c mrdump_common_die+0x24c/0x398 [mrdump] ipanic_die+0x20/0x34 [mrdump] notify_die+0x80/0xd8 die+0x94/0x2b8 __do_kernel_fault+0x264/0x298 do_page_fault+ 0xa4/0x4b8 do_translation_fault+0x38/0x54 do_mem_abort+0x58/0x118 el1_abort+0x3c/0x5c el1h_64_sync_handler+0x54/0x90 el1h_64_sync+0x68/0x6c blk_mq_unique_tag+0x8/0x14 clear_cmd+0x34/0x118 [ufs_mediatek_mod_ise] ufshcd_try_to_abort_task+0x2c8/0x5b4 [ufs_mediatek_mod_ise] ufshcd_err_handler +0xa7c/0xfa8 [ufs_mediatek_mod_ise] process_one_work+0x208/0x4fc trabajador_hilo+0x228/0x438 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "F8F0E46F-AE23-4E3C-94C2-982292314C2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/11d81233f4ebe6907b12c79ad7d8787aa4db0633",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9307a998cb9846a2557fdca286997430bee36a2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bed0896008334eeee4b4bfd7150491ca098cbf72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41055",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:13.620",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:11:00.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evita la eliminaci\u00f3n de la referencia NULL ptr en pfn_section_valid() La confirmaci\u00f3n 5ec8e8ea8b77 (\"mm/sparsemem: corrige la ejecuci\u00f3n al acceder a la secci\u00f3n_memoria->uso\") cambi\u00f3 pfn_section_valid() para agregar un READ_ONCE() llame a \"ms->usage\" para arreglar una ejecuci\u00f3n con section_deactivate() donde se puede borrar ms->usage. La llamada READ_ONCE(), por s\u00ed sola, no es suficiente para evitar la desreferencia al puntero NULL. Necesitamos comprobar su valor antes de desreferenciarlo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.219",
"versionEndExcluding": "5.10.222",
"matchCriteriaId": "138634FF-1840-4C45-8CDE-6174B6F50352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.149",
"versionEndExcluding": "5.15.163",
"matchCriteriaId": "0720413E-F29A-4C0A-9B57-5158A778C4A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.76",
"versionEndExcluding": "6.1.100",
"matchCriteriaId": "6BFB68AD-DB7E-4C4C-B598-274D83D12C4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.15",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "9D8E9231-015C-48A6-BBDD-9DCEA3145858"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "6FAC1A24-181A-4DB7-801D-4BDF1B4E4116"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41070",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:14.787",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:05:32.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: PPC: Book3S HV: Prevenir UAF en kvm_spapr_tce_attach_iommu_group() Al inform\u00f3 un posible use after free (UAF) en kvm_spapr_tce_attach_iommu_group(). Busca `stt` en tablefd, pero luego contin\u00faa us\u00e1ndolo despu\u00e9s de realizar fdput() en el fd devuelto. Despu\u00e9s de fdput(), otro hilo puede cerrar el tablefd. El cierre llama a kvm_spapr_tce_release() y luego a release_spapr_tce_table() (a trav\u00e9s de call_rcu()) que libera `stt`. Aunque hay llamadas a rcu_read_lock() en kvm_spapr_tce_attach_iommu_group(), no son suficientes para evitar la UAF, porque `stt` se usa fuera de las regiones bloqueadas. Con un retraso artificial despu\u00e9s de fdput() y un programa de espacio de usuario que desencadena la ejecuci\u00f3n, KASAN detecta la UAF: ERROR: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm] Lectura de tama\u00f1o 4 en direcci\u00f3n c000200027552c30 por tarea kvm-vfio/2505 CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1 Nombre de hardware: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35 -g1851b2a06 Seguimiento de llamadas de PowerNV: dump_stack_lvl+0xb4/0x108 (no confiable) print_report+0x2b4/0x6ec kasan_report+0x118/0x2b0 __asan_load4+0xb8/0xd0 kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm] kvm_vfio_set_attr+0x524/0xac0 [kvm] kvm_device_ioctl+0x144/0x240 [kvm] sys_ioctl+0x62c/0x1810 system_call_exception+0x190/0x440 system_call_vectored_common+0x15c/0x2ec ... Liberado por la tarea 0: ... kfree+0xec/0x3e0 release_spapr_tce_table+0xd4/0x11c [rcu_core+0x568/0 x16a0 handle_softirqs+0x23c /0x920 do_softirq_own_stack+0x6c/0x90 do_softirq_own_stack+0x58/0x90 __irq_exit_rcu+0x218/0x2d0 irq_exit+0x30/0x80 arch_local_irq_restore+0x128/0x230 arch_local_irq_enable+0x1c/0x 30 cpuidle_enter_state+0x134/0x5cc cpuidle_enter+0x6c/0xb0 call_cpuidle+0x7c/0x100 do_idle+0x394 /0x410 cpu_startup_entry+0x60/0x70 start_secondary+0x3fc/0x410 start_secondary_prolog+0x10/0x14 Solucionarlo retrasando fdput() hasta que `stt` ya no est\u00e9 en uso, que es efectivamente toda la funci\u00f3n. Para mantener el parche m\u00ednimo, agregue una llamada a fdput() en cada una de las rutas de retorno existentes. El trabajo futuro puede convertir la funci\u00f3n a limpieza de estilo goto o __cleanup. Con la soluci\u00f3n implementada, el caso de prueba ya no activa la UAF."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.281",
"matchCriteriaId": "BCD1D392-BEF8-4D8D-B191-C64E1875241F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.223",
"matchCriteriaId": "12CD4E48-26A1-40B4-AF6A-1CC066193F4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.164",
"matchCriteriaId": "3D6B1E23-6E6C-4761-ACD4-EA687A95F56F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.101",
"matchCriteriaId": "2B46438B-72B8-4053-8554-94AED3EB13EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.42",
"matchCriteriaId": "972274A2-D688-4C37-BE42-689B58B4C225"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.11",
"matchCriteriaId": "01E300B3-8B39-4A2D-8B03-4631433D3915"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4cdf6926f443c84f680213c7aafbe6f91a5fcbc0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f856023971f97fff74cfaf21b48ec320147b50a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/82c7a4cf14aa866f8f7f09e662b02eddc49ee0bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9975f93c760a32453d7639cf6fcf3f73b4e71ffe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a986fa57fd81a1430e00b3c6cf8a325d6f894a63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b26c8c85463ef27a522d24fcd05651f0bb039e47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/be847bb20c809de8ac124431b556f244400b0491",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41073",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-29T15:15:15.020",
"lastModified": "2024-07-29T16:21:52.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T14:11:28.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,116 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme: evitar payload de double free especial Si es necesario volver a intentar una solicitud de descarte y ese reintento puede fallar antes de agregar un nuevo payload especial, se producir\u00e1 un double free. Borre RQF_SPECIAL_LOAD cuando se limpie la solicitud."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.164",
"matchCriteriaId": "1FF9AD93-F189-4A07-8D09-3DD62D5077A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.101",
"matchCriteriaId": "2B46438B-72B8-4053-8554-94AED3EB13EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.42",
"matchCriteriaId": "972274A2-D688-4C37-BE42-689B58B4C225"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.11",
"matchCriteriaId": "01E300B3-8B39-4A2D-8B03-4631433D3915"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42314",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:11.397",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:50:47.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige el use after free el mapa de extensi\u00f3n al agregar p\u00e1ginas a una biograf\u00eda comprimida En add_ra_bio_pages() estamos accediendo al mapa de extensi\u00f3n para calcular 'add_size' despu\u00e9s de que eliminamos nuestra referencia en el mapa de extensi\u00f3n, lo que resulta en un use-after-free. Solucione este problema calculando 'add_size' antes de eliminar nuestra referencia del mapa de extensi\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.6.44",
"matchCriteriaId": "2676880F-A149-4412-81EC-C43CE29A7896"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8e7860543a94784d744c7ce34b78a2e11beefa5c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b7859ff398b6b656e1689daa860eb34837b4bb89",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c205565e0f2f439f278a4a94ee97b67ef7b56ae8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42315",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:11.470",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:51:03.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: corrige un posible punto muerto en __exfat_get_dentry_set Al acceder a un archivo con m\u00e1s entradas que ES_MAX_ENTRY_NUM, la matriz bh se asigna en __exfat_get_entry_set. El problema es que el bh-array est\u00e1 asignado con GFP_KERNEL. No tiene sentido. En los siguientes casos, puede ocurrir un punto muerto para sbi->s_lock entre los dos procesos. CPU0 CPU1 ---- ---- kswapd balance_pgdat lock(fs_reclaim) exfat_iterate lock(&sbi->s_lock) exfat_readdir exfat_get_uniname_from_ext_entry exfat_get_dentry_set __exfat_get_dentry_set kmalloc_array ... lock(fs_reclaim) ... desalojar exfat_evict_inode lock(&sbi->s_lock) para arreglar esto, asignemos bh-array con GFP_NOFS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.44",
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1d1970493c289e3f44b9ec847ed26a5dbdf56a62",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/89fc548767a2155231128cb98726d6d2ea1256c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a7ac198f8dba791e3144c4da48a5a9b95773ee4b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42316",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:11.547",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:52:38.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mglru: corrige div-by-zero en vmpression_calc_level() evict_folios() utiliza una segunda pasada para recuperar las publicaciones que han pasado por la reescritura de p\u00e1ginas y quedan limpias antes de finalizar el primer pase, ya que folio_rotate_reclaimable() no puede manejar esos folios debido al aislamiento. El segundo paso intenta evitar un posible doble conteo deduciendo scan_control->nr_scanned. Sin embargo, esto puede resultar en un desbordamiento insuficiente de nr_scanned, bajo una condici\u00f3n en la que Shrink_folio_list() no incrementa nr_scanned, es decir, cuando falla folio_trylock(). El desbordamiento insuficiente puede causar que el divisor, es decir, escala=escaneado+reclamado en vmpression_calc_level(), se convierta en cero, lo que resulta en el siguiente bloqueo: [excepci\u00f3n RIP: vmpression_work_fn+101] Process_one_work en ffffffffa3313f2b Dado que scan_control->nr_scanned no tiene una sem\u00e1ntica establecida, la posible doble contabilizaci\u00f3n tiene riesgos m\u00ednimos. Por lo tanto, solucione el problema no deduciendo scan_control->nr_scanned en evict_folios()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.103",
"matchCriteriaId": "81F7EA03-5805-43D2-9A78-820250B70B32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.44",
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8b671fe1a879923ecfb72dda6caf01460dd885ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8de7bf77f21068a5f602bb1e59adbc5ab533509d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a39e38be632f0e1c908d70d1c9cd071c03faf895",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d6510f234c7d117790397f9bb150816b0a954a04",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-42552",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:05.933",
"lastModified": "2024-08-20T15:44:20.567",
"lastModified": "2024-08-22T15:35:09.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_room_history.php."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que el commit de Hotel Management System 91caab8 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro book_id en admin_room_history.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/topsky979/2386856df3f3ffa7bdc4738e24da4af3",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42573",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T13:15:08.097",
"lastModified": "2024-08-21T13:44:48.360",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T14:35:09.667",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42779",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:10.073",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:10.640",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se encontr\u00f3 una vulnerabilidad de carga de archivos sin restricciones en \"/music/ajax.php?action=save_music\" en Kashipara Music Management System v1.0. Esto permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Music%20List.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42781",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:10.227",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:11.393",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en \"/music/ajax.php?action=login\" de Kashipara Music Management System v1.0 permite a atacantes remotos ejecutar comandos SQL arbitrarios y omitir el inicio de sesi\u00f3n mediante el par\u00e1metro de correo electr\u00f3nico."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Login.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42782",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:10.303",
"lastModified": "2024-08-22T12:48:02.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:35:10.447",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en \"/music/ajax.php?action=find_music\" en Kashipara Music Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"buscar\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Find%20Music.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42784",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:10.630",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:12.170",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en \"/music/controller.php?page=view_music\" en Kashipara Music Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"id\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Music%20List.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42785",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:10.707",
"lastModified": "2024-08-22T12:48:02.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:35:11.450",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /music/index.php?page=view_playlist en Kashipara Music Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"id\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Playlist.pdf",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43398",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-22T15:15:16.440",
"lastModified": "2024-08-22T15:15:16.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-776"
}
]
}
],
"references": [
{
"url": "https://github.com/ruby/rexml/releases/tag/v3.3.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43785",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-22T15:15:16.670",
"lastModified": "2024-08-22T15:15:16.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gitoxide An idiomatic, lean, fast & safe pure Rust implementation of Git. gitoxide-core, which provides most underlying functionality of the gix and ein commands, does not neutralize newlines, backspaces, or control characters\u2014including those that form ANSI escape sequences\u2014that appear in a repository's paths, author and committer names, commit messages, or other metadata. Such text may be written as part of the output of a command, as well as appearing in error messages when an operation fails. This sometimes allows an untrusted repository to misrepresent its contents and to alter or concoct error messages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-150"
}
]
}
],
"references": [
{
"url": "https://github.com/Byron/gitoxide/security/advisories/GHSA-88g2-r9rw-g55h",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-43787",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-22T15:15:16.857",
