From a2cb96d5843fb366376e8b11f2cfd52af8d274b0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 22 Aug 2024 16:03:14 +0000 Subject: [PATCH] Auto-Update: 2024-08-22T16:00:17.779913+00:00 --- CVE-2003/CVE-2003-00xx/CVE-2003-0063.json | 34 +- CVE-2014/CVE-2014-95xx/CVE-2014-9515.json | 24 +- CVE-2021/CVE-2021-311xx/CVE-2021-31196.json | 4 +- CVE-2022/CVE-2022-274xx/CVE-2022-27486.json | 70 +++- CVE-2022/CVE-2022-275xx/CVE-2022-27540.json | 39 +- CVE-2022/CVE-2022-302xx/CVE-2022-30288.json | 22 +- CVE-2022/CVE-2022-458xx/CVE-2022-45862.json | 69 +++- CVE-2023/CVE-2023-240xx/CVE-2023-24068.json | 22 +- CVE-2023/CVE-2023-262xx/CVE-2023-26211.json | 53 ++- CVE-2023/CVE-2023-401xx/CVE-2023-40110.json | 27 +- CVE-2023/CVE-2023-429xx/CVE-2023-42945.json | 39 +- CVE-2023/CVE-2023-472xx/CVE-2023-47234.json | 22 +- CVE-2023/CVE-2023-523xx/CVE-2023-52376.json | 39 +- CVE-2023/CVE-2023-55xx/CVE-2023-5517.json | 14 +- CVE-2024/CVE-2024-00xx/CVE-2024-0038.json | 39 +- CVE-2024/CVE-2024-217xx/CVE-2024-21757.json | 93 ++++- CVE-2024/CVE-2024-222xx/CVE-2024-22243.json | 14 +- CVE-2024/CVE-2024-234xx/CVE-2024-23466.json | 49 ++- CVE-2024/CVE-2024-234xx/CVE-2024-23472.json | 50 ++- CVE-2024/CVE-2024-247xx/CVE-2024-24746.json | 37 +- CVE-2024/CVE-2024-256xx/CVE-2024-25639.json | 67 +++- CVE-2024/CVE-2024-289xx/CVE-2024-28992.json | 62 +++- CVE-2024/CVE-2024-289xx/CVE-2024-28993.json | 50 ++- CVE-2024/CVE-2024-304xx/CVE-2024-30418.json | 43 ++- CVE-2024/CVE-2024-30xx/CVE-2024-3016.json | 27 +- CVE-2024/CVE-2024-342xx/CVE-2024-34226.json | 39 +- CVE-2024/CVE-2024-353xx/CVE-2024-35386.json | 27 +- CVE-2024/CVE-2024-364xx/CVE-2024-36439.json | 25 ++ CVE-2024/CVE-2024-364xx/CVE-2024-36440.json | 25 ++ CVE-2024/CVE-2024-364xx/CVE-2024-36442.json | 25 ++ CVE-2024/CVE-2024-364xx/CVE-2024-36443.json | 25 ++ CVE-2024/CVE-2024-364xx/CVE-2024-36444.json | 25 ++ CVE-2024/CVE-2024-364xx/CVE-2024-36445.json | 25 ++ CVE-2024/CVE-2024-365xx/CVE-2024-36505.json | 81 +++- CVE-2024/CVE-2024-367xx/CVE-2024-36775.json | 34 +- CVE-2024/CVE-2024-38xx/CVE-2024-3858.json | 39 +- CVE-2024/CVE-2024-393xx/CVE-2024-39308.json | 91 ++++- CVE-2024/CVE-2024-410xx/CVE-2024-41054.json | 82 ++++- CVE-2024/CVE-2024-410xx/CVE-2024-41055.json | 118 +++++- CVE-2024/CVE-2024-410xx/CVE-2024-41070.json | 129 ++++++- CVE-2024/CVE-2024-410xx/CVE-2024-41073.json | 105 +++++- CVE-2024/CVE-2024-423xx/CVE-2024-42314.json | 82 ++++- CVE-2024/CVE-2024-423xx/CVE-2024-42315.json | 82 ++++- CVE-2024/CVE-2024-423xx/CVE-2024-42316.json | 94 ++++- CVE-2024/CVE-2024-425xx/CVE-2024-42552.json | 43 ++- CVE-2024/CVE-2024-425xx/CVE-2024-42573.json | 14 +- CVE-2024/CVE-2024-427xx/CVE-2024-42779.json | 39 +- CVE-2024/CVE-2024-427xx/CVE-2024-42781.json | 39 +- CVE-2024/CVE-2024-427xx/CVE-2024-42782.json | 41 ++- CVE-2024/CVE-2024-427xx/CVE-2024-42784.json | 39 +- CVE-2024/CVE-2024-427xx/CVE-2024-42785.json | 41 ++- CVE-2024/CVE-2024-433xx/CVE-2024-43398.json | 60 +++ CVE-2024/CVE-2024-437xx/CVE-2024-43785.json | 56 +++ CVE-2024/CVE-2024-437xx/CVE-2024-43787.json | 64 ++++ CVE-2024/CVE-2024-438xx/CVE-2024-43828.json | 118 +++++- CVE-2024/CVE-2024-438xx/CVE-2024-43833.json | 94 ++++- CVE-2024/CVE-2024-438xx/CVE-2024-43836.json | 70 +++- CVE-2024/CVE-2024-438xx/CVE-2024-43837.json | 94 ++++- CVE-2024/CVE-2024-451xx/CVE-2024-45163.json | 39 +- CVE-2024/CVE-2024-451xx/CVE-2024-45166.json | 39 +- CVE-2024/CVE-2024-451xx/CVE-2024-45168.json | 39 +- CVE-2024/CVE-2024-451xx/CVE-2024-45169.json | 43 ++- CVE-2024/CVE-2024-49xx/CVE-2024-4944.json | 69 +++- CVE-2024/CVE-2024-59xx/CVE-2024-5974.json | 327 ++++++++++++++++- CVE-2024/CVE-2024-65xx/CVE-2024-6563.json | 6 +- CVE-2024/CVE-2024-65xx/CVE-2024-6564.json | 6 +- CVE-2024/CVE-2024-68xx/CVE-2024-6800.json | 4 +- CVE-2024/CVE-2024-77xx/CVE-2024-7731.json | 42 ++- CVE-2024/CVE-2024-77xx/CVE-2024-7746.json | 60 ++- CVE-2024/CVE-2024-79xx/CVE-2024-7965.json | 39 +- CVE-2024/CVE-2024-79xx/CVE-2024-7967.json | 37 +- CVE-2024/CVE-2024-79xx/CVE-2024-7971.json | 37 +- CVE-2024/CVE-2024-79xx/CVE-2024-7972.json | 39 +- CVE-2024/CVE-2024-79xx/CVE-2024-7973.json | 37 +- CVE-2024/CVE-2024-79xx/CVE-2024-7979.json | 39 +- CVE-2024/CVE-2024-79xx/CVE-2024-7980.json | 39 +- CVE-2024/CVE-2024-80xx/CVE-2024-8072.json | 14 +- README.md | 70 ++-- _state.csv | 385 ++++++++++---------- 79 files changed, 3947 insertions(+), 437 deletions(-) create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36439.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36440.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36442.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36443.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36444.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36445.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43398.json create mode 100644 CVE-2024/CVE-2024-437xx/CVE-2024-43785.json create mode 100644 CVE-2024/CVE-2024-437xx/CVE-2024-43787.json diff --git a/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json b/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json index 03515007def..8e42a8bec74 100644 --- a/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json +++ b/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0063", "sourceIdentifier": "cve@mitre.org", "published": "2003-03-03T05:00:00.000", - "lastModified": "2024-06-15T10:15:10.083", + "lastModified": "2024-08-22T15:35:00.