"lastModified": "2024-08-22T15:15:16.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43828",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:08.720",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:41:50.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: corrige el bucle infinito al reproducir fast_commit Al realizar la reproducci\u00f3n fast_commit, puede ocurrir un bucle infinito debido a una estructura extend_status no inicializada. ext4_ext_determine_insert_hole() no detecta la repetici\u00f3n y llama a ext4_es_find_extent_range(), que regresar\u00e1 inmediatamente sin inicializar la variable 'es'. Debido a que 'es' contiene basura, puede ocurrir un desbordamiento de enteros causando un bucle infinito en esta funci\u00f3n, f\u00e1cilmente reproducible usando fstest generic/039. Esta confirmaci\u00f3n soluciona este problema inicializando incondicionalmente la estructura en la funci\u00f3n ext4_es_find_extent_range(). \u00a1Gracias a Zhang Yi por descubrir el verdadero problema!"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.224",
"matchCriteriaId": "3723F85C-99C4-4BA1-A411-426E0591769E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.165",
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.103",
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.44",
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0619f7750f2b178a1309808832ab20d85e0ad121",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/181e63cd595c688194e07332f9944b3a63193de2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ed0496e383cb6de120e56991385dce70bbb87c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/81f819c537d29932e4b9267f02411cbc8b355178",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/907c3fe532253a6ef4eb9c4d67efb71fab58c706",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6e67df64783e99a657ef2b8c834ba2bf54c539c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43833",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:09.040",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:42:46.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: media: v4l: async: corrige la desreferencia del puntero NULL al agregar enlaces auxiliares En v4l2_async_create_ancillary_links(), se crean enlaces auxiliares para subdispositivos de lentes y flash. Estos son enlaces de subdispositivo a subdispositivo y si el notificador as\u00edncrono est\u00e1 relacionado con un dispositivo V4L2, el subdispositivo de origen del enlace auxiliar es NULL, lo que lleva a una desreferencia del puntero NULL. Verifique que el campo sd del notificador no sea NULL en v4l2_async_create_ancillary_links(). [Sakari Ailus: Reformule el asunto y confirme ligeramente los mensajes.]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "6.1.103",
"matchCriteriaId": "1F2C2F2C-93A3-47B2-83D1-9ACD0285514A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.44",
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/249212ceb4187783af3801c57b92a5a25d410621",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b4667ea67854f0b116fe22ad11ef5628c5b5b5f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b87e28050d9b0959de24574d587825cfab2f13fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe0f92fd5320b393e44ca210805e653ea90cc982",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43836",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:09.250",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:43:26.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethtool: pse-pd: Arreglar posible null-deref Arreglar una posible desreferencia nula cuando un PSE soporta tanto c33 como PoDL, pero solo se especifica uno de los atributos netlink. Las capacidades de c33 o PoDL PSE ya est\u00e1n validadas en la llamada ethnl_set_pse_validate()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4cddb0f15ea9c62f81b4889ea69a99368cc63a86",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e187690b125a297499eadeec53c32c5ed6d7436a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43837",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:09.320",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-22T15:44:03.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrigi\u00f3 la desreferencia del puntero nulo en resolve_prog_type() para BPF_PROG_TYPE_EXT Al cargar un programa EXT sin especificar `attr->attach_prog_fd`, el `prog->aux->dst_prog` ser\u00e1 nulo. En este momento, llamar a resolve_prog_type() en cualquier lugar dar\u00e1 como resultado una desreferencia del puntero nulo. Ejemplo de seguimiento de pila: [8.107863] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000004 [8.108262] Informaci\u00f3n de cancelaci\u00f3n de memoria: [8.108384] ESR = 0x0000000096000004 [8.108547] EC = 0x25: DABT (EL actual), IL = 32 bits [8.108722 ] SET = 0, FnV = 0 [8.108827] EA = 0, S1PTW = 0 [8.108939] FSC = 0x04: error de traducci\u00f3n de nivel 0 [8.109102] Informaci\u00f3n de cancelaci\u00f3n de datos: [8.109203] ISV = 0, ISS = 0x00000004, ISS2 = 00 [ 8.109399] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 8.109614] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 8.109836] tabla de p\u00e1ginas de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000101354000 [8.110011] [00000000000000004] pgd=0000000000000000, p4d=0000000000000000 [8.112624] Error interno: Vaya: 0000000096000 004 [#1] PREEMPT SMP [8.112783] M\u00f3dulos vinculados en: [8.113120] CPU: 0 PID: 99 Comm: may_access_dire No contaminado 6.10.0-rc3-next-20240613-dirty #1 [8.113230] Nombre de hardware: linux,dummy-virt (DT) [8.113390] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE= --) [8.113429] pc: may_access_direct_pkt_data+0x24/0xa0 [8.113746] lr: add_subprog_and_kfunc+0x634/0x8e8 [8.113798] sp: ffff80008283b9f0 [8.113813] x29: 83b9f0 x28: ffff800082795048 x27: 00000000000000001 [ 8.113881] x26: ffff0000c0bb2600 x25: 0000000000000000 x24: 0000000000000000 [8.113897] x23: ffff0000c1134000 x22: 000000000001864f x21: ffff0000c1138000 [8.113912] x20: 0000000000000001 x19: ffff0000c12b8000 x18: ffffffffffffffff [ 8.113929] x17: 0000000000000000 x16: 00000000000000000 x15: 0720072007200720 [ 8.113944] x14: 20072007200720 x13: 0720072007200720 x12: 0720072007200720 [8.113958] x11: 0720072007200720 x10: 0000000000f9fca4 x9: ffff80008021f4e4 [8.113991] x8: 0101010101010101 x7: 46f72705f6d656d x6: 000000001e0e0f5f [8.114006] x5: 000000000001864f x4: ffff0000c12b8000 x3: 000000000000001c [8.114020] x2: 00000000002 x1: 0000000000000000 x0: 0000000000000000 [ 8.114126] Seguimiento de llamadas: [8.114159] may_access_direct_pkt_data+0x24/0xa0 [8.114202] bpf_check+0x3bc/0x28c0 [8.114214] bpf_prog_load+0x658/0xa58 [8.114227] xc50/0x2250 [8.114240] __arm64_sys_bpf+0x28/0x40 [8.114254] invoke_syscall. constprop.0+0x54/0xf0 [8.114273] do_el0_svc+0x4c/0xd8 [8.114289] el0_svc+0x3c/0x140 [8.114305] el0t_64_sync_handler+0x134/0x150 [8.114331] _sync+0x168/0x170 [8.114477] C\u00f3digo: 7100707f 54000081 f9401c00 f9403800 (b9400403 ) [8.118672] ---[ end trace 0000000000000000 ]--- Una forma de solucionarlo es forzando que `attach_prog_fd` no est\u00e9 vac\u00edo cuando bpf_prog_load(). Pero esto provocar\u00e1 que se rompa la API `libbpf_probe_bpf_prog_type`, que utiliza el registro del verificador para sondear el tipo de programa y no registrar\u00e1 nada si rechazamos el programa EXT no v\u00e1lido antes de bpf_check(). Otra forma es agregando una verificaci\u00f3n nula en resolve_prog_type(). El problema fue introducido por el commit 4a9c7bbe2ed4 (\"bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT\") que quer\u00eda corregir la resoluci\u00f3n de tipos para los programas BPF_PROG_TYPE_TRACING. Antes de eso, la resoluci\u00f3n de tipo del programa BPF_PROG_TYPE_EXT en realidad sigue la siguiente l\u00f3gica: prog->aux->dst_prog ? prog->aux->dst_prog->tipo : prog->tipo; Implica que cuando el programa EXT a\u00fan no est\u00e1 adjunto a `dst_prog`, el tipo de programa debe ser EXT. Este c\u00f3digo funcion\u00f3 bien en el pasado. As\u00ed que sigue us\u00e1ndolo. Solucione este problema devolviendo `prog->type` para BPF_PROG_TYPE_EXT si `dst_prog` no est\u00e1 presente en resolve_prog_type()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "6.1.103",
"matchCriteriaId": "ADED9C16-75E2-47CC-A756-30929EBBF848"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.44",
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.3",
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/9d40fd516aeae6779e3c84c6b96700ca76285847",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b29a880bb145e1f1c1df5ab88ed26b1495ff9f09",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f7866c35873377313ff94398f17d425b28b71de1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fcac5feb06f31ee4c88bca9bf98d8bc3ca7d2615",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45163",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T04:15:20.247",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T15:35:12.750",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Mirai botnet hasta el 19 de agosto de 2024 maneja mal las conexiones TCP simult\u00e1neas al servidor CNC (comando y control). Las sesiones no autenticadas permanecen abiertas, lo que provoca un consumo de recursos. Por ejemplo, un atacante puede enviar un nombre de usuario reconocido (como root) o puede enviar datos arbitrarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://cypressthatkid.medium.com/remote-dos-exploit-found-in-mirai-botnet-source-code-27a1aad284f1",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45166",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T04:15:24.467",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:13.183",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Debido a una validaci\u00f3n de entrada inadecuada, una deserializaci\u00f3n inadecuada y una restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria, IDOL2 es vulnerable a ataques de denegaci\u00f3n de servicio (DoS) y posiblemente a la ejecuci\u00f3n remota de c\u00f3digo. Hay una infracci\u00f3n de acceso y se sobrescribe el EIP despu\u00e9s de cinco inicios de sesi\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "http://download.uci.de/idol2/idol2Client_2_12.exe",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45168",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T04:15:27.190",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:13.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Los datos se transfieren a trav\u00e9s de un socket sin formato sin ning\u00fan mecanismo de autenticaci\u00f3n. Por tanto, los endpoints de comunicaci\u00f3n no son verificables."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "http://download.uci.de/idol2/idol2Client_2_12.exe",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45169",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T04:15:27.583",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T15:35:13.507",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,46 @@
"value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Debido a una validaci\u00f3n de entrada inadecuada, una deserializaci\u00f3n inadecuada y una restricci\u00f3n inadecuada de las operaciones dentro de los l\u00edmites de un b\u00fafer de memoria, IDOL2 es vulnerable a ataques de denegaci\u00f3n de servicio (DoS) y posiblemente a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de la secuencia de bytes \\xB0\\x00\\x3c. ."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "http://download.uci.de/idol2/idol2Client_2_12.exe",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4944",
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"published": "2024-07-09T03:15:02.270",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T15:06:05.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
@ -51,10 +81,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:watchguard:mobile_vpn_with_ssl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.10.4",
"matchCriteriaId": "2CA32F06-03E0-48EA-A06D-203034ED7CD4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00010",
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5974",
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"published": "2024-07-09T03:15:02.507",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:26:55.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
@ -51,10 +81,301 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.9.4",
"versionEndExcluding": "12.5.12",
"matchCriteriaId": "625777A6-D12E-4BBC-BBF0-F7ABE40CC8F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.6",
"versionEndExcluding": "12.10.4",
"matchCriteriaId": "7349E570-8D36-4B19-9DBD-E352BB458F23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:watchguard:fireware:12.5.12:u1:*:*:*:*:*:*",
"matchCriteriaId": "2B644B61-D7D7-4658-96FC-3AB7D394CBA8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "947408A7-EC5A-43A0-A2F0-C51055F29BF0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E472917E-D6E1-4C2D-B37D-E76FCC7307CA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8C7779-4466-4A9E-B191-929E7746DFF7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7867C903-6DB6-4E58-AD44-07BBB9C45E72"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE9A123-B769-4E56-845E-DC3DA6166C78"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180FAE8C-2E73-4C09-AA11-0C82A7715FA3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD5BB5D-12FC-4D49-A2FA-8886077457B8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "309DBEF2-1D92-4641-827F-D99758B5FFA3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBFBA966-E052-4350-9544-3B5D484DBB6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m4800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E586D-0E88-447A-95E8-5203EF869ADB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08422D7D-CA99-4303-B783-30F8CDCAC34C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59389EA2-3067-4AF8-AEC5-FE79E269C170"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "445FA7CD-D0AE-4176-9AE5-293B918DE654"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4A7366-0304-431E-B3E4-719BA575CEAC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8512B4A-5269-4067-B9C6-475A4E8AD313"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179C6166-87E1-44F8-B727-CDDE40C673D9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D97A123-654D-40B0-A18B-FE4801BF4506"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t10-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "983AE311-F2BD-4260-839E-2D906B6E095A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t10-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28634F62-70D4-49F6-860F-8FE1B85707F6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "626220F8-7F0C-4DD8-8001-12EA0A777A0D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t15-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "083919C1-A383-430A-B56C-13C6128266F8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9295217E-C1A0-4A69-A0F0-C44814BB376C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t20-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4832E5E-E4ED-4222-B9A5-060FA6AA22DF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E10A9DF-DD32-4E42-838D-E398B3451FBF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t30-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29D260C9-BB0C-4546-9E56-0283B9332AC5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E561A57F-91A5-4B3C-9F7D-62E9AB5163A7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t35-r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B691D60-C12E-49DA-9917-4513E4A57B55"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t35-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F374AC3-0292-428B-AA39-F60980874160"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC853916-8BDC-4F7C-BA53-D6AB490A9444"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t40-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4267A4B5-4F48-4104-85E8-3F6B09FD2354"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D15B548-CB7C-44B6-A568-7F87652561D3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t50-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07EB3F3A-E508-42EF-9D11-9BC77C35EA60"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3562304-0317-4A3C-B622-D5CE01CC97F9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t55-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "755CD8FA-C341-4C34-8005-A42C32BD85CF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "327BA50A-366A-4367-93B8-328EC0136FA7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_t80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D92ABD52-20F6-4AB1-801F-9E7B7B1B78A1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm1520-rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7C021D-0C50-47A8-B8D6-27BE0FBD025C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm1525-rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF67525-E49F-4B2C-823B-8447E8450F27"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm2520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8D9112-1504-4341-B2F9-9967B5D02790"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BC88C9-324F-4803-97E4-91773827F4C3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AADF6164-8A53-4023-B326-C3CA1A4DE0A8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42A6A10F-C0C1-415F-943D-9CFADC35CF73"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:firebox_xtm870-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF5490C-5BBD-476C-916E-26C5426A6069"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:fireboxcloud:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158560A0-D694-41AF-A5F8-0F6FB3EFB8FA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:fireboxt_nv5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA8CE73-14FB-443C-8085-388C61706A90"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:fireboxt_t25:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55490F9D-F216-4A2C-B28D-6DE01CFD5DB7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:fireboxt_t45:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26488C22-70A1-434B-9FC2-7C0EB4E2696F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:fireboxt_t85:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EDF2C3-FDF2-4D97-A056-462AE61DBF8A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:fireboxv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ECAE1D7-9868-4730-B645-44CB1B6FDE96"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:watchguard:xtmv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72807176-5A59-4BFD-B6C0-2738D9FD3AB5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00011",