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-150" + } + ] } ], "configurations": [ diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json index 72174463499..d5663abc6fa 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9515", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-29T22:29:00.520", - "lastModified": "2024-07-19T14:15:02.500", + "lastModified": "2024-08-22T15:35:01.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json index de0d3de3ce5..be2eb9f143b 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json @@ -2,8 +2,8 @@ "id": "CVE-2021-31196", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-14T18:15:09.463", - "lastModified": "2024-08-22T01:00:01.277", - "vulnStatus": "Modified", + "lastModified": "2024-08-22T14:13:46.367", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-08-21", "cisaActionDue": "2024-09-11", diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27486.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27486.json index f2cb77830d9..7bee5ffb02d 100644 --- a/CVE-2022/CVE-2022-274xx/CVE-2022-27486.json +++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27486.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27486", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-08-13T16:15:07.693", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:29:44.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiddos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "5.6.2", + "matchCriteriaId": "31921E5A-497A-4BD6-9BE8-2307272F3FEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiddos:5.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "258903F9-C0F0-40CD-8895-43FF00C71709" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*", + "matchCriteriaId": "561DFFB8-E39C-40D1-A7E7-255BDD6F9F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.4.2", + "matchCriteriaId": "777DD368-CD36-4842-BA0F-C7C64E7D2A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB1731B-7799-408B-8F8C-F5ABFEA7A180" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-047", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27540.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27540.json index 74cde1619b0..433be378e4e 100644 --- a/CVE-2022/CVE-2022-275xx/CVE-2022-27540.json +++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27540.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27540", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-06-28T19:15:03.407", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-08-22T15:35:02.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha identificado una posible vulnerabilidad de tiempo de verificaci\u00f3n a tiempo de uso (TOCTOU) en el BIOS de HP para ciertos productos de PC HP, que podr\u00eda permitir la ejecuci\u00f3n de c\u00f3digo arbitrario, denegaci\u00f3n de servicio y divulgaci\u00f3n de informaci\u00f3n. HP est\u00e1 lanzando actualizaciones de BIOS para mitigar la vulnerabilidad potencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_10810714-10810745-16/hpsbhf03948", diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30288.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30288.json index 4a8b94c8c09..973376127d3 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30288.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30288.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30288", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-04T23:15:08.500", - "lastModified": "2024-08-03T07:15:50.983", + "lastModified": "2024-08-22T15:35:03.537", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45862.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45862.json index eaf252fe657..8e456a574d5 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45862.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45862.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45862", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-08-13T16:15:07.977", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:32:16.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.4.0", + "matchCriteriaId": "C73A0CBF-65BB-4C0A-9A4C-ABE88AF340DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "F1C48730-14E4-4B4A-AD08-BA23903D961E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndExcluding": "7.2.6", + "matchCriteriaId": "C84C7A2F-EE15-4CAA-BC3F-A7FDD8A4574F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.4.0", + "matchCriteriaId": "1F1595B0-CE4A-4B4E-9F5E-A411A012086F" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-445", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24068.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24068.json index 321a5d758a3..3e867335da0 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24068.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24068.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24068", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-23T07:15:10.967", - "lastModified": "2024-08-02T11:16:10.173", + "lastModified": "2024-08-22T15:35:03.853", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26211.