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6563",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-07-08T16:15:09.210",
"lastModified": "2024-07-09T14:19:19.300",
"lastModified": "2024-08-22T15:51:55.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -94,8 +94,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rensas:arm-trusted-firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA50A6A9-9D25-4BBA-9FEA-ADC1A6CB0A99"
"criteria": "cpe:2.3:o:renesas:arm-trusted-firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16A2BDC3-F664-4132-8148-9DB849240F8B"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6564",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-07-08T16:15:09.423",
"lastModified": "2024-07-09T14:19:14.760",
"lastModified": "2024-08-22T15:52:05.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -90,8 +90,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rensas:arm-trusted-firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA50A6A9-9D25-4BBA-9FEA-ADC1A6CB0A99"
"criteria": "cpe:2.3:o:renesas:arm-trusted-firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16A2BDC3-F664-4132-8148-9DB849240F8B"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-6800",
"sourceIdentifier": "product-cna@github.com",
"published": "2024-08-20T20:15:09.910",
"lastModified": "2024-08-21T12:30:33.697",
"lastModified": "2024-08-22T15:15:17.127",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when utilizing SAML authentication with specific identity providers. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a\u00a0SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication.\u00a0This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program."
"value": "An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7731",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-08-14T07:15:13.920",
"lastModified": "2024-08-14T13:00:37.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:40:00.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
@ -51,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:secom:dr.id_access_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.6.3",
"matchCriteriaId": "A9406220-C56D-45EA-BD7D-1A613D4DCE84"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8006-036f5-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8005-c3c94-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7746",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-08-13T16:15:09.573",
"lastModified": "2024-08-13T17:11:53.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-08-22T14:40:44.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "cve@asrg.io",
"type": "Secondary",
@ -73,10 +105,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.12",
"versionEndIncluding": "6.0",
"matchCriteriaId": "D590EA44-D2CF-4505-90BA-6D6A7483A311"
}
]
}
]
}
],
"references": [
{
"url": "https://asrg.io/security-advisories/cve-2024-7746/",
"source": "cve@asrg.io"
"source": "cve@asrg.io",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7965",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:08.947",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:15.280",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La implementaci\u00f3n inadecuada en V8 en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7967",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.060",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:16.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El desbordamiento del b\u00fafer del mont\u00f3n en fuentes en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -26,6 +49,16 @@
"value": "CWE-122"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7971",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.277",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:17.313",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La confusi\u00f3n de tipos en V8 en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -26,6 +49,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7972",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.353",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T15:35:14.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La implementaci\u00f3n inapropiada en V8 en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar potencialmente un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7973",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.407",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T15:35:15.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El desbordamiento del b\u00fafer de mont\u00f3n en PDFium en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto realizar una lectura de memoria fuera de los l\u00edmites a trav\u00e9s de un archivo PDF manipulado. (Severidad de seguridad de Chromium: media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -26,6 +49,16 @@
"value": "CWE-122"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7979",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.747",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T15:35:16.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La validaci\u00f3n de datos insuficiente en el instalador de Google Chrome en Windows anterior a 128.0.6613.84 permiti\u00f3 a un atacante local realizar una escalada de privilegios a trav\u00e9s de un enlace simb\u00f3lico manipulado. (Severidad de seguridad de Chromium: media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7980",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.793",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T15:35:17.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La validaci\u00f3n de datos insuficiente en el instalador de Google Chrome en Windows anterior a 128.0.6613.84 permiti\u00f3 a un atacante local realizar una escalada de privilegios a trav\u00e9s de un enlace simb\u00f3lico manipulado. (Severidad de seguridad de Chromium: media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8072",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-08-22T08:15:04.360",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-08-22T14:35:18.797",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://research.jfrog.com/vulnerabilities/mage-ai-terminal-server-infoleak-jfsa-2024-001039574/",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-22T14:00:19.765020+00:00
2024-08-22T16:00:17.779913+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-22T13:50:16.117000+00:00
2024-08-22T15:59:11.740000+00:00
```
### Last Data Feed Release
@ -33,45 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260934
260943
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `9`
- [CVE-2024-43331](CVE-2024/CVE-2024-433xx/CVE-2024-43331.json) (`2024-08-22T12:15:05.600`)
- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T15:15:15.883`)
- [CVE-2024-36440](CVE-2024/CVE-2024-364xx/CVE-2024-36440.json) (`2024-08-22T15:15:15.977`)
- [CVE-2024-36442](CVE-2024/CVE-2024-364xx/CVE-2024-36442.json) (`2024-08-22T15:15:16.047`)
- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T14:15:08.443`)
- [CVE-2024-36444](CVE-2024/CVE-2024-364xx/CVE-2024-36444.json) (`2024-08-22T15:15:16.117`)
- [CVE-2024-36445](CVE-2024/CVE-2024-364xx/CVE-2024-36445.json) (`2024-08-22T15:15:16.187`)
- [CVE-2024-43398](CVE-2024/CVE-2024-433xx/CVE-2024-43398.json) (`2024-08-22T15:15:16.440`)
- [CVE-2024-43785](CVE-2024/CVE-2024-437xx/CVE-2024-43785.json) (`2024-08-22T15:15:16.670`)
- [CVE-2024-43787](CVE-2024/CVE-2024-437xx/CVE-2024-43787.json) (`2024-08-22T15:15:16.857`)
### CVEs modified in the last Commit
Recently modified CVEs: `136`
Recently modified CVEs: `68`
- [CVE-2024-7778](CVE-2024/CVE-2024-77xx/CVE-2024-7778.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7836](CVE-2024/CVE-2024-78xx/CVE-2024-7836.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7848](CVE-2024/CVE-2024-78xx/CVE-2024-7848.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-8071](CVE-2024/CVE-2024-80xx/CVE-2024-8071.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-8072](CVE-2024/CVE-2024-80xx/CVE-2024-8072.json) (`2024-08-22T12:48:02.790`)
- [CVE-2024-42784](CVE-2024/CVE-2024-427xx/CVE-2024-42784.json) (`2024-08-22T14:35:12.170`)
- [CVE-2024-42785](CVE-2024/CVE-2024-427xx/CVE-2024-42785.json) (`2024-08-22T15:35:11.450`)
- [CVE-2024-43828](CVE-2024/CVE-2024-438xx/CVE-2024-43828.json) (`2024-08-22T15:41:50.870`)
- [CVE-2024-43833](CVE-2024/CVE-2024-438xx/CVE-2024-43833.json) (`2024-08-22T15:42:46.827`)
- [CVE-2024-43836](CVE-2024/CVE-2024-438xx/CVE-2024-43836.json) (`2024-08-22T15:43:26.303`)
- [CVE-2024-43837](CVE-2024/CVE-2024-438xx/CVE-2024-43837.json) (`2024-08-22T15:44:03.417`)
- [CVE-2024-45163](CVE-2024/CVE-2024-451xx/CVE-2024-45163.json) (`2024-08-22T15:35:12.750`)
- [CVE-2024-45166](CVE-2024/CVE-2024-451xx/CVE-2024-45166.json) (`2024-08-22T14:35:13.183`)
- [CVE-2024-45168](CVE-2024/CVE-2024-451xx/CVE-2024-45168.json) (`2024-08-22T14:35:13.957`)
- [CVE-2024-45169](CVE-2024/CVE-2024-451xx/CVE-2024-45169.json) (`2024-08-22T15:35:13.507`)
- [CVE-2024-4944](CVE-2024/CVE-2024-49xx/CVE-2024-4944.json) (`2024-08-22T15:06:05.480`)
- [CVE-2024-5974](CVE-2024/CVE-2024-59xx/CVE-2024-5974.json) (`2024-08-22T14:26:55.657`)
- [CVE-2024-6563](CVE-2024/CVE-2024-65xx/CVE-2024-6563.json) (`2024-08-22T15:51:55.843`)
- [CVE-2024-6564](CVE-2024/CVE-2024-65xx/CVE-2024-6564.json) (`2024-08-22T15:52:05.033`)
- [CVE-2024-6800](CVE-2024/CVE-2024-68xx/CVE-2024-6800.json) (`2024-08-22T15:15:17.127`)
- [CVE-2024-7731](CVE-2024/CVE-2024-77xx/CVE-2024-7731.json) (`2024-08-22T14:40:00.913`)
- [CVE-2024-7746](CVE-2024/CVE-2024-77xx/CVE-2024-7746.json) (`2024-08-22T14:40:44.167`)
- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-22T14:35:15.280`)
- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-22T14:35:16.310`)
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-22T14:35:17.313`)
- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-22T15:35:14.597`)
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-22T15:35:15.597`)
- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-22T15:35:16.610`)
- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-22T15:35:17.610`)
- [CVE-2024-8072](CVE-2024/CVE-2024-80xx/CVE-2024-8072.json) (`2024-08-22T14:35:18.797`)
## Download and Usage

View File

@ -6826,7 +6826,7 @@ CVE-2003-0059,0,0,9b467128aa7d52b1c0228e54a512232ea06b5094b0ca4328a1b19c18c086bb
CVE-2003-0060,0,0,2b161e5e23ecaff15a71eedebc54308999fda54f3b03eb3f15e239e527ef079a,2020-01-21T15:44:53.820000
CVE-2003-0061,0,0,fb48c810402a59f1e816cce84765259427dd905ebafca590217d2c1d1a0a8ba6,2008-09-05T20:33:21.787000
CVE-2003-0062,0,0,220e4ca7fe7a82c24abb8933393b0872bef9fb76c3a861b86d6b6b6d3b45fd2c,2016-10-18T02:28:57.360000
CVE-2003-0063,0,0,ee01a0b62202135b5aef25d174f06d5ff0494a3d156e239b43cef1109ece39f7,2024-06-15T10:15:10.083000
CVE-2003-0063,0,1,08e8c1fb6e1a3ba6d45ede25c5a8a7fe5c4cbb47435d606b1c1c0fd9e8f62207,2024-08-22T15:35:00.600000
CVE-2003-0064,0,0,0f3d2197cadb1ae2a90294bd1e0ce23bd609779c42335a9bf1f6318b5e844d84,2018-10-30T16:26:22.763000
CVE-2003-0065,0,0,32c52cb2ff50eee0bd89462e579d28cc1a8537aa17f9ad12358b4b4edb43ab1e,2016-10-18T02:29:01.440000
CVE-2003-0066,0,0,77fac5544f85a414f7d717e1977ab442b656c9b7041d46aa7231df36ff38a87e,2016-10-18T02:29:02.690000
@ -73024,7 +73024,7 @@ CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d117
CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000
CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000
CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000
CVE-2014-9515,0,0,24be7155019de27e80399c6be5475ef64a6aedbe97577a256ae0a18f9a53e8b2,2024-07-19T14:15:02.500000
CVE-2014-9515,0,1,152a4fc755c424efe371779645f9d6aeb10209c0f007f159e1b12840db4466e9,2024-08-22T15:35:01.630000
CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000
CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000
CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000
@ -175250,7 +175250,7 @@ CVE-2021-31192,0,0,fd789248bf776790286911c1cb62d193d3758ca81ef93da2b769e43d45b36
CVE-2021-31193,0,0,077bb091684d98f26b6775e11540d1486855c8b0d31cece055f7164c231d488f,2023-08-02T00:15:14.130000
CVE-2021-31194,0,0,a881a4ba34181125ee9ae9d9c1b01593524b854565df4e5996e91bfacc287967,2023-08-02T00:15:14.223000
CVE-2021-31195,0,0,70601223ee123bbcfc6c70e498c7011bda164e6f4ddb34afe419d104ffa66b25,2023-08-02T00:15:14.323000
CVE-2021-31196,0,0,fb93d3a83bfcd3219bb93cb91a6b6f7d1215b8129d82080460a2b924115c0821,2024-08-22T01:00:01.277000
CVE-2021-31196,0,1,c90e7e86ad84b3fe62b6068d7900bac0e921351a4581cbb17e4034b5eadf7d04,2024-08-22T14:13:46.367000
CVE-2021-31198,0,0,c30b3a1c57145c6bd60798b28f43bf1b762d20c9da745906c3aa84d02e50db9f,2023-08-02T00:15:14.423000
CVE-2021-31199,0,0,6a10871a43e5aa3edee13eb1b7ba5d0cfbf7151ab2ede6f7ce968c12cd3946fc,2024-07-29T18:06:29.307000
CVE-2021-3120,0,0,08daa0568cd7cfafde23061c9f7b245e79e5316ac276c10375c44ea0d54bbceb,2023-02-01T02:23:04.767000
@ -185169,7 +185169,7 @@ CVE-2021-44406,0,0,fd9d29980c886cd8d92b361798b055341bfc74bd83c68b86f68f4ee69f46f
CVE-2021-44407,0,0,fc965d75536c4301ffc608c6a377219be0371ccfaa13e6eb2cdd097661de73f2,2022-10-25T17:36:38.547000
CVE-2021-44408,0,0,1796000f44b8bb0c7587aea014ccd33a035fe99707e11f2f4a04661f9e79f691,2022-10-25T17:36:11.647000
CVE-2021-44409,0,0,9f017a891d9381c3f0a4fba6c7252ab6afe26ce20cf4bb0ee24450da9e559bae,2022-10-25T17:36:06.460000
CVE-2021-4441,0,1,17a07e10759c260a0cd509cd06d1cd4f406158fc942f07a440ba37973576cc08,2024-08-22T12:48:02.790000
CVE-2021-4441,0,0,17a07e10759c260a0cd509cd06d1cd4f406158fc942f07a440ba37973576cc08,2024-08-22T12:48:02.790000
CVE-2021-44410,0,0,8987a8a08eefcb8e8639b8c36f8efac14850afcf28e1895fc8c826983a36d725,2022-10-25T17:35:59.223000
CVE-2021-44411,0,0,4c009c4c595fa0e30c202f045dec5c1accfd07f6c5c888dd57437e5f5fdd652a,2022-10-25T17:35:51.200000
CVE-2021-44412,0,0,9cedba985a18ced50920d0bc0b3286b490e9cc4a4b23c3bec22d94124fd12693,2022-10-25T17:35:35.607000
@ -187601,7 +187601,7 @@ CVE-2022-0181,0,0,49bbaf20babae092248444f6ddc94fd7d8983bfce62fd846eee38d0176c6ca
CVE-2022-0182,0,0,f0d9ba9007437f7d7a66a432fc0d00289cffd4600671c3cebf01d89438097bad,2022-01-24T20:27:33.607000
CVE-2022-0183,0,0,3b28f17534e16919c8c20dabb021bcf588ae9e948de688533d018739b0f1c29e,2022-01-26T15:46:06.490000
CVE-2022-0184,0,0,2796a1b3e55d24a7793b73561ae52ebe8b8c9bdb3af4ee6ae87dd4893719740c,2022-01-28T20:58:56.980000
CVE-2022-0185,0,1,fa97d99fab19f9f20e8dabebad35032ae26d67e99d1532f842fa8ee1438933c2,2024-08-22T13:35:00.450000
CVE-2022-0185,0,0,fa97d99fab19f9f20e8dabebad35032ae26d67e99d1532f842fa8ee1438933c2,2024-08-22T13:35:00.450000
CVE-2022-0186,0,0,02b43b39b42feadeed2a3b848b36fe00f387679041bd4cddc14b4f50f18f257c,2022-02-28T20:50:11.233000
CVE-2022-0188,0,0,b8ccca23290559a5b11ded28b5901c560a4c58d0a38271ad31544f41df963cc4,2023-11-07T03:41:08.873000
CVE-2022-0189,0,0,266c58e45b9d9e1080790386b72619f2a8170166f33a359753e82bc61cf4178b,2022-03-08T16:22:14.813000
@ -195988,7 +195988,7 @@ CVE-2022-27482,0,0,36b6f1b97ebba78c42fbca698ce9c45dd58b63814d39b8408a6e4f47c85c7
CVE-2022-27483,0,0,547cae1c29ba4c8e34ce2ca3485c07e3564bbb8ad0bc933f56fe2bc4cfd995a2,2022-07-27T07:18:54.910000
CVE-2022-27484,0,0,b70ab124e3868d4300a35fe9373862610a18fbb62290ce37b9943e259b6259b4,2023-08-08T14:21:49.707000
CVE-2022-27485,0,0,89c71954a05af3cb3fa20c6d9b6c24ac726da380f9e9c148dcc8373b207c974a,2023-11-07T03:45:20.327000
CVE-2022-27486,0,0,ca6a359675a9453943a436a34e3b289e6dfcd80ea8f91f900f1e2408a778ecee,2024-08-13T17:11:53.553000
CVE-2022-27486,0,1,d9634ef51201dc92021cc40d6c68b96adffc3632fb81f86d8cb3b72dbf25443a,2024-08-22T14:29:44.627000
CVE-2022-27487,0,0,40352dcb6eab8d9a69c504241370e01f28a37002d1641a037d7821aac682f726,2023-11-07T03:45:20.453000
CVE-2022-27488,0,0,6e31ddd90d81cb2ce85c8657468174115b85ad3aef674059057db057dfb8f7e7,2024-01-18T15:48:06.043000
CVE-2022-27489,0,0,81b540b09f87c477cd65ccdf38f3c4e50b2037d1b2ce7272f3b17e5d12163420,2023-11-07T03:45:20.570000
@ -196038,7 +196038,7 @@ CVE-2022-27537,0,0,4f323c390ae67bf4d4a49e2bfbd872c09defecbb2392cd2942a41e6707998
CVE-2022-27538,0,0,9d3139694e40c37c446ec1b8a15ba025f469f19e9dade9e273a97b6d4bdaa89a,2023-02-16T21:59:04.027000
CVE-2022-27539,0,0,fc9e4c3c8111f15c12cce968358404e33bcb8d28f4b40ea515ad7c623c1ce1b4,2023-06-28T20:09:40.707000
CVE-2022-2754,0,0,a0d5346a2857741d9627a2bd4d0e70d2226ccc2da26068426ace52410fbe6f90,2022-09-21T06:28:06.090000
CVE-2022-27540,0,0,c7a2e01f21c744aaf1fad5f226c4a727dc6c9cfe76c05321ee737be76079a8ba,2024-07-01T12:37:24.220000
CVE-2022-27540,0,1,4e084977308d1f9bcabf9d7df04d1976d0bace484b39561703f7e6e0558a479c,2024-08-22T15:35:02.633000
CVE-2022-27541,0,0,e68146274941a4057a248c3e754148a97011afa1498ab0865f0f238b16aa3f0d,2023-06-28T20:09:53.083000
CVE-2022-27544,0,0,1742c2d20287265afbbbc0e653c2ad62768620600f695fc6956c35b3d20f219a,2022-07-27T22:40:03.920000
CVE-2022-27545,0,0,4b0da5810298d30534b12b64765c5d5fe3946cfa485df7f3f365142546bec22f,2022-07-27T22:36:45.790000
@ -198276,7 +198276,7 @@ CVE-2022-30284,0,0,3f682ca57ebd600d22ba889ad73f2f828b756b846c709580dd1eb4fc8ff92
CVE-2022-30285,0,0,b074e639bdd1cfbb52847b7e52d2b4be281d99afaf667c29503ba6a3ad501b78,2023-08-08T14:22:24.967000
CVE-2022-30286,0,0,2303d5314d85878656f33a9936c3e0fb956f5ed156c51c5b48466ed0f6800766,2022-05-16T18:47:04.993000
CVE-2022-30287,0,0,b5f11e39986f9100b6b8734e101ef752eb839b0487a3bb33aaf4a311f1a73f6f,2023-08-08T14:22:24.967000
CVE-2022-30288,0,0,c9420c58a48eccf59c08d12cc8fce6841028743d672b102d4c40e0b622bbdb6c,2024-08-03T07:15:50.983000
CVE-2022-30288,0,1,48ea3ecf9aaac83590785bb6ce37caa8952e2c2e688dea389d99a3208bdefd89,2024-08-22T15:35:03.537000
CVE-2022-30289,0,0,7d69849dbf9b399d69de8d247e85d4aafbb60d0b9c5d1c4cee4af233a0b20cdf,2022-07-11T13:36:15.213000
CVE-2022-3029,0,0,75565c82e64f54277abff1006121e0fbc6d3431900f0f15c48c79db2248b3a97,2023-11-07T03:50:43.043000
CVE-2022-30290,0,0,5feec6389aa4a5512393fc0b6c74470cca733f66a5d7ba7d901e67757d98c69e,2023-08-08T14:22:24.967000
@ -210268,7 +210268,7 @@ CVE-2022-45859,0,0,e348c03f2d659f2f5386e4f909b6e1cb2796eaee095e3e655cb0987893244
CVE-2022-4586,0,0,0aa055d519b6e153850ccca55806ee707b733003747c3a50acc7fbfa7cffac55,2023-11-07T03:58:14.667000
CVE-2022-45860,0,0,19ff9249ce30a9b49b0ef71436486c56cd636a8a1ff2b9bc5fc6dacb75c5ac16,2023-11-07T03:54:54.520000
CVE-2022-45861,0,0,ce9a5217138c4f0b88d9c1f1c18264fd40036371397c206a84c6003fd1ed0947,2023-11-07T03:54:54.773000
CVE-2022-45862,0,0,1966029ad95b5d718b11e8218360539a7d84a88f1231f9eeaaaa7b3dcf5ed745,2024-08-13T17:11:53.553000
CVE-2022-45862,0,1,3b22c1b4147b0d5e3363ef563a6a04aa1f2320431b3f3284c2ba49a20118fc59,2024-08-22T14:32:16.823000
CVE-2022-45866,0,0,d74e30c203376ee64b52bc0674dadc3d7e6655262995eb7d10ab3de283c1a2c3,2023-11-07T03:54:55.003000
CVE-2022-45867,0,0,9683286023a0db7745466ef67dbea5f2d24359816c975944697b49893f1ea929,2023-01-10T03:23:59.953000
CVE-2022-45868,0,0,c81f731922d209a11898651a91a4d106607ad1989f6cc83a36eca554d71b85d5,2024-08-03T15:15:31.327000
@ -212410,53 +212410,53 @@ CVE-2022-48898,0,0,db123fbf5ec577b4cc5c353572831875154cf4dfd348ca1511458d53d92f2
CVE-2022-48899,0,0,307122423943779556534a3fc536d67a546d19e3083d1df8d83008bd134af184,2024-08-21T12:30:33.697000
CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000
CVE-2022-48900,0,0,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000
CVE-2022-48901,0,1,3815d0d738961db5521290f57f22252e380bbcd01c63de9a8b81c61ebbbee0bc,2024-08-22T12:48:02.790000
CVE-2022-48902,0,1,3ff6d9302279291bb1d2e9eb863851e121ffad98e92de69140f6f831e1fba7cf,2024-08-22T12:48:02.790000
CVE-2022-48903,0,1,8ad23f64034f68803476665343be6aea5551252dc2139948d5ac32150ff6e5ca,2024-08-22T12:48:02.790000
CVE-2022-48904,0,1,05aa7a4e86729d93721fc78bcca8932138c75da702bb3ee60cc3ff2e2a679912,2024-08-22T12:48:02.790000
CVE-2022-48905,0,1,3266a56719a8523cbff76088b0907bf01416cd4e4e38cc796ad252025a0b42a5,2024-08-22T12:48:02.790000
CVE-2022-48906,0,1,c2f0bd8fdb3f9a1521c9786412ee3fe2aa6827f19cf3b8ae2736d679036a4d9a,2024-08-22T12:48:02.790000
CVE-2022-48907,0,1,c188f4c8814bd9f6f98170405a233fa28ff4041ac65d379bf8e057f090f743c6,2024-08-22T12:48:02.790000
CVE-2022-48908,0,1,0aed4270fe80d33fe1f58219e7c39a3b34f4f44a034115446ff65263275c1da9,2024-08-22T12:48:02.790000
CVE-2022-48909,0,1,60753974402d7b9dc0b7da2840cff75c54ff83e7db7e3cd742fa083f4cbfd72e,2024-08-22T12:48:02.790000
CVE-2022-48901,0,0,3815d0d738961db5521290f57f22252e380bbcd01c63de9a8b81c61ebbbee0bc,2024-08-22T12:48:02.790000
CVE-2022-48902,0,0,3ff6d9302279291bb1d2e9eb863851e121ffad98e92de69140f6f831e1fba7cf,2024-08-22T12:48:02.790000
CVE-2022-48903,0,0,8ad23f64034f68803476665343be6aea5551252dc2139948d5ac32150ff6e5ca,2024-08-22T12:48:02.790000
CVE-2022-48904,0,0,05aa7a4e86729d93721fc78bcca8932138c75da702bb3ee60cc3ff2e2a679912,2024-08-22T12:48:02.790000
CVE-2022-48905,0,0,3266a56719a8523cbff76088b0907bf01416cd4e4e38cc796ad252025a0b42a5,2024-08-22T12:48:02.790000
CVE-2022-48906,0,0,c2f0bd8fdb3f9a1521c9786412ee3fe2aa6827f19cf3b8ae2736d679036a4d9a,2024-08-22T12:48:02.790000
CVE-2022-48907,0,0,c188f4c8814bd9f6f98170405a233fa28ff4041ac65d379bf8e057f090f743c6,2024-08-22T12:48:02.790000
CVE-2022-48908,0,0,0aed4270fe80d33fe1f58219e7c39a3b34f4f44a034115446ff65263275c1da9,2024-08-22T12:48:02.790000
CVE-2022-48909,0,0,60753974402d7b9dc0b7da2840cff75c54ff83e7db7e3cd742fa083f4cbfd72e,2024-08-22T12:48:02.790000
CVE-2022-4891,0,0,a455b0842f19c717ee670b5db60155cb5018f293a7aaf3547e3c50a0a475a09d,2024-05-17T02:17:01.767000
CVE-2022-48910,0,1,c49907901e2444dc6fb276986d8fa7581490f1e186329d0375e706884b0faf75,2024-08-22T12:48:02.790000
CVE-2022-48911,0,1,b66c8472f6855508ff6f6a7b1b64d3f2605476613ce462c2bb964595732f5764,2024-08-22T12:48:02.790000
CVE-2022-48912,0,1,bc2a2daaa3b38a68e53fbf8d9c97ac70c6915414f0359c7ec4f2980ad0abde6c,2024-08-22T12:48:02.790000
CVE-2022-48913,0,1,13c5f6805a21422f3cbdd0c8dd38766023838486158b2d75d57883e5de7b7695,2024-08-22T12:48:02.790000
CVE-2022-48914,0,1,17a954177f70a24d9987d801118d084e4480c7c3850b7fa42f10a93117b17e59,2024-08-22T12:48:02.790000
CVE-2022-48915,0,1,0b1fbcc9a6997478047f46007fdf7710031f4d070e9f8556b269c63077533d0f,2024-08-22T12:48:02.790000
CVE-2022-48916,0,1,8f20ce1d1c5363f5f68e39b98839eaf52bfa07c01964cca89491dcdb59190093,2024-08-22T12:48:02.790000
CVE-2022-48917,0,1,58439b65e36dbb2ade45a1620a3a14ca27906f33b947d1f0a9005280949a5eee,2024-08-22T12:48:02.790000
CVE-2022-48918,0,1,a06ecdecdb3be4f4b6eb324472cfffcf7ceef19b2a53970b6146c71dc16cae1e,2024-08-22T12:48:02.790000
CVE-2022-48919,0,1,7bfca989d0f16a5cbff28fbb03b7f902adac3eae36b615fa584b6f6041df7bf9,2024-08-22T12:48:02.790000
CVE-2022-48910,0,0,c49907901e2444dc6fb276986d8fa7581490f1e186329d0375e706884b0faf75,2024-08-22T12:48:02.790000
CVE-2022-48911,0,0,b66c8472f6855508ff6f6a7b1b64d3f2605476613ce462c2bb964595732f5764,2024-08-22T12:48:02.790000
CVE-2022-48912,0,0,bc2a2daaa3b38a68e53fbf8d9c97ac70c6915414f0359c7ec4f2980ad0abde6c,2024-08-22T12:48:02.790000
CVE-2022-48913,0,0,13c5f6805a21422f3cbdd0c8dd38766023838486158b2d75d57883e5de7b7695,2024-08-22T12:48:02.790000
CVE-2022-48914,0,0,17a954177f70a24d9987d801118d084e4480c7c3850b7fa42f10a93117b17e59,2024-08-22T12:48:02.790000
CVE-2022-48915,0,0,0b1fbcc9a6997478047f46007fdf7710031f4d070e9f8556b269c63077533d0f,2024-08-22T12:48:02.790000
CVE-2022-48916,0,0,8f20ce1d1c5363f5f68e39b98839eaf52bfa07c01964cca89491dcdb59190093,2024-08-22T12:48:02.790000
CVE-2022-48917,0,0,58439b65e36dbb2ade45a1620a3a14ca27906f33b947d1f0a9005280949a5eee,2024-08-22T12:48:02.790000
CVE-2022-48918,0,0,a06ecdecdb3be4f4b6eb324472cfffcf7ceef19b2a53970b6146c71dc16cae1e,2024-08-22T12:48:02.790000
CVE-2022-48919,0,0,7bfca989d0f16a5cbff28fbb03b7f902adac3eae36b615fa584b6f6041df7bf9,2024-08-22T12:48:02.790000
CVE-2022-4892,0,0,a02afb40fce024abebfb05a40298b81994dfc2b7567f3762fdb2b328cbdbe6a9,2024-05-17T02:17:01.897000
CVE-2022-48920,0,1,b393f9096ec2dd749ea58d3cba07e0b6170f7ce1e47bde6c059e20f2b353f3a4,2024-08-22T12:48:02.790000
CVE-2022-48921,0,1,565ba181b0f1f2dfc9fe72312b91e9931d175894bd53f2b2a8229bd70f9ca157,2024-08-22T12:48:02.790000
CVE-2022-48922,0,1,485fd7b1352c6198add8f08095b571046478ed9662200df59a8f5eef93ca9987,2024-08-22T12:48:02.790000
CVE-2022-48923,0,1,7c871d7f7fad4b7b8cc0fef537eadf3094068942b00174225e14cad2e67b8948,2024-08-22T12:48:02.790000
CVE-2022-48924,0,1,e0bfb77d6c7b779c400d1b544938bf3cb6f80aae09edffc19024f5e7977cec33,2024-08-22T12:48:02.790000
CVE-2022-48925,0,1,ff5926614a83baf0935fe0e95a03c9378350f3a649913fba8b288632dbffad29,2024-08-22T12:48:02.790000
CVE-2022-48926,0,1,96fecd682b27cf2de3915a440e56df1865f27383d104b4ed458351fa9431ab6b,2024-08-22T12:48:02.790000
CVE-2022-48927,0,1,a44e4b6ae745d40a786daa9c270c73173da73b553dac3a7d44f4764c34800a42,2024-08-22T12:48:02.790000
CVE-2022-48928,0,1,f8e81bb3574539f8abb783ecf51d34de3de3e7ff77ae69ee3a320f5eff944b6d,2024-08-22T12:48:02.790000
CVE-2022-48929,0,1,f4cda031ac7c4aa132b3cf10147d34cbd29cdba8e6462b4c07fea2241e6f5ce7,2024-08-22T12:48:02.790000
CVE-2022-48920,0,0,b393f9096ec2dd749ea58d3cba07e0b6170f7ce1e47bde6c059e20f2b353f3a4,2024-08-22T12:48:02.790000
CVE-2022-48921,0,0,565ba181b0f1f2dfc9fe72312b91e9931d175894bd53f2b2a8229bd70f9ca157,2024-08-22T12:48:02.790000
CVE-2022-48922,0,0,485fd7b1352c6198add8f08095b571046478ed9662200df59a8f5eef93ca9987,2024-08-22T12:48:02.790000
CVE-2022-48923,0,0,7c871d7f7fad4b7b8cc0fef537eadf3094068942b00174225e14cad2e67b8948,2024-08-22T12:48:02.790000
CVE-2022-48924,0,0,e0bfb77d6c7b779c400d1b544938bf3cb6f80aae09edffc19024f5e7977cec33,2024-08-22T12:48:02.790000
CVE-2022-48925,0,0,ff5926614a83baf0935fe0e95a03c9378350f3a649913fba8b288632dbffad29,2024-08-22T12:48:02.790000
CVE-2022-48926,0,0,96fecd682b27cf2de3915a440e56df1865f27383d104b4ed458351fa9431ab6b,2024-08-22T12:48:02.790000
CVE-2022-48927,0,0,a44e4b6ae745d40a786daa9c270c73173da73b553dac3a7d44f4764c34800a42,2024-08-22T12:48:02.790000
CVE-2022-48928,0,0,f8e81bb3574539f8abb783ecf51d34de3de3e7ff77ae69ee3a320f5eff944b6d,2024-08-22T12:48:02.790000
CVE-2022-48929,0,0,f4cda031ac7c4aa132b3cf10147d34cbd29cdba8e6462b4c07fea2241e6f5ce7,2024-08-22T12:48:02.790000
CVE-2022-4893,0,0,e5120248272b3a04098ac5e53563854b20f8eec46dd8a336f605680da692549d,2023-11-07T03:59:15.230000
CVE-2022-48930,0,1,f4814afe4f8412d22f471d4b42c41a39289b07c6b527361cd94120f7cf64166c,2024-08-22T12:48:02.790000
CVE-2022-48931,0,1,d5215ce4f6e7bf10dfe8eda34e306f21ac23decacbdf3e56afc51d77eb9002c5,2024-08-22T12:48:02.790000
CVE-2022-48932,0,1,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf21e,2024-08-22T12:48:02.790000
CVE-2022-48933,0,1,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000
CVE-2022-48934,0,1,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000
CVE-2022-48935,0,1,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000
CVE-2022-48936,0,1,e5e6490031bd8ea6058d99325de9d6a29afe230573f54734a35addab474fa07c,2024-08-22T12:48:02.790000
CVE-2022-48937,0,1,98eb258fb5480a0a64ad578f4d7d0745fa4dca07cb91f4b45bfd63f9aff98e4e,2024-08-22T12:48:02.790000
CVE-2022-48938,0,1,966938e7530b15ebcc13eb90d4c2c84b75d163c5cb28b3caf3980b5de4d95ca5,2024-08-22T12:48:02.790000
CVE-2022-48939,0,1,d87216561f7a780dc797ba3a4cd412fbc9fe7377390bfa15f8570e808e36ecb7,2024-08-22T12:48:02.790000
CVE-2022-48930,0,0,f4814afe4f8412d22f471d4b42c41a39289b07c6b527361cd94120f7cf64166c,2024-08-22T12:48:02.790000
CVE-2022-48931,0,0,d5215ce4f6e7bf10dfe8eda34e306f21ac23decacbdf3e56afc51d77eb9002c5,2024-08-22T12:48:02.790000
CVE-2022-48932,0,0,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf21e,2024-08-22T12:48:02.790000
CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000
CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000
CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000
CVE-2022-48936,0,0,e5e6490031bd8ea6058d99325de9d6a29afe230573f54734a35addab474fa07c,2024-08-22T12:48:02.790000
CVE-2022-48937,0,0,98eb258fb5480a0a64ad578f4d7d0745fa4dca07cb91f4b45bfd63f9aff98e4e,2024-08-22T12:48:02.790000
CVE-2022-48938,0,0,966938e7530b15ebcc13eb90d4c2c84b75d163c5cb28b3caf3980b5de4d95ca5,2024-08-22T12:48:02.790000
CVE-2022-48939,0,0,d87216561f7a780dc797ba3a4cd412fbc9fe7377390bfa15f8570e808e36ecb7,2024-08-22T12:48:02.790000
CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000
CVE-2022-48940,0,1,6c2232d064008b51de41e3883361ae471cfa4d2baa265f94b3c9f5e081cb809f,2024-08-22T12:48:02.790000
CVE-2022-48941,0,1,7c688a7c244fb68615ed7d5d279e538ad5249bed2a7dc9d2630d8d33ed1bdedb,2024-08-22T12:48:02.790000
CVE-2022-48942,0,1,a81a7889c84bb2f83037b09e273a2b372457cf8542aa9c966659f5b1dd1186d9,2024-08-22T12:48:02.790000
CVE-2022-48943,0,1,d7eecc45f74def44aad3b02137059c63161b61532700973d2208c6f9f55014f2,2024-08-22T12:48:02.790000
CVE-2022-48940,0,0,6c2232d064008b51de41e3883361ae471cfa4d2baa265f94b3c9f5e081cb809f,2024-08-22T12:48:02.790000
CVE-2022-48941,0,0,7c688a7c244fb68615ed7d5d279e538ad5249bed2a7dc9d2630d8d33ed1bdedb,2024-08-22T12:48:02.790000
CVE-2022-48942,0,0,a81a7889c84bb2f83037b09e273a2b372457cf8542aa9c966659f5b1dd1186d9,2024-08-22T12:48:02.790000
CVE-2022-48943,0,0,d7eecc45f74def44aad3b02137059c63161b61532700973d2208c6f9f55014f2,2024-08-22T12:48:02.790000
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
@ -216811,7 +216811,7 @@ CVE-2023-22695,0,0,b5917e5149b915696badd85daf09f72e8639a5436da286f9d7651eb863e4d
CVE-2023-22696,0,0,bb60c4afa6f619bda4d5f258a4840b89ee1307f2674bc8e9c2e7e703c8675d12,2023-05-16T21:25:22.240000
CVE-2023-22698,0,0,1a5709eb80cfb92bd3ed92b38627c6a737191cd821464eb362bbeed514a39398,2023-04-28T03:44:28.200000
CVE-2023-22699,0,0,a7441b107bb264286416ed9d3fc434137df8e7d7758dc3d857f27ab189400997,2024-03-25T13:47:14.087000
CVE-2023-2270,0,1,a1057111ea3073789a593113e36ff471e6ef293e8ab3004bb6fd2a7a1c0a7565,2024-08-22T13:15:04.820000
CVE-2023-2270,0,0,a1057111ea3073789a593113e36ff471e6ef293e8ab3004bb6fd2a7a1c0a7565,2024-08-22T13:15:04.820000
CVE-2023-22700,0,0,d586af827018cfbff4045d3523910576297d96f4f073b1fccd400c4610496028,2023-11-07T04:07:15.027000
CVE-2023-22702,0,0,3fdc269bc0f2a2b6c3e8672df60be4c04280e7338add33548788771bfb76b8e0,2023-11-07T04:07:15.113000
CVE-2023-22703,0,0,28370d95808961d9d26f0ad096967a2e0a9fe95a84fa61cab7f30dc849d56606,2023-05-22T17:12:55.480000
@ -217882,7 +217882,7 @@ CVE-2023-24062,0,0,7349391aa1b91dc2f7dd35a217ddf473498cadeb29f5897b6dc518a785304
CVE-2023-24063,0,0,c7aaa53e06b05b465c4c303b4d1d80d1b86df5b05165165b121a99c122768787,2024-08-19T19:04:47.293000
CVE-2023-24064,0,0,ea608bd85f328e25ad346566e820e40989eae34a1962a7913afeb3fd2bab99c5,2024-08-19T19:04:26.627000
CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000
CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000
CVE-2023-24068,0,1,efa89cea43eacdbe090acdc4021643fdac80fc9f7fb2eacafd76af63322c0b8f,2024-08-22T15:35:03.853000
CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000