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26211.json index e73289e6552..d1fd7d96c7f 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26211.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26211.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26211", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-08-13T16:15:08.220", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:33:54.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndExcluding": "7.3.3", + "matchCriteriaId": "3ECE9A3F-7C5F-4A34-ABB2-CD4E1997CE0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisoar:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C3F0E60-3285-43B0-83CD-98A0D5445114" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-088", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40110.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40110.json index b14329ff6fe..11a689ca75c 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40110.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40110.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40110", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.420", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-08-22T14:35:01.077", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En m\u00faltiples funciones de MtpPacket.cpp, existe una posible escritura fuera de los l\u00edmites debido a un MtpPacket.cpp. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/53243faf690a49e00952b3d3956d2fff0b8d4a3c", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json index 1b8412de4b2..ce206f19e3c 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42945", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:51.140", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-22T14:35:01.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Una aplicaci\u00f3n puede obtener acceso no autorizado a Bluetooth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213984", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47234.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47234.json index ca3138a7b4d..4438f5994da 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47234.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47234.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47234", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T21:15:17.420", - "lastModified": "2024-04-28T07:15:08.703", + "lastModified": "2024-08-22T15:35:04.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json index 72968da78d4..09d53d863c9 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52376.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52376", "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T06:15:08.290", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-08-22T14:35:03.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de gesti\u00f3n de informaci\u00f3n en el m\u00f3dulo Galer\u00eda. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-225" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/", diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json index 4d185d303b2..17d1e7b2a19 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5517", "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:45.510", - "lastModified": "2024-05-03T13:15:20.990", + "lastModified": "2024-08-22T14:35:04.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json index ac4a5f5cef5..a05ff5bf902 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0038", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:51.157", - "lastModified": "2024-02-16T13:37:51.433", + "lastModified": "2024-08-22T14:35:04.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En injectInputEventToInputFilter de AccessibilityManagerService.java, existe una posible inyecci\u00f3n de evento de entrada arbitraria debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/3e88d987235f5a2acd50a9b6bad78dbbf39cb079", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21757.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21757.json index b759fc7dba4..ed83f7a86dc 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21757.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21757.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21757", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-08-13T16:15:08.637", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:34:54.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +81,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.11", + "matchCriteriaId": "D5275A3C-5468-424E-B3BB-897221D2B8D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "6F3D28A9-5CFD-4838-9630-D6E09FB63CE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.2", + "matchCriteriaId": "CB15106A-8295-4A9E-B5C8-FA9654636B15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.11", + "matchCriteriaId": "5B1EF673-5967-401E-98E3-B7A2B1BEF037" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "4763E504-6974-42C5-B912-3E62A9CC312A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.2", + "matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-467", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22243.