CVE-2023-2407,0,0,4e7522c024a3236b8f81276c0b7a8a72f2eafc2c8b2dbc8b1918850286948fce,2023-11-07T04:12:37.020000
CVE-2023-24070,0,0,a03e8a943e32b6cd457e58b59335ffecc5d8fc731aaf6b71cf658947deaef048,2024-01-09T02:55:33.710000
@ -219600,7 +219600,7 @@ CVE-2023-26208,0,0,6d0f4dc6d724abcb907704fe533b579a8e93c30a273129ba89479b697be9d
CVE-2023-26209,0,0,7d59b19062f3260362329b8fb9d5c15b2ae02a8836d5bca5cb172fc8c782b133,2023-11-07T04:09:30.447000
CVE-2023-2621,0,0,7f94a2689b6229804f06a0491733acc8b775ae9f925cf1e972b069fef12e261e,2023-11-08T20:24:04.207000
CVE-2023-26210,0,0,99c2d6b2b1b10e12d31bdc0b224bc3d023d9d7cc443b37d4e2e13fe1d6018bbf,2023-11-07T04:09:30.613000
CVE-2023-26211,0,0,0353f969282fdc23b27a4dd6f4be6f94b38022f67eebb6b9ee9530e78b8ed6b6,2024-08-13T17:11:53.553000
CVE-2023-26211,0,1,5a263dd7d2e3150aad12bb103fa2fbf5877e875e68ee83bc46d00b52837b4027,2024-08-22T14:33:54.453000
CVE-2023-26213,0,0,9fca21a4f0ef9105b70445769c776c24e65be74243dac24bc6ee96342368114c,2023-03-10T14:53:13.973000
CVE-2023-26214,0,0,9e7b174c5aaea2917c7d88fd07688e669455d4f2f30624879fd03413171a17b0,2023-03-02T18:26:30.863000
CVE-2023-26215,0,0,79741706e0402cd903a56cce97eb88259c18de371ac6ef6ea150277ca6ac8145,2023-06-01T20:34:27.187000
@ -222570,7 +222570,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db
CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000
CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000
CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000
CVE-2023-29929,0,1,6e328a7115739fc9a6f658723a1504ea401ff9bc6fd40aaaaf4e9cf810b89bd4,2024-08-22T12:48:02.790000
CVE-2023-29929,0,0,6e328a7115739fc9a6f658723a1504ea401ff9bc6fd40aaaaf4e9cf810b89bd4,2024-08-22T12:48:02.790000
CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000
CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000
CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000
@ -230197,7 +230197,7 @@ CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec05
CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000
CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000
CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000
CVE-2023-40110,0,1,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000
CVE-2023-40112,0,0,4ddec6ab2662940b93a3dc42430a4fadcac48159b9ef1e91d81653103c488b43,2024-02-16T13:37:55.033000
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000
@ -231623,7 +231623,7 @@ CVE-2023-41915,0,0,eb4af7dc255b20820c2223dbb394a71a5ac4fe4f18ba74d3375c99078da8c
CVE-2023-41916,0,0,6b34ea5d9b717fe7b3229f20e3b3555c4c2b60ad9d42b075d34a5ff3a8572cc7,2024-07-16T18:06:13.463000
CVE-2023-41917,0,0,f3161e8d6c620e45be8c901747b972f5e1c375ee92e6d63bc7e00bef339a5387,2024-07-02T12:09:16.907000
CVE-2023-41918,0,0,0856e5fa41285db5b029ff0214e8d51ede0087304c24a711546183f0175c9d9e,2024-07-02T12:09:16.907000
CVE-2023-41919,0,1,f8d35904c25a74a26f55998c96c61a6b3450167ea33b5f8e9817a25e2f0baf6f,2024-08-22T13:44:19.347000
CVE-2023-41919,0,0,f8d35904c25a74a26f55998c96c61a6b3450167ea33b5f8e9817a25e2f0baf6f,2024-08-22T13:44:19.347000
CVE-2023-4192,0,0,b2cba7a400850bcefaf038a201054703a1f389a9c415fd37d13b2654a5f7d6d1,2024-05-17T02:31:25.590000
CVE-2023-41920,0,0,f99f28378501ba77833478b3317263646d41fe7c60021dbbc2409955fd4a63d6,2024-07-02T12:09:16.907000
CVE-2023-41921,0,0,85da7b95ea0791c0dcc258e060fd4dfad3edf939d208c0566032631c2404b5dc,2024-07-02T12:09:16.907000
@ -232393,7 +232393,7 @@ CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43
CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000
CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000
CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000
CVE-2023-42945,0,0,a06b1aec09c4d06c83c2ecc43e93c97ac1de84ec55101d5962c5f9ba2c7586a9,2024-02-22T19:07:27.197000
CVE-2023-42945,0,1,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000
CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000
CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000
CVE-2023-42948,0,0,e60e6a270a4159f47177637c1f0213b5b06987cbaccbf7c2b067805f6ba007e7,2024-08-12T15:43:25.587000
@ -235263,7 +235263,7 @@ CVE-2023-4723,0,0,a7b5d9fe62bfe417bf7a01ca914351b9a139cb64decca1c52b45f88bca778b
CVE-2023-47230,0,0,8c9ea53aeba7fb8dc01a6d3d446631ba61b08e735e3638033e92bc7eff978922,2023-11-16T23:42:46.737000
CVE-2023-47231,0,0,0e56d6a53e9dffcad55f29918057657f20586c9cd9de1621fecc7e52cf2c944b,2023-11-15T16:21:11.800000
CVE-2023-47233,0,0,6a6dbaf8f067fa8b9ee025869bebffd314b509a9e4a321b94211adf000ea7deb,2024-06-27T13:15:52.623000
CVE-2023-47234,0,0,27d98418da39b1b8478d0068b18a3ae859609b992f5d9490cc9a1de888a7f54d,2024-04-28T07:15:08.703000
CVE-2023-47234,0,1,c0b750c83f29ad2eb543e31817525b502e810fc43a7032b6a3e3b95afaf2d447,2024-08-22T15:35:04.480000
CVE-2023-47235,0,0,b75caa87f8a3a2600e2a80e9d7122ca67645d01789e6d8aacfb2b04849ef8ebd,2024-07-03T01:42:11.777000
CVE-2023-47236,0,0,b3e204de76f54e6e3f6ebb929e777f0a8ba1d0aae0254c73ae685244df53a883,2023-12-28T20:07:16.600000
CVE-2023-47237,0,0,3ebc1ce6a5413647a9dd520607d2ca86d15d269ba64f5051655b2d6b2994c39a,2023-11-15T02:25:41.300000
@ -238754,7 +238754,7 @@ CVE-2023-52372,0,0,15bf2071dc5da824a9df6bfd38af92c18dd9fd6f2d339d50b05268dc8c69c
CVE-2023-52373,0,0,b688042e235deab3885c2fa0dca42afdbe734d6e8b4da6930a3ca13df8c7b884,2024-02-20T19:50:53.960000
CVE-2023-52374,0,0,c3e1b0b58b2485371f036ee611aa6749f15d30b59aa2e7e645694aa3a34e19b3,2024-02-20T19:50:53.960000
CVE-2023-52375,0,0,8b1124f491eac6a9625ff675ba683400b5b7d3f23a913d0d79196202d05c38ba,2024-02-20T19:50:53.960000
CVE-2023-52376,0,0,966c0b9afbf77fef7dc680bf9065060f324b30ed0f773f88e03a29b8b0b46d13,2024-02-20T19:50:53.960000
CVE-2023-52376,0,1,83a4ff733e5d799164c7ebb5fc1c6d2bc436056e3b5dd111bbf28970a41696b3,2024-08-22T14:35:03.367000
CVE-2023-52377,0,0,b7bb8dcb6ccf72aa22b68fe6a7295a9e9583539669264335e5baefdd8fb2b023,2024-02-20T19:50:53.960000
CVE-2023-52378,0,0,7d972f87df9155825bdca8688e6d1bd2426c7da77f9fdbba23cf94fc02560c06,2024-02-20T19:50:53.960000
CVE-2023-52379,0,0,93b64dbad4e7209449b731f7d3e953f0a7c364b7d5a6a5a8e4913ba277d5b0b1,2024-08-01T13:45:38.070000
@ -239524,7 +239524,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee
CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000
CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000
CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000
CVE-2023-5517,0,0,26e3e6fafe454abaf4b4ad12726b9973f42b178b2b11bba1c8c43796396e7f70,2024-05-03T13:15:20.990000
CVE-2023-5517,0,1,092f5a23d77e754c9b42cabd4ac07b9f18ffe376c4c7e384c57bdabfb0330954,2024-08-22T14:35:04.137000
CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000
CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000
CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000
@ -241107,7 +241107,7 @@ CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d90
CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000
CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
CVE-2024-0038,0,0,ea347078d5115696feec8ec271b749eacff96a2d3bca9777e248043aee98fcbc,2024-02-16T13:37:51.433000
CVE-2024-0038,0,1,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000
CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000
CVE-2024-0040,0,0,cb768c0c56422d8be59b8ead41b2abde5abcab3c6641c5456375c74ed8738c47,2024-08-01T13:45:55.990000
CVE-2024-0041,0,0,b813d6bcf6c48b25cab056ec33aebf10f8835e0ad83b4b9b3e3dda0209c4933b,2024-02-16T13:37:51.433000
@ -243102,7 +243102,7 @@ CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,0,1,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
@ -243115,12 +243115,12 @@ CVE-2024-20450,0,0,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35
CVE-2024-20451,0,0,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000
CVE-2024-20454,0,0,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6ed1,2024-08-07T19:09:46.290000
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
CVE-2024-20466,0,1,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000
CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
CVE-2024-20479,0,0,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
CVE-2024-20486,0,1,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
CVE-2024-20488,0,1,fc6ca65423793d813adb7786a7f4f54ac29768af74ad6292f06d6517e15ea15f,2024-08-22T12:48:02.790000
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
CVE-2024-20488,0,0,fc6ca65423793d813adb7786a7f4f54ac29768af74ad6292f06d6517e15ea15f,2024-08-22T12:48:02.790000
CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
@ -243924,7 +243924,7 @@ CVE-2024-21505,0,0,ac0ac0b92aa442242744d7f06340b74d855d239685d011ca9f10bc456a81b
CVE-2024-21506,0,0,0501aa9e15543c672d3de96d3e8d3d0c1c21afb2e19e663e8d9159c8a48b6b13,2024-06-05T15:15:11.173000
CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15ce9,2024-08-01T13:46:44.883000
CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000
CVE-2024-21509,0,1,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000
CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000
CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000
CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000
CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000
@ -244090,7 +244090,7 @@ CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214
CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fccbe,2024-06-13T18:36:45.417000
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
CVE-2024-21757,0,0,dad59f553668d8465c8ff77bb9e41235e6f40562131ee80a7115a635475146c0,2024-08-13T17:11:53.553000
CVE-2024-21757,0,1,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000
CVE-2024-21759,0,0,6a61d7cb7523f60aeda71efe4ce4dc64f1500a7a1399f02108eff6d901e5e1da,2024-07-09T18:18:38.713000
CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000
CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000
@ -244454,7 +244454,7 @@ CVE-2024-22239,0,0,9ea71bafa19cd131168ec7436d9ae98e5c9a50c32fb4550df539f9890cb5c
CVE-2024-2224,0,0,b7ed9c2b9de420f7dfef45eac495d93dd8573ef5087b0e0970c5333ab24ff4be,2024-04-10T13:24:22.187000
CVE-2024-22240,0,0,d7299eca430a3db2169c91a2dcf2392e54a6cf25183980860f34a8511f88e9e1,2024-02-10T04:11:57.463000
CVE-2024-22241,0,0,43dae529a9c9ad0aafe69e774734bac33e826cd26512a1ce15473d96a6d6b08b,2024-02-10T04:11:46.267000
CVE-2024-22243,0,0,90ca5a82d477941dd2956b1967ed67005d8f946e08ee126e4e1b2583a16735ff,2024-06-10T18:15:25.757000
CVE-2024-22243,0,1,72bca4806f3b46de2a1156654366dff0ac55a619786286afeabc5852a2a6c520,2024-08-22T15:35:05.027000
CVE-2024-22244,0,0,eedd59a55d37d004f47a47d330c84ea460b68618fc0176589f1e06dacf7dd073,2024-06-11T13:54:12.057000
CVE-2024-22245,0,0,b849e44010c7e6432b450e48e41da9a7dd3343f7e5f0bfd8d7ff7052eea57b33,2024-08-01T23:15:31.903000
CVE-2024-22246,0,0,76171b54a9144a796e871026656a5c18298d50d46b7b4fd57d1a0e8c44956850,2024-07-03T01:47:08.260000
@ -245199,14 +245199,14 @@ CVE-2024-23462,0,0,89eee1bc8417ec5c165498a10c45118559ef0ab7b53f75c35dd8c8aeefb82
CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d98980c9,2024-04-30T17:52:35.057000
CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000
CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000
CVE-2024-23466,0,0,63423335f501e582f6269fc9353787aeb4dadd9ceac96da8594c28144e574628,2024-07-18T12:28:43.707000
CVE-2024-23466,0,1,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000
CVE-2024-23467,0,0,5c86ed0c4cd13fd5925dd08e4b0d9d462c31ba7560e982c8660271250292a002,2024-07-18T12:28:43.707000
CVE-2024-23468,0,0,7442e7a1f95905e4c846579344b9b898257e33405e23ada18e8a7677ffa37903,2024-07-18T12:28:43.707000
CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000
CVE-2024-23471,0,0,fe11efd17d8239a398506b0c207c833c4f64b5421ad9bbfff0c7a3f2189764bd,2024-07-18T12:28:43.707000
CVE-2024-23472,0,0,9a4b2e7518963b9428772791dd10c9920fae883a7f99eac490a84e4c123ba003,2024-07-18T12:28:43.707000
CVE-2024-23472,0,1,121ca4221b4eb99e581b7a9e5e1e275d159863d781beeaa8fc9490d7cd94a082,2024-08-22T15:59:11.740000
CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000
CVE-2024-23474,0,0,5b83eda1571f8d586afa7fdf61e84b7ee80ad4b928c31e2fb19bed55c0b0f5c1,2024-07-18T12:28:43.707000
CVE-2024-23475,0,0,c393da98bbb9d83c6eda41c7438e97e9e7abcbedc909c6a49411cef32a15193c,2024-07-18T12:28:43.707000
@ -245968,7 +245968,7 @@ CVE-2024-24740,0,0,055e621299fb8cfa25051c1c9b5b6e90ccf0de6c197861466b8c657e95fd4
CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000
CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000
CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000
CVE-2024-24746,0,0,defb0ef90b2139aa53bf339236fc77bf79326f67417ba29c5ac9186485b8b499,2024-05-01T18:15:14.767000
CVE-2024-24746,0,1,40e7bceff1c25e6b9953ddd3810454050ac129de5e60f835bc00a18b7d10c7b8,2024-08-22T14:35:07.450000
CVE-2024-24747,0,0,c7102f6cbbbb54dbf174b4ec9b33188c1d6a88ca038e451e81aa538a223d6e72,2024-02-09T15:18:00.510000
CVE-2024-24748,0,0,5f49ffc2835721d9b1ffe4198862561f4a25b7f09882de4d4811a0ddce7110f1,2024-03-17T22:38:29.433000
CVE-2024-24749,0,0,38d4307753926d528fb1dee6ba588b6843344e7264e3e2eed6b33ca60b1a13c5,2024-07-01T16:37:39.040000
@ -246599,7 +246599,7 @@ CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b
CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000
CVE-2024-25637,0,0,6b107052af4924b87ae030a7574b9b21f62a146f03952919ea9b1d4b0e21ed3d,2024-06-27T12:47:19.847000
CVE-2024-25638,0,0,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000
CVE-2024-25639,0,0,2e0133ad446d332cd68f57f778e89c8682ede3319349a698b825e88d07ce11db,2024-07-08T15:49:22.437000
CVE-2024-25639,0,1,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf568353474b7,2024-08-22T14:59:56.757000
CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000
CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000
CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000
@ -248664,7 +248664,7 @@ CVE-2024-28197,0,0,ebbb24c53b214da61c59aa1ed3fd40540422fb963b886ee042ae1143b19df
CVE-2024-28198,0,0,478780fd06156bb317c277271c317897bdf49ef10b75d957b6978fee8df3f074,2024-03-12T12:40:13.500000
CVE-2024-28199,0,0,f82035624a0dd113a6f9a403dbf859b5c93aae6b204d264d2f86fe2f7beae2a7,2024-03-12T12:40:13.500000
CVE-2024-2820,0,0,e6da693a8f1a842c7812c843359506e760cdf3aeb2d5913e84708f1d3b4168fa,2024-05-17T02:38:32.343000
CVE-2024-28200,0,1,848f47156b7dea97a9f192a57ecb65c4366a740aa5ada8f7c8eccf77e8193637,2024-08-22T13:36:13.033000
CVE-2024-28200,0,0,848f47156b7dea97a9f192a57ecb65c4366a740aa5ada8f7c8eccf77e8193637,2024-08-22T13:36:13.033000
CVE-2024-2821,0,0,c2b44894dd7f88b2b849e5ba19097fd13ba6654511fb9e687a8b00c577041545,2024-05-17T02:38:32.443000
CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9650,2024-08-05T20:35:06.830000
CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000
@ -249099,10 +249099,10 @@ CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
CVE-2024-28987,0,1,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000
CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000
CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000
CVE-2024-28992,0,1,dcb8c493077168591aebe4d60d7719870f581d45ce48e73108abe9067fb629eb,2024-08-22T15:56:58.207000
CVE-2024-28993,0,1,9c5125da7327315f017a58b350f8b638b25e9c0dcede224162aff682993b7d59,2024-08-22T15:54:56.087000
CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000
CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000
CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000
@ -249882,7 +249882,7 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae
CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000
CVE-2024-3016,0,0,de2146827057d4173ad33d38353b5e127fb8228c688e81e98737f0f3b35e8a6f,2024-05-14T16:11:39.510000
CVE-2024-3016,0,1,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000
CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000
CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000
@ -250134,7 +250134,7 @@ CVE-2024-30414,0,0,e64c669e53c2987f3547fe2d3f570a685cb932dd6dc71edd2e9b0531a95f3
CVE-2024-30415,0,0,f281fed7c3faa7dc041e240ec4e6ac1c46962cc31332fe749fb4d64177e3d2e4,2024-04-08T18:48:40.217000
CVE-2024-30416,0,0,d291744711f1dbb5817510d2d6fc5de3fe8fd84c6a61838c148f9e7cfacc8058,2024-08-01T13:50:07.780000
CVE-2024-30417,0,0,454137694c003758247b4c0acabe990dae4347bce9b044c8ece06c3d4e475793,2024-04-08T18:48:40.217000
CVE-2024-30418,0,0,1df5cc20895f4454a18a9db65101208a879bcf1e74b024a952998a5645fb82f8,2024-04-08T18:48:40.217000
CVE-2024-30418,0,1,dd8da8af4bd8164eb1f999131e29375420efd11048e6bd1ecc6b7ea8936ad00d,2024-08-22T15:35:05.833000
CVE-2024-30419,0,0,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000
CVE-2024-3042,0,0,b51852dae1f5eba8e99dd3aba03255977b2f1344b1da87286dbd9f450156442b,2024-05-17T02:39:41.680000
CVE-2024-30420,0,0,c7aa765232ba482242d297cfff54623d69e480ef9ec026f910cf7643167f5bd5,2024-08-19T20:35:12.223000
@ -251334,7 +251334,7 @@ CVE-2024-3222,0,0,57632d7e58038bae9be25dcea3482f307de0a31f331213554dd2d325ef2109
CVE-2024-32228,0,0,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000
CVE-2024-32229,0,0,46cfde26330a35dd5af3aef05c7164d23baa98664713e164e4ba017a64475da0,2024-07-08T14:18:28.213000
CVE-2024-3223,0,0,ea7ad0974e81e86878848176b870b25d4ede66377ba0daa6f895cdaeb06d9607,2024-05-17T02:39:47.627000
CVE-2024-32230,0,1,4b1256fc34c85ba913ebeb5578bba52040a1b8980ff138f27db5cea5a8c9e8e4,2024-08-22T13:24:40.597000
CVE-2024-32230,0,0,4b1256fc34c85ba913ebeb5578bba52040a1b8980ff138f27db5cea5a8c9e8e4,2024-08-22T13:24:40.597000
CVE-2024-32231,0,0,e3ff33887d60df14bdea85ccf477fb1420b52bde0ed776b8984f5e679a5e1a71,2024-08-19T13:00:23.117000
CVE-2024-32236,0,0,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000
CVE-2024-32238,0,0,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000
@ -251920,7 +251920,7 @@ CVE-2024-32931,0,0,9326e9f8b392349334a86865ecc959dc7773de2f71f9497f72eb74e7b458d
CVE-2024-32932,0,0,4fb6f83f101b5683d5a8c45180e3a23cd3f8e2d3acfb194a28f95ea68de1746c,2024-07-02T17:44:45.700000
CVE-2024-32936,0,0,23e0b37e344ddd92e30dd7d9ca686ba35ea7eca4cd8b4bf43262492fe54966c0,2024-06-24T19:26:47.037000
CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743878,2024-07-05T12:55:51.367000
CVE-2024-32939,0,1,11e80ba2575da64eea1e59fabb5af0f80cf4de4d72cd6e77bcf2884a55e98e75,2024-08-22T12:48:02.790000
CVE-2024-32939,0,0,11e80ba2575da64eea1e59fabb5af0f80cf4de4d72cd6e77bcf2884a55e98e75,2024-08-22T12:48:02.790000
CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000
CVE-2024-32944,0,0,4fb2f2be57e3c45f28985f6208cc39a6b7c152924d34534ee51269b999eeb2f4,2024-05-28T12:39:28.377000
CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000
@ -252732,7 +252732,7 @@ CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a2
CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000
CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd8dc,2024-05-14T16:12:23.490000
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
CVE-2024-34226,0,0,ee0bf03dfbb7276f0e585da87dd55a8f54aaadf529a97ab40343d543468cb68c,2024-05-14T16:12:23.490000
CVE-2024-34226,0,1,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000
CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000
CVE-2024-34230,0,0,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000
CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000
@ -253278,7 +253278,7 @@ CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9
CVE-2024-35116,0,0,a563a8223baddb703f5fd1f07e904d7e927e5f21b3c89fcbd6f74db44a319ee0,2024-08-21T14:46:12.917000
CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
CVE-2024-35124,0,1,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000
CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
CVE-2024-35136,0,0,7ce7700127cc7b6ccc2ab53565555e162fb44eed59671a9c3566dce17204010c,2024-08-15T13:01:10.150000
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
@ -253288,7 +253288,7 @@ CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794
CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000
CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000
CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000
CVE-2024-35151,0,1,380c3880e2cf7167b57192ea0a62886feb3d1fb9781e130286f4e29cc6acc88c,2024-08-22T12:48:02.790000
CVE-2024-35151,0,0,380c3880e2cf7167b57192ea0a62886feb3d1fb9781e130286f4e29cc6acc88c,2024-08-22T12:48:02.790000
CVE-2024-35152,0,0,b41d5d8fb05afbf50d1ef06fd658b7850273eedb06cda6e29568f6ff2e26d7a2,2024-08-15T13:01:10.150000
CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000
CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000
@ -253456,7 +253456,7 @@ CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125
CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000
CVE-2024-35384,0,0,80c459d6b8b92f35efd27c83c865d17dc86005bdbc1e6e04541d28ddd40786f0,2024-08-01T13:52:39.203000
CVE-2024-35385,0,0,398a0815629caee79e0ed577c05dcef42bd37c568d9a41ae8597fc88574b3380,2024-07-03T02:01:39.520000
CVE-2024-35386,0,0,0d71ba29986ccea865e900a0b900b22bba600b21e14a5ae1918159d6fb15df4c,2024-05-21T16:54:26.047000
CVE-2024-35386,0,1,2a720bc530e0efacea62f463c2514e39604e38d3d34515573bee595bfa4c9346,2024-08-22T15:35:07.413000
CVE-2024-35387,0,0,c15fdfd7d84f50c783e9e09361abe37993b474b133a90ed661a9f7fadb59afd8,2024-07-03T02:01:40.300000
CVE-2024-35388,0,0,830a86b36926f5e0687c6d41178a5d819df1e34c94732e02a8d2ad4cef75400a,2024-07-03T02:01:41.110000
CVE-2024-3539,0,0,187a49c7d3510ecfca5f59edc68d9b81cca1aa600a7ff6a291f1b4fc3dfb6d98,2024-06-26T18:15:15.653000
@ -254275,7 +254275,13 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046
CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
CVE-2024-36439,1,1,552cc6bf9f3a854c35497dfa977c3d093556dbdf2425977771abb27b0df0b30f,2024-08-22T15:15:15.883000
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
CVE-2024-36440,1,1,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
CVE-2024-36442,1,1,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
CVE-2024-36443,1,1,6b41f9be21c37101e04a2af5bcb1ed0de69466c478ef5ba6e2afaead6470be36,2024-08-22T14:15:08.443000
CVE-2024-36444,1,1,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
CVE-2024-36445,1,1,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000
CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000
@ -254319,7 +254325,7 @@ CVE-2024-36500,0,0,32af1afd4bbbe42fa4488d4c1e5cc6ce476ad041bd1fdba49949cbef0ad81
CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc1e8,2024-07-16T16:25:49.413000
CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000
CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000
CVE-2024-36505,0,0,47b91e9f770848829fdb796215d6588f3aee41b7ab32e37ff03a4c466180e874,2024-08-13T17:11:53.553000
CVE-2024-36505,0,1,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000
CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000
CVE-2024-36518,0,0,064cad3de67032c4f830b8ce3196cfd8df79e51094d50317231dcf250dd1a617,2024-08-12T13:41:36.517000
CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000
@ -254427,7 +254433,7 @@ CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d4
CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000
CVE-2024-36773,0,0,720de74f1ee0644bf544aa650aaafc650bba06adb51118d8aad2d248b0937337,2024-08-02T17:05:08.087000
CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000
CVE-2024-36775,0,0,f07b67642f75fd9d913fa22115fe66980fe2b4386b82775fae07bc9d05d87899,2024-07-16T14:20:42.573000
CVE-2024-36775,0,1,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000
CVE-2024-3678,0,0,469a9707bf4a10787b83dfdbba79cfb824cfe86b743e31553512cd5fa81bcd6d,2024-04-26T12:58:17.720000
CVE-2024-36782,0,0,a26ba637b3d65bc93f6cef8eab2e486cb22e0f173ff0b09ffa5f5054e7e91e9a,2024-07-03T02:03:36.797000
@ -254802,7 +254808,7 @@ CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e786480
CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000
CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000
CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14628,2024-08-05T12:41:45.957000
CVE-2024-37287,0,1,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000
CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000
@ -255559,8 +255565,8 @@ CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a3
CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000
CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000
CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000
CVE-2024-38501,0,1,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000
CVE-2024-38502,0,1,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000
CVE-2024-38501,0,0,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000
CVE-2024-38502,0,0,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000
CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000
CVE-2024-38504,0,0,4c5e9d4e31ce363d990483052f136d892b9e9d476c16b9ba9ffe4f7ab7d68bdb,2024-06-20T12:44:01.637000
CVE-2024-38505,0,0,b17f43381c815e52625008a26f98d511f617e1d606d0689fa471d4457a2ae811,2024-06-20T12:44:01.637000
@ -255644,7 +255650,7 @@ CVE-2024-38576,0,0,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362
CVE-2024-38577,0,0,4c84519c5a14d83bf1e1afda58945cc2b4924597691a0e5a8782c751132e779f,2024-08-01T20:13:24.763000
CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000
CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000
CVE-2024-3858,0,0,d11e2dcbca33c3f05cbcbfaae57c5af41c33fe71a136462d5a229c7addfc2568,2024-04-17T12:48:31.863000
CVE-2024-3858,0,1,dd053838f3e277a81d969816e65a4f781c68054bd6d54d527d61add36147e05e,2024-08-22T15:35:08.807000
CVE-2024-38580,0,0,f767d8c72e121e64fa886da74166c0eb1f56d7af5ff19f167059ca44868c4cb6,2024-06-20T12:44:01.637000
CVE-2024-38581,0,0,163d2599f0d04bac3fcda8729bc91618b1a33a7c58994982f4ff41f06afb0603,2024-08-01T20:12:00.623000
CVE-2024-38582,0,0,5bf2ab3765292126c7b2b3caf98adbacc937c1d69982e23478c39937ea0c9383,2024-07-15T07:15:10.780000
@ -256018,7 +256024,7 @@ CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d
CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000
CVE-2024-39306,0,0,8e446f8cd38382555b776a84edd1102287cdb22d9e95652344c53f12d26a921f,2024-08-19T14:15:22.423000
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
CVE-2024-39308,0,0,9b87f813f1d0c3d047f0b3cb0fa602208ca4159a3cdabc0e55a7e199b0ded98f,2024-07-08T15:49:22.437000
CVE-2024-39308,0,1,391a33c40d65efbb21a3e72856c5b6e7c78acfc8a536f5e714b7e384392790dc,2024-08-22T14:22:34.320000
CVE-2024-39309,0,0,136c09ae402132cc087ad5758d406eac21c47491362259de052db9baf065bd3e,2024-07-02T12:09:16.907000
CVE-2024-3931,0,0,dc3222ede6dc2fc1538ac21332ba32552f7a481ab27e70085114f0462848e6c7,2024-06-06T20:15:13.933000
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
@ -256149,7 +256155,7 @@ CVE-2024-39482,0,0,2e53f7f56d22a34ce6ad819626880e479ce6053c61a068f9f1a515a60263c
CVE-2024-39483,0,0,d36581a3f952605fa4deddb55b42f749ee06fd7a8fd95b57c25fb72ba28ba332,2024-07-08T18:00:08.430000
CVE-2024-39484,0,0,a445c76503df3c2b08ea3e5bff9e0551e6280c35730c3d8354635c9d4c9c04c5,2024-07-08T18:01:56.137000
CVE-2024-39485,0,0,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000
CVE-2024-39486,0,1,53993c58f90918b7c97876ffca7dc269893e47fb56c6e517d9e82dcf2f998636,2024-08-22T13:48:52.847000
CVE-2024-39486,0,0,53993c58f90918b7c97876ffca7dc269893e47fb56c6e517d9e82dcf2f998636,2024-08-22T13:48:52.847000
CVE-2024-39487,0,0,07f5386c1bdf0075b39a52e9355dbebed54d46b5a78637d307e6a04462c33cf2,2024-08-21T17:18:01.117000
CVE-2024-39488,0,0,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000
CVE-2024-39489,0,0,c63175d29bd941720feca94efc3f3a1164cbdc8d8d5c1251ffb632e82e90379f,2024-07-31T14:50:26.330000
@ -256231,7 +256237,7 @@ CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd780649
CVE-2024-39570,0,0,477f2cc2b899254fd1996622a7d04056a7ae423def8bf935cbc64caf51d26e12,2024-07-09T18:19:14.047000
CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff34f,2024-07-09T18:19:14.047000
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-39576,0,1,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000
@ -256345,9 +256351,9 @@ CVE-2024-39740,0,0,03acc910317a10fe912464b7efeeb485740a2ca83e55d3c05a65c84915618
CVE-2024-39741,0,0,829c9dc10ec61ebda2ab0b49cc6a9c5e79410be7630ee14de90c81590961617f,2024-07-16T14:03:33.243000
CVE-2024-39742,0,0,d2c383b6f83715e80ad86c53a5952b482038888e11ae903f4721eb34788c653c,2024-08-07T16:08:52.997000
CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc129,2024-08-07T16:10:15.813000
CVE-2024-39744,0,1,0661d6019507664d10c4b717683438c5d079f28b35dfbeb05107ecc28c082587,2024-08-22T12:48:02.790000
CVE-2024-39745,0,1,a50367fdbf2df652a9fdb73419a9d966ebef321c155b9932df6fdc66bbd5af76,2024-08-22T12:48:02.790000
CVE-2024-39746,0,1,0e20ca81d9d325bdeee73b70da8ce4b47d626b09ef1d79c40ba99deb3dbd446d,2024-08-22T12:48:02.790000
CVE-2024-39744,0,0,0661d6019507664d10c4b717683438c5d079f28b35dfbeb05107ecc28c082587,2024-08-22T12:48:02.790000
CVE-2024-39745,0,0,a50367fdbf2df652a9fdb73419a9d966ebef321c155b9932df6fdc66bbd5af76,2024-08-22T12:48:02.790000
CVE-2024-39746,0,0,0e20ca81d9d325bdeee73b70da8ce4b47d626b09ef1d79c40ba99deb3dbd446d,2024-08-22T12:48:02.790000
CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000
CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000
CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000
@ -256359,7 +256365,7 @@ CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000
CVE-2024-39810,0,1,8ffe6106cd3f81e6397f53ddc73e570adbc9f3eccdaec8333407da88229b5c23,2024-08-22T12:48:02.790000
CVE-2024-39810,0,0,8ffe6106cd3f81e6397f53ddc73e570adbc9f3eccdaec8333407da88229b5c23,2024-08-22T12:48:02.790000
CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2cc8,2024-08-20T17:14:18.587000
CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000
CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000
@ -256376,7 +256382,7 @@ CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f3
CVE-2024-3983,0,0,96266c916334fb5a02e4aa53ae15055a84c8153845733e53311fdb712a51a549,2024-08-01T14:35:11.540000
CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000
CVE-2024-39832,0,0,6234d17b9478f93b770d730f2c819b00d4af0dd333bfbc3cf8b2152550951f28,2024-08-01T16:45:25.400000
CVE-2024-39836,0,1,870699baa42666cb61b0f053e07cca54b7f29f07a2740a233a926d9e677f37c3,2024-08-22T12:48:02.790000
CVE-2024-39836,0,0,870699baa42666cb61b0f053e07cca54b7f29f07a2740a233a926d9e677f37c3,2024-08-22T12:48:02.790000
CVE-2024-39837,0,0,c60120742f41154fefe3eaf4e38584ef459a2d1a28dab13e5a0225dc3e52fb1e,2024-08-01T16:45:25.400000
CVE-2024-39838,0,0,f1d266ac929ac8ff4f1b378f7710d38ca9858e2e9c50d8f3f7b866349ff32783,2024-08-05T12:41:45.957000
CVE-2024-39839,0,0,c4552c9b1ee7cea8a178134078e247b54a0ce7f628fb8b4d8589f1118253544d,2024-08-01T16:45:25.400000
@ -256665,7 +256671,7 @@ CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f
CVE-2024-40689,0,0,b737e3a1f88271d05934916a1e9611bb299eb972b578fcd1907e65284f8f8a13,2024-07-29T14:12:08.783000
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
CVE-2024-40697,0,1,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000
CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067bb31,2024-08-15T20:03:13.530000
CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000
@ -256768,7 +256774,7 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
CVE-2024-40886,0,1,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000
CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
@ -256942,10 +256948,10 @@ CVE-2024-41050,0,0,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1
CVE-2024-41051,0,0,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000
CVE-2024-41052,0,0,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000
CVE-2024-41053,0,0,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000
CVE-2024-41054,0,0,54d000610420765de59a42fcd6b0218f3e2dc53e9697b03d4c5cf83c4402e430,2024-07-29T16:21:52.517000
CVE-2024-41055,0,0,499100fd75a0a01af0a661e5f3f470cfc510510f055a9070bfb5cea9bafe2b0b,2024-07-29T16:21:52.517000
CVE-2024-41054,0,1,fb57c1b2d87b0db4b758e5bf9759b6f07aa083fd8f9d243c55e175c8a5861a4a,2024-08-22T14:11:42.053000
CVE-2024-41055,0,1,1a51f4529531a736115b87aea4e8a73346ad127f99905a25f3e6e7343b3d1385,2024-08-22T14:11:00.903000
CVE-2024-41056,0,0,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000
CVE-2024-41057,0,1,a55a0fad7ba15203e2b4b26c71efab49706c9bb2ce1d966486e4544f6f91ab8a,2024-08-22T13:38:03.577000
CVE-2024-41057,0,0,a55a0fad7ba15203e2b4b26c71efab49706c9bb2ce1d966486e4544f6f91ab8a,2024-08-22T13:38:03.577000
CVE-2024-41058,0,0,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000
CVE-2024-41059,0,0,a3e848e0f22cf6429fd584bc8b1d0becbc43af3e8de05f6d70f42a052cdb4353,2024-07-29T16:21:52.517000
CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000
@ -256960,34 +256966,34 @@ CVE-2024-41067,0,0,0efab6bb0225a9dd01a2c48c612b8c9b17f157652f45c02a997409b99216f
CVE-2024-41068,0,0,204dddbf2c3055c6474c497e009d780021b3a3ba131c505449bf528ad22a3199,2024-07-29T16:21:52.517000
CVE-2024-41069,0,0,66906a938ffa21542183270372c452da3dca88c60e17c7adf5b30603bb4e6f9d,2024-07-29T16:21:52.517000
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
CVE-2024-41070,0,0,b917467999536edbed0db36d7409a62ce0e397f1bec88e19fba513af1aeb0d41,2024-07-29T16:21:52.517000
CVE-2024-41070,0,1,01d1361dcf471afa5275cde4037db2ad5e839a7c0db4ba0fc938ed41752f9a1e,2024-08-22T14:05:32.407000
CVE-2024-41071,0,0,177c0b40693c47d1cfe95645d274ca4f188f21ea0538c600baca1cfb2270342f,2024-07-29T16:21:52.517000
CVE-2024-41072,0,0,9708e45d2def4fb738b5d02d9d55acf1fa8c399eb790a4b712e28e9b74f333ba,2024-07-29T16:21:52.517000
CVE-2024-41073,0,0,9429bfd27084dc522f39499985354d00abe783b73d0a957ee4fd10df6c6ae75e,2024-07-29T16:21:52.517000
CVE-2024-41073,0,1,cab647062b5f8d3239ead637a6bf28b2a45d5584465cb4fcbc7b276fb13535b4,2024-08-22T14:11:28.697000
CVE-2024-41074,0,0,f542082ddf599a04b16950f50752f817590bbf66500823b9fc1bcea6a4f3fe4f,2024-07-29T16:21:52.517000
CVE-2024-41075,0,0,7e5f7e52455b6252728f795318b0692091849e92df2f13b0fc7d4653c500eb13,2024-07-29T16:21:52.517000
CVE-2024-41076,0,1,16a9781840e0a19b08b657bc21d37f0f27b0c19f577ebc677bd3e135db214aff,2024-08-22T13:23:39.187000
CVE-2024-41076,0,0,16a9781840e0a19b08b657bc21d37f0f27b0c19f577ebc677bd3e135db214aff,2024-08-22T13:23:39.187000
CVE-2024-41077,0,0,624c12a81b5da2ca28754283bf1be5845da17d15a71a3309a4b7d9f34f9a714f,2024-07-29T16:21:52.517000
CVE-2024-41078,0,0,ac799525eff030bc0944058938e2136e8bedebdc2ca1a398b3a004427e84d2d5,2024-07-29T16:21:52.517000
CVE-2024-41079,0,0,195d83914ecf533f64d9473e7a01094e98909e6d193fb5c78da4c3efe06a0ebc,2024-07-29T16:21:52.517000
CVE-2024-41080,0,1,e07cf84bc9ad2e3e8b83775cb16613ee74bca75d2a4275631dc2d3efdbc5f8f3,2024-08-22T13:39:43.347000
CVE-2024-41080,0,0,e07cf84bc9ad2e3e8b83775cb16613ee74bca75d2a4275631dc2d3efdbc5f8f3,2024-08-22T13:39:43.347000
CVE-2024-41081,0,0,fff01037a051da08a2263944184820fc75504da30cc90ba25587a48f6e5bdd35,2024-07-29T16:21:52.517000
CVE-2024-41082,0,0,8c96018251a7f231d9567ce1460824d8249a158be4d0c82fcdc62e42366a49b9,2024-07-29T16:21:52.517000
CVE-2024-41083,0,0,dff5dc6a7165d8b682758090410b05b21412e86ab2996b0805e7e8a0c1a5ecb8,2024-07-29T16:21:52.517000
CVE-2024-41084,0,1,975b4f65d1ddddbe933a79acbb8ff50321f78b90f366199bfb15c938f6a9f0df,2024-08-22T13:18:10.240000
CVE-2024-41085,0,1,7a252ed8d051109fc55cff4bd64a22fd8a720ee57ad5e8f6e64433e61c3fa3c2,2024-08-22T13:16:24.190000
CVE-2024-41084,0,0,975b4f65d1ddddbe933a79acbb8ff50321f78b90f366199bfb15c938f6a9f0df,2024-08-22T13:18:10.240000
CVE-2024-41085,0,0,7a252ed8d051109fc55cff4bd64a22fd8a720ee57ad5e8f6e64433e61c3fa3c2,2024-08-22T13:16:24.190000
CVE-2024-41086,0,0,def1e72f4af73afb05473009bf28654fb55be728733d04a1cb558efe55809b1e,2024-07-29T16:21:52.517000
CVE-2024-41087,0,0,58c38c74c158e439afdb46cfb9959ea78813107a1e241ba0d714928a41f4075e,2024-08-08T18:00:03.977000
CVE-2024-41088,0,1,b43ead55fe1783beb062b9c0bad4f5d8fc111ffa367d1676f510a593678b71af,2024-08-22T13:16:08.143000
CVE-2024-41088,0,0,b43ead55fe1783beb062b9c0bad4f5d8fc111ffa367d1676f510a593678b71af,2024-08-22T13:16:08.143000
CVE-2024-41089,0,0,38c98937ddcf0489f642c6e9ec7fba9f1ecb4dca47f05ab2326eea2df7749aea,2024-08-08T17:50:48.727000
CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56b40,2024-07-29T14:12:08.783000
CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000
CVE-2024-41092,0,0,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000
CVE-2024-41093,0,0,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000
CVE-2024-41094,0,1,fd3c100ca3cf33e414c8572772cb645c4163d4d9a6ad8085d9e85c0721dd0693,2024-08-22T13:15:40.843000
CVE-2024-41094,0,0,fd3c100ca3cf33e414c8572772cb645c4163d4d9a6ad8085d9e85c0721dd0693,2024-08-22T13:15:40.843000
CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000
CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000
CVE-2024-41097,0,1,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000
CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000
CVE-2024-41098,0,0,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000
CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000
CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000
@ -257148,7 +257154,7 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
CVE-2024-41572,0,1,ab40cf80c59b95a1ebd2f7b9ce0b0eac0ef9840c48fb790d9e4d27dbb6725659,2024-08-22T12:48:02.790000
CVE-2024-41572,0,0,ab40cf80c59b95a1ebd2f7b9ce0b0eac0ef9840c48fb790d9e4d27dbb6725659,2024-08-22T12:48:02.790000
CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
@ -257166,7 +257172,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a
CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000
CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
CVE-2024-41623,0,1,f3c5b0f57e119ddfc16e10af982bd34e72c36ca954417a804caf07a43ab221b8,2024-08-22T13:50:16.117000
CVE-2024-41623,0,0,f3c5b0f57e119ddfc16e10af982bd34e72c36ca954417a804caf07a43ab221b8,2024-08-22T13:50:16.117000
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
@ -257254,7 +257260,7 @@ CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-41773,0,0,e915a596fb7e1ca4e452145ef4744da8e1b8ffba9e32d109e0437370be6438d6,2024-08-21T12:30:33.697000
CVE-2024-41774,0,1,42da2543a9388f5e4e9842b30e9bac4ae3d1d3acc4938c24e268b95f522142f0,2024-08-22T13:27:39.753000
CVE-2024-41774,0,0,42da2543a9388f5e4e9842b30e9bac4ae3d1d3acc4938c24e268b95f522142f0,2024-08-22T13:27:39.753000
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000
@ -257408,7 +257414,7 @@ CVE-2024-42052,0,0,af8a8292a6e99512114005b6f9d58ed4fc7c685aefbfc72a703623fe55284
CVE-2024-42053,0,0,a6062e6a4bcd11b760655238c4a48736a58caa8e1af15eed073e37dfa30638ab,2024-08-01T13:59:21.227000
CVE-2024-42054,0,0,7cefcb5df710c5d52c7b44743e7320cbb773b7864f3adff97191d41734299500,2024-07-29T14:12:08.783000
CVE-2024-42055,0,0,38832abf63aaabdc907feb9726d6725f630aba764b55549d89c565bd77d3378b,2024-07-29T14:12:08.783000
CVE-2024-42056,0,1,7329b0826f2ec4772be6e46132e4b6ca6ebfb74e104c0ef7e371bdd29dff8257,2024-08-22T12:48:02.790000
CVE-2024-42056,0,0,7329b0826f2ec4772be6e46132e4b6ca6ebfb74e104c0ef7e371bdd29dff8257,2024-08-22T12:48:02.790000
CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000
CVE-2024-42062,0,0,4478fdb9b22ea23c1311199bc27883e40d46ca58109e564d83bc2207123d372b,2024-08-19T14:15:22.663000
CVE-2024-42063,0,0,ab1fc80f4d5a337fc787a5927c5a2799f0f954cb8192994c0bb80d8c74f4b1de,2024-07-29T16:21:52.517000
@ -257453,7 +257459,7 @@ CVE-2024-42098,0,0,8a4ff599a1d3537153a17ab56baf7b7f5c48f0c9fee61b69ebcae9dd8a773
CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b006a,2024-07-30T13:32:45.943000
CVE-2024-4210,0,0,3de0526bc7ee4d2ee3e85387e784b47b575c14d9043bdb29c130980f21c212c3,2024-08-08T13:04:18.753000
CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000
CVE-2024-42101,0,1,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000
CVE-2024-42101,0,0,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000
CVE-2024-42102,0,0,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000
CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000
CVE-2024-42104,0,0,afcbe4f1517f0991a2f8be927dec0a5aee82a58d76a6b63d0d1ad5734deb68fb,2024-07-30T13:32:45.943000
@ -257630,9 +257636,9 @@ CVE-2024-42310,0,0,7629386c3f41aa6a34e41a6c5d349fabbd9abea6dcdeef93571adcc63039d
CVE-2024-42311,0,0,ee026ffaa3435a8fee00e98fff3782a46b4f2eff532aed7bff974de91275ee18,2024-08-19T12:59:59.177000
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
CVE-2024-42313,0,0,f319d0057aa3cd90f1188c53e50e737fae9be2ccf322f07044c4d422a41859d3,2024-08-19T12:59:59.177000
CVE-2024-42314,0,0,8aa67462e0e9b4d4dc4529a08e1d3b792177e1111a519ed972296122b97281bc,2024-08-19T12:59:59.177000
CVE-2024-42315,0,0,d39e1c5a9741e4f497363cf7739f163883ad331987a363bf39fee0df15c4e5be,2024-08-19T12:59:59.177000
CVE-2024-42316,0,0,0239a008a917b126c59698068cd78dd2d230edc6a30bd25f3a9ffde53fc4420a,2024-08-19T12:59:59.177000
CVE-2024-42314,0,1,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
CVE-2024-42315,0,1,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
CVE-2024-42316,0,1,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a573,2024-08-19T12:59:59.177000
CVE-2024-42318,0,0,9010727792eb410d1e9ad3b39440509d19383e8fe33f90305bb640c17c956a4b,2024-08-19T12:59:59.177000
CVE-2024-42319,0,0,eb5fc32e810c02d0e4bc3b0d9ebaf0ea35abaefd35cea63e1339820db2a46ad1,2024-08-19T12:59:59.177000
@ -257688,7 +257694,7 @@ CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4
CVE-2024-42400,0,0,e23fa86955810ac61993a53dac28992470f4d4df1a643f460294725e3f989414,2024-08-07T15:17:46.717000
CVE-2024-42408,0,0,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-42411,0,1,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000
CVE-2024-42411,0,0,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
CVE-2024-42434,0,0,9a2fab3c0bfcfe26ad4bc7e023423fbf9916073a1831f3237f47ba85a53a41b9,2024-08-14T17:49:14.177000
@ -257748,7 +257754,7 @@ CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b98
CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000
CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000
CVE-2024-42550,0,0,fc040a9fdb9874d1ee6063db817db51f08698296778147bc870cf1ae6bde398f,2024-08-21T17:24:59.627000
CVE-2024-42552,0,0,05029fbe912027602aebaf8833cf288ec3cd361d07011e6c98e55751bb0bdc6e,2024-08-20T15:44:20.567000
CVE-2024-42552,0,1,b6da6172bfaee31e780122f380efcaf48a37ee35d069ec9b3f7a187aa14d2135,2024-08-22T15:35:09.600000
CVE-2024-42553,0,0,2423da66b36b5ac46e4d328e5cb18cc8071803cc838cae0003cc2096a1c3dcbb,2024-08-20T16:35:22.120000
CVE-2024-42554,0,0,e7093d400617647f295578e1e2a0acba43985e714edb761c848d698d7a6942ea,2024-08-20T15:44:20.567000
CVE-2024-42555,0,0,0a22b9ad39decd5ee3fb21d58c15efa0c29c80c6617d4653453476c140cafc1c,2024-08-20T16:35:23.320000
@ -257771,7 +257777,7 @@ CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc
CVE-2024-42570,0,0,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000
CVE-2024-42571,0,0,1c554bb814a228d2952a27acace697648b5faf72b3d0b65c235a3480b0e47c2a,2024-08-20T15:44:20.567000
CVE-2024-42572,0,0,8a27d950b3f1c9ad5db7a77b1ee249eea67e2798f67a1d2d16a37bd410483cab,2024-08-21T16:35:10.263000
CVE-2024-42573,0,0,c4d9e0f6d8b833e2509d8c2910fa5ba22120e6bbd03b4460129e761d76e30cf4,2024-08-21T13:44:48.360000
CVE-2024-42573,0,1,00fbca41f1add93c23ba10874512b85c0d8d54a0b0357866c6b56806fe4c20af,2024-08-22T14:35:09.667000
CVE-2024-42574,0,0,aa616629d677652eb91e6bb032b777df1c13de96e0b62fbe4b20bbe0e1fe4f9a,2024-08-21T13:44:39.147000
CVE-2024-42575,0,0,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e7197a,2024-08-21T13:43:06.420000
CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000
@ -257859,16 +257865,16 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
CVE-2024-42777,0,1,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
CVE-2024-42778,0,1,cbd3903a79923424c789bda04b10d0059fc6638bf85821cf7827574c1f012c42,2024-08-22T12:48:02.790000
CVE-2024-42779,0,1,8b0019d18eb18c48c501c9596910d1e6d7959913f68a801b1d0ddc0d917975ed,2024-08-22T12:48:02.790000
CVE-2024-42780,0,1,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000
CVE-2024-42781,0,1,c7d2eec0a2ad53c0f5026c55411fbdd4e13ccda1c9e45e42511fa55d9f942874,2024-08-22T12:48:02.790000
CVE-2024-42782,0,1,3c8d9e8a7456b4276422f7adc718e8e576e662d3211523fc51973ca4c89a8cfc,2024-08-22T12:48:02.790000
CVE-2024-42783,0,1,51b01d67e90dd0e5b487abeb0faf3db05121eacfedd764dc830d4e6e024a03dc,2024-08-22T12:48:02.790000
CVE-2024-42784,0,1,a5dee07139c237f23e96b11e435316682bb55a83d28409a61db28aca6ac3df0a,2024-08-22T12:48:02.790000
CVE-2024-42785,0,1,af17701ad5396ad504383ea3b7d32d0aef9cefcef2ab17f8d0aa704a208552c8,2024-08-22T12:48:02.790000
CVE-2024-42786,0,1,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000
CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
CVE-2024-42778,0,0,cbd3903a79923424c789bda04b10d0059fc6638bf85821cf7827574c1f012c42,2024-08-22T12:48:02.790000
CVE-2024-42779,0,1,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
CVE-2024-42780,0,0,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000
CVE-2024-42781,0,1,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
CVE-2024-42782,0,1,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
CVE-2024-42783,0,0,51b01d67e90dd0e5b487abeb0faf3db05121eacfedd764dc830d4e6e024a03dc,2024-08-22T12:48:02.790000
CVE-2024-42784,0,1,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000
CVE-2024-42785,0,1,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000
CVE-2024-42786,0,0,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
@ -257941,7 +257947,7 @@ CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
CVE-2024-43033,0,1,99cabe3267561648c475535e19333b9cef7520f92aec3b6c534e35c1c6ff27a7,2024-08-22T12:48:02.790000
CVE-2024-43033,0,0,99cabe3267561648c475535e19333b9cef7520f92aec3b6c534e35c1c6ff27a7,2024-08-22T12:48:02.790000
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
@ -258085,7 +258091,7 @@ CVE-2024-43328,0,0,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965
CVE-2024-43329,0,0,26a74de26b02346cc9aef959a49d84425cfcd1e61c70d1d7eb5550839aec98ac,2024-08-19T12:59:59.177000
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
CVE-2024-43330,0,0,18c9cc1b418e02c0186c70603a33b75d4945832a6fdc2ddcfc149e88ac786f4b,2024-08-19T12:59:59.177000
CVE-2024-43331,1,1,4e09e4b4d53e8f961ef11d51941ee4646cb7ff13dcf07be6e13619d097dba721,2024-08-22T12:48:02.790000
CVE-2024-43331,0,0,4e09e4b4d53e8f961ef11d51941ee4646cb7ff13dcf07be6e13619d097dba721,2024-08-22T12:48:02.790000
CVE-2024-43335,0,0,dde6dc17375e74f502f7f2bfa9005d811d4652c2ebc27ff9b5ef0997127127d2,2024-08-19T12:59:59.177000
CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000
CVE-2024-43342,0,0,ee642e0e72d4e0e4ec6b9a91be938e0b4b5b569cf7ce0c2f528a0acbf756353e,2024-08-19T12:59:59.177000
@ -258126,6 +258132,7 @@ CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa095
CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000
CVE-2024-43396,0,0,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000
CVE-2024-43397,0,0,264c2f81cd99428d5aa158f1dc2af7c3c349186ea362901e061722c9a7a0394f,2024-08-20T15:44:20.567000
CVE-2024-43398,1,1,a88a0edf1fdebfdbb2faeb4a91b7e6ae77f78605c717ab0209af377bd1e321d9,2024-08-22T15:15:16.440000
CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
CVE-2024-43400,0,0,a74902014f54105a8fa235ae36e5688fa3ffdb525b8d03b30be1350fafa88962,2024-08-20T16:10:29.987000
@ -258177,13 +258184,15 @@ CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b3
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
CVE-2024-43785,1,1,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000
CVE-2024-43787,1,1,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f47472ea,2024-08-19T21:11:28.327000
CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000
CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000
CVE-2024-43813,0,1,23490cfe8e9593e896598724b2d4ad1701c8f9a379695f53fe665b270ee6b035,2024-08-22T12:48:02.790000
CVE-2024-43813,0,0,23490cfe8e9593e896598724b2d4ad1701c8f9a379695f53fe665b270ee6b035,2024-08-22T12:48:02.790000
CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000
CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000
CVE-2024-43817,0,0,7d65ded527da72f977763f6595da9be484a0a5a4216969a1232f7957de06d139,2024-08-19T12:59:59.177000
@ -258198,17 +258207,17 @@ CVE-2024-43824,0,0,3e6d9611c9c00713f2825d42dd41c9169c00e57ef1735c1ac7eade065567c
CVE-2024-43825,0,0,130af7d96288110e02aee1e7600bdbf8c5cd66dfe2f98ab074c672e68f4722cd,2024-08-19T12:59:59.177000
CVE-2024-43826,0,0,a71e01ef1f7bf0e81ff2e96aa2e3536879a0a625a8e0f17873ad3f06283b51ad,2024-08-19T12:59:59.177000
CVE-2024-43827,0,0,cf65368434e7a2b682a9d717038e50932b650d5aee79f4ae380ff9863f20dec9,2024-08-19T12:59:59.177000
CVE-2024-43828,0,0,7969df769811aea8d83499a81c83fb6921e17e2bc505af8cdf542c1791f85ec1,2024-08-19T12:59:59.177000
CVE-2024-43828,0,1,34d93531989f41b09094ffb798c3bd14e32cc02dc3ecd2194ff28e1c3f3ed704,2024-08-22T15:41:50.870000
CVE-2024-43829,0,0,cb6e8b0f01b87b3f7e043e1ec20f970771e88fee11f056198306c40048ba4acc,2024-08-19T12:59:59.177000
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
CVE-2024-43830,0,0,0c202a646bcfaaaa39d2cb27400c7552b5186a7ed520c033e84fbd5365796f5a,2024-08-19T12:59:59.177000
CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090039,2024-08-19T12:59:59.177000
CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000
CVE-2024-43833,0,0,3623983768678ca1b7e3f00acbdb47e103a563cf9e4c20db4939639c491abcae,2024-08-19T12:59:59.177000
CVE-2024-43833,0,1,b30b83d76397439bef43f76504d35264f0368821411284c2b15462cf53f03404,2024-08-22T15:42:46.827000
CVE-2024-43834,0,0,76e2d6369e7d6ad23c4c79e5f16adb028cca8d18769694b501fae11b3f998575,2024-08-19T12:59:59.177000
CVE-2024-43835,0,0,311ffd76c4938846026877fe43e10ffa3dcd91fe42160a62635c5b77934d0f9c,2024-08-19T12:59:59.177000
CVE-2024-43836,0,0,e40f27d7c22c42b777214dacc18f4f4a4afb5940ec1e235e66db76610b2d41d9,2024-08-19T12:59:59.177000
CVE-2024-43837,0,0,c031af4d870b7a85a7d24b59c46c59d5e784335aad5a9d79633dbb431212f88e,2024-08-19T12:59:59.177000
CVE-2024-43836,0,1,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000
CVE-2024-43837,0,1,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000
CVE-2024-43838,0,0,aea18ddc95b4597b8fcc9d42c5f12cf2294cab2381941209a829361028b9d783,2024-08-19T12:59:59.177000
CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721fa2,2024-08-19T12:59:59.177000
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
@ -258376,12 +258385,12 @@ CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f808
CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
CVE-2024-45163,0,1,dac3c0603de130ab8540a26c8055432d5c062a3f7c051e2931169a7ba082b28c,2024-08-22T12:48:02.790000
CVE-2024-45165,0,1,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
CVE-2024-45166,0,1,30a13f635ae394772fb1cb05c43443734516ac2853e37f29f36358e77178fc4e,2024-08-22T12:48:02.790000
CVE-2024-45167,0,1,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000
CVE-2024-45168,0,1,3aa538d4b13e0bd4bef927902f0e011916a51acfbdb35fa9329938fabd916397,2024-08-22T12:48:02.790000
CVE-2024-45169,0,1,d5b7a4092be80e1fc6bb56ce6edeb69aeff6e2af0ca8e47f8778f7eb7b1f0312,2024-08-22T12:48:02.790000
CVE-2024-45163,0,1,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
CVE-2024-45166,0,1,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
CVE-2024-45167,0,0,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000
CVE-2024-45168,0,1,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000
CVE-2024-45169,0,1,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
@ -258764,7 +258773,7 @@ CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6f
CVE-2024-4941,0,0,13ca0e2a0167ec0b910e07ee313a5634910f0ad60753924b6a13637e3feff21f,2024-06-07T14:56:05.647000
CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000
CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000
CVE-2024-4944,0,0,ac9c6def8fc9c7dc631cf9d0723f6329f24a35e87e842473e4e56b6a226bcf00,2024-07-09T18:19:14.047000
CVE-2024-4944,0,1,4c179510d1e03e5badefb2baa5976b22075fd8af2558d89d09a0401516cd83b3,2024-08-22T15:06:05.480000
CVE-2024-4945,0,0,30a0ab1a0c03dbd140fcf7c71669ea9d01e0f4e5f56736f7caa84678a6833359,2024-06-04T19:20:54.767000
CVE-2024-4946,0,0,c62331c31cdff2ac998e7e200ab6653707e57767349d786cb3712d85549cf2ad,2024-06-04T19:20:54.867000
CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c64636,2024-08-14T17:07:05.277000
@ -259308,7 +259317,7 @@ CVE-2024-5575,0,0,1d8c4bc7bfefa9359f03236311a531b02997d0972adc424dea9dbc344e7a3d
CVE-2024-5576,0,0,fb4e227ac1bca19b4b9b0346951bcae4e9457605b7b3160f8ccda6cb8cea0d35,2024-08-20T15:44:20.567000
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
CVE-2024-5583,0,1,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000
CVE-2024-5583,0,0,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
CVE-2024-5585,0,0,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
@ -259525,7 +259534,7 @@ CVE-2024-5844,0,0,cb741198deb8b5f70d2d0ce9c33e3416f6a940b998b67b99e17d7bffff2c68
CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f75,2024-07-03T02:09:29.493000
CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000
CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000
CVE-2024-5849,0,1,fbe9d86260db9e8cb798cbf32808a8f11473199e781c5d214bea36c9875add83,2024-08-22T13:39:08.797000
CVE-2024-5849,0,0,fbe9d86260db9e8cb798cbf32808a8f11473199e781c5d214bea36c9875add83,2024-08-22T13:39:08.797000
CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000
CVE-2024-5852,0,0,17ae123c3ebaa5002b861453d278a4e3499e2a8a6baca11a20783ec79d4cdcf1,2024-08-07T22:19:34.977000
CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000
@ -259614,7 +259623,7 @@ CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360b
CVE-2024-5971,0,0,01d70de536a697a1c65e871f029e293b5051eed9b63fc3f224826d44a6d72378,2024-08-12T13:38:38.567000
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000
CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000
CVE-2024-5974,0,1,6465747ebb7259fe338ca54f64293ac9e5e639bde8c31a40e65e3d25cce88c2a,2024-08-22T14:26:55.657000
CVE-2024-5975,0,0,fa255d4ef912d8f8da76e1022132a17caf8538a1c8cca7df81e3eaadac5c5086,2024-08-01T14:00:06.617000
CVE-2024-5976,0,0,77b9cc86c9238f37d2799be9bfcfd76dc8bf6ab8aad4ffdc48881bdede83c5f6,2024-08-16T17:53:25.450000
CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da75815823,2024-07-19T18:27:34.967000
@ -259946,7 +259955,7 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
CVE-2024-6386,0,1,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000
CVE-2024-6386,0,0,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
@ -259961,7 +259970,7 @@ CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a5
CVE-2024-6405,0,0,2f2aaf52bab49b757e1ad90b974deb9c303ecc0ebed2850b0a99dd7bdb5e4a9a,2024-08-20T14:00:07.663000
CVE-2024-6407,0,0,12314028e09ddfd135bb748e0530e9ce4aee25dcaa6c2bae62524650d54b655f,2024-07-12T16:36:34.747000
CVE-2024-6408,0,0,560f6344922c296035b0717025e77a13b366c296a6767546b7234de1c853f80b,2024-08-01T14:00:21.483000
CVE-2024-6409,0,1,d03bed2522a44d8d30b0fbdef22fdffc2ceac2387d4eef8f2a106ccc58f0cb97,2024-08-22T13:15:05.147000
CVE-2024-6409,0,0,d03bed2522a44d8d30b0fbdef22fdffc2ceac2387d4eef8f2a106ccc58f0cb97,2024-08-22T13:15:05.147000
CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000
CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000
CVE-2024-6412,0,0,ac3e0b4dd9dc421ed7bc50bb0eaac729f5a46e72227bdeb5f2fc2db7ccb48399,2024-08-01T18:35:24.697000
@ -260067,8 +260076,8 @@ CVE-2024-6558,0,0,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a7
CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000
CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000
CVE-2024-6562,0,0,c488d352cd932104260f046b393896c928145bbead702bb6d934eaf0d4ce07f3,2024-08-12T13:41:36.517000
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
CVE-2024-6563,0,1,4bb6d856aecb1061fe7ddf667198467d6782b1525c7ac168b9de1fadd66e576f,2024-08-22T15:51:55.843000
CVE-2024-6564,0,1,f3f35528bc1f72a04108e7734af6c8785498b4db6bab388deb8ec67a1e375b50,2024-08-22T15:52:05.033000
CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000
CVE-2024-6566,0,0,d6506e8698f9fc48107baf6879b3d68aa0d41c6ff56f3284c695ecacd8e825b0,2024-07-29T14:12:08.783000
CVE-2024-6567,0,0,9de7307cc0759fd9897fd3f0912c6bf0e2680673968bc0cc458d792904193dbe,2024-08-02T12:59:43.990000
@ -260223,7 +260232,7 @@ CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc8
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000
CVE-2024-6800,0,0,905f179e2d4ab3f1a642369f80acd1cb09cf2cc4719cb8c0b853076a876bd4d3,2024-08-21T12:30:33.697000
CVE-2024-6800,0,1,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
CVE-2024-6802,0,0,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000
CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
@ -260248,7 +260257,7 @@ CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d
CVE-2024-6864,0,0,25a84b435d49ce11c1c73a942909d4d326ce5027935626546ef4f0b2e3fcaea1,2024-08-20T15:44:20.567000
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
CVE-2024-6870,0,1,f30a59ad4d3e5d7ab3aab5c1edbf3352165250c19b74a834d706a4e44e5c4817,2024-08-22T12:48:02.790000
CVE-2024-6870,0,0,f30a59ad4d3e5d7ab3aab5c1edbf3352165250c19b74a834d706a4e44e5c4817,2024-08-22T12:48:02.790000
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
@ -260584,7 +260593,7 @@ CVE-2024-7377,0,0,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f
CVE-2024-7378,0,0,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000
CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
CVE-2024-7384,0,1,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000
CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000
@ -260779,8 +260788,8 @@ CVE-2024-7702,0,0,e27f5381e9bb8a84bfa26aea9f03ffdd10a0850905e3e50b7398b3507d10ce
CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000
CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000
CVE-2024-7705,0,0,ba2446d549e3c4265501aacae0f49b053f84e0be1e1ff6443743a7ef69ec83bb,2024-08-13T12:58:25.437000
CVE-2024-7706,0,1,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000
CVE-2024-7707,0,1,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000
CVE-2024-7706,0,0,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000
CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000
CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000
CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
@ -260790,7 +260799,7 @@ CVE-2024-7724,0,0,2140d53b1531a123a76a6a3dc8b0dd231e5c8087b65471a97b5981e4adc896
CVE-2024-7725,0,0,d259c6d5729bf44a1338f2a16127fec02c9b65e8cb1e5bc73a0892db20205863,2024-08-21T17:24:59.627000
CVE-2024-7728,0,0,c0ed30007f00488b5c62db3cfd8f859193059df346d1ebce1c04c936068d2a21,2024-08-14T13:00:37.107000
CVE-2024-7729,0,0,b303d5d4be15b474d481a2bd874b63765444e7a77fd0332a4aa454ee055ae189,2024-08-14T13:00:37.107000
CVE-2024-7731,0,0,4a861aabf412f4b5069dda19ca66661f2d33b6edc7ffa683ebdfa08ec3de8567,2024-08-14T13:00:37.107000
CVE-2024-7731,0,1,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000
CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d22,2024-08-14T13:00:37.107000
CVE-2024-7733,0,0,bb60f9c1721a7d7267312f0897dbc581707f825a01d4c52185c190045c2c2268,2024-08-14T02:07:05.410000
CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000
@ -260799,7 +260808,7 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
CVE-2024-7746,0,0,57c293bd84bcc81db971f993e54710083e23fbaa2d9a714afae737b9c1e2cedc,2024-08-13T17:11:53.553000
CVE-2024-7746,0,1,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
CVE-2024-7750,0,0,ae9806ea563d7ef9ab418b33b0dd9169de6692e64ddca227f95ec3ceb4e78bc1,2024-08-19T17:48:40.913000
@ -260810,7 +260819,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
CVE-2024-7775,0,0,e3301a5d8f77ad443eb31f53865c4d76f2f8fe202d331dbc3155c9382724cc8e,2024-08-20T15:44:20.567000
CVE-2024-7777,0,0,71bd18c058a843cc648eaac1d1574a0ec472525bb01fac803805d8a41dba271b,2024-08-20T15:44:20.567000
CVE-2024-7778,0,1,d7760055142d57d64e6b8ded706286da456067aa22ab7711d3accd82c1875020,2024-08-22T12:48:02.790000
CVE-2024-7778,0,0,d7760055142d57d64e6b8ded706286da456067aa22ab7711d3accd82c1875020,2024-08-22T12:48:02.790000
CVE-2024-7780,0,0,d93ffb279aea8f39f6fd963d66033ac1d11eb19c0e769bfec592ca965c19db92,2024-08-20T15:44:20.567000
CVE-2024-7782,0,0,8f8c7ec0917c77b4eac4d0691ad6fd872581e8976dc54163f3db95fe52f021ae,2024-08-20T15:44:20.567000
CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000
@ -260837,7 +260846,7 @@ CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f
CVE-2024-7831,0,0,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000
CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000
CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000
CVE-2024-7836,0,1,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000
CVE-2024-7836,0,0,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000
@ -260845,7 +260854,7 @@ CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f954176
CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b0256f,2024-08-19T13:00:23.117000
CVE-2024-7848,0,1,31570509da53a47c219b7f7137684c2eb7fe32ac785f0a0f3abce302cddf7c35,2024-08-22T12:48:02.790000
CVE-2024-7848,0,0,31570509da53a47c219b7f7137684c2eb7fe32ac785f0a0f3abce302cddf7c35,2024-08-22T12:48:02.790000
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000
@ -260905,31 +260914,31 @@ CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
CVE-2024-7964,0,1,8822f6b0f0610850bdf35210ea8c688feaf1f86028ec6dbf869e1fa875ccb60c,2024-08-22T12:48:02.790000
CVE-2024-7965,0,1,d0c0273875073cc0c6fec509196298f43b177986c40336f2637705c644f6cc8b,2024-08-22T12:48:02.790000
CVE-2024-7966,0,1,bfc4dcef3c5ead5653786d3a4b93da692b661a8241304cdd64aab76d453ac1d2,2024-08-22T12:48:02.790000
CVE-2024-7967,0,1,294e06380d5fc96610b127cbe1ba42c5ee199172a86cd4f0671ce2810e954aed,2024-08-22T12:48:02.790000
CVE-2024-7968,0,1,0ebd8028130b08086583f2e4531b9cd31f970806eb24b143727e1e6e521961f5,2024-08-22T12:48:02.790000
CVE-2024-7969,0,1,aa07c52d9525fdaa1180f7ff2dbd0076c66d561ef11dc8515b79089ee13f0362,2024-08-22T12:48:02.790000
CVE-2024-7971,0,1,2e343147e9fc9924d1239f1cbe04e91a7db99e6690424e63396ec3de7989a805,2024-08-22T12:48:02.790000
CVE-2024-7972,0,1,a809bd7827790b4f8cf43f3d303cd62d3bff7ba72355c06f4379608a1fbd4349,2024-08-22T12:48:02.790000
CVE-2024-7973,0,1,20a121889ac72f8203068027a4420d046332082287e407ad6ccee31f161109ed,2024-08-22T12:48:02.790000
CVE-2024-7974,0,1,c6bac75b54c27669e52a449b9a88647f34bd6ebea8da4faee12acd929ef504f5,2024-08-22T12:48:02.790000
CVE-2024-7975,0,1,52128ff84c744d1b190f65e7e327a1f36e2267fddcf188901cfc28d850ae5349,2024-08-22T12:48:02.790000
CVE-2024-7976,0,1,f4323ba6e769363619b25624a388acbb9ef8dd02a9844111618d9bccec1ec677,2024-08-22T12:48:02.790000
CVE-2024-7977,0,1,cb03e76d70d875478cbce54a8fac8cf14535f3d8b92869a3662e5af0a00fa301,2024-08-22T12:48:02.790000
CVE-2024-7978,0,1,fac0e6ae590e44513f6f54583d29dc6e4263f99b9f6fb091ee007b07e379e63d,2024-08-22T12:48:02.790000
CVE-2024-7979,0,1,62a68586269e5fa21b76d417f797452d67a75b3315df3d49524589c8cef7c40f,2024-08-22T12:48:02.790000
CVE-2024-7980,0,1,ccee37d7e5dba26ef25946dd35c049fa24b47615e5dd4aa71009ab6bb548075c,2024-08-22T12:48:02.790000
CVE-2024-7981,0,1,09a1fc9846d85ff0684e8acda10679cdc6d747c523e3f84989fb6a6f8203bb91,2024-08-22T12:48:02.790000
CVE-2024-7964,0,0,8822f6b0f0610850bdf35210ea8c688feaf1f86028ec6dbf869e1fa875ccb60c,2024-08-22T12:48:02.790000
CVE-2024-7965,0,1,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000
CVE-2024-7966,0,0,bfc4dcef3c5ead5653786d3a4b93da692b661a8241304cdd64aab76d453ac1d2,2024-08-22T12:48:02.790000
CVE-2024-7967,0,1,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
CVE-2024-7968,0,0,0ebd8028130b08086583f2e4531b9cd31f970806eb24b143727e1e6e521961f5,2024-08-22T12:48:02.790000
CVE-2024-7969,0,0,aa07c52d9525fdaa1180f7ff2dbd0076c66d561ef11dc8515b79089ee13f0362,2024-08-22T12:48:02.790000
CVE-2024-7971,0,1,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
CVE-2024-7972,0,1,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
CVE-2024-7973,0,1,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
CVE-2024-7974,0,0,c6bac75b54c27669e52a449b9a88647f34bd6ebea8da4faee12acd929ef504f5,2024-08-22T12:48:02.790000
CVE-2024-7975,0,0,52128ff84c744d1b190f65e7e327a1f36e2267fddcf188901cfc28d850ae5349,2024-08-22T12:48:02.790000
CVE-2024-7976,0,0,f4323ba6e769363619b25624a388acbb9ef8dd02a9844111618d9bccec1ec677,2024-08-22T12:48:02.790000
CVE-2024-7977,0,0,cb03e76d70d875478cbce54a8fac8cf14535f3d8b92869a3662e5af0a00fa301,2024-08-22T12:48:02.790000
CVE-2024-7978,0,0,fac0e6ae590e44513f6f54583d29dc6e4263f99b9f6fb091ee007b07e379e63d,2024-08-22T12:48:02.790000
CVE-2024-7979,0,1,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
CVE-2024-7980,0,1,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
CVE-2024-7981,0,0,09a1fc9846d85ff0684e8acda10679cdc6d747c523e3f84989fb6a6f8203bb91,2024-08-22T12:48:02.790000
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
CVE-2024-8033,0,1,3f316f7e9198aca7c5aa2e36e772dc32f2f22bce30d787bfae16b53392d884ef,2024-08-22T12:48:02.790000
CVE-2024-8034,0,1,eaa926608d388e32154f035cf3b7a3d924c2e30d7f24b96fbcf3a9d5002cba03,2024-08-22T12:48:02.790000
CVE-2024-8035,0,1,3aa95c98d3128ccdb489242c18c77df884328f4a8925b81f2020dee2c13aaf80,2024-08-22T12:48:02.790000
CVE-2024-8071,0,1,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
CVE-2024-8072,0,1,dea70fe205a37f055aa5b98ea5450d522ccba6e4b509676caab88178aa124d29,2024-08-22T12:48:02.790000
CVE-2024-8033,0,0,3f316f7e9198aca7c5aa2e36e772dc32f2f22bce30d787bfae16b53392d884ef,2024-08-22T12:48:02.790000
CVE-2024-8034,0,0,eaa926608d388e32154f035cf3b7a3d924c2e30d7f24b96fbcf3a9d5002cba03,2024-08-22T12:48:02.790000
CVE-2024-8035,0,0,3aa95c98d3128ccdb489242c18c77df884328f4a8925b81f2020dee2c13aaf80,2024-08-22T12:48:02.790000
CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
CVE-2024-8072,0,1,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000

Can't render this file because it is too large.