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22243.json index 56281f7994f..30b79982459 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22243.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22243.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22243", "sourceIdentifier": "security@vmware.com", "published": "2024-02-23T05:15:08.143", - "lastModified": "2024-06-10T18:15:25.757", + "lastModified": "2024-08-22T15:35:05.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240524-0001/", diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23466.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23466.json index 3d7f94c659b..df1a276d223 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23466.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23466", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-07-17T15:15:11.270", - "lastModified": "2024-07-18T12:28:43.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T15:23:31.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023.2.4", + "matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23472.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23472.json index e60b82035a6..03d2779346e 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23472.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23472.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23472", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-07-17T15:15:12.627", - "lastModified": "2024-07-18T12:28:43.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T15:59:11.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023.2.4", + "matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24746.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24746.json index c41232cd81c..4071aa05111 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24746.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24746.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24746", "sourceIdentifier": "security@apache.org", "published": "2024-04-06T12:15:08.310", - "lastModified": "2024-05-01T18:15:14.767", + "lastModified": "2024-08-22T14:35:07.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Bucle con vulnerabilidad de condici\u00f3n de salida inalcanzable (\"bucle infinito\") en Apache NimBLE. La operaci\u00f3n GATT especialmente manipulada puede causar un bucle infinito en el servidor GATT que lleva a la denegaci\u00f3n de servicio en la pila o dispositivo Bluetooth. Este problema afecta a Apache NimBLE: hasta 1.6.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.7.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json index 39a2688d261..96295c76016 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25639", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T15:15:21.423", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:59:56.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,20 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +85,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "2678B39E-00C3-4B4E-9857-FD3F90D30A7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/khoj-ai/khoj/commit/1dfd6d7391862d3564db7f4875216880b73cb6cc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/khoj-ai/khoj/security/advisories/GHSA-h2q2-vch3-72qm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28992.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28992.json index dd4de473d1d..5d7bc4e2dfa 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28992.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28992.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28992", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-07-17T15:15:13.623", - "lastModified": "2024-07-18T12:28:43.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T15:56:58.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023.2.4", + "matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json index f19084b453e..24df04f3dd1 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28993", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-07-17T15:15:13.860", - "lastModified": "2024-07-18T12:28:43.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T15:54:56.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3", + "matchCriteriaId": "291497A0-F464-40AD-8060-A985A2F8D2D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json index d31e97efb0d..991e0018ff9 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30418", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-07T09:15:08.810", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-22T15:35:05.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Vulnerabilidad de verificaci\u00f3n de permisos insuficiente en el m\u00f3dulo de gesti\u00f3n de aplicaciones. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3016.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3016.json index 77d9555acf4..be78fa0f4b8 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3016.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3016.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3016", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2024-05-14T15:39:46.243", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-08-22T15:35:08.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "NEC Platforms DT900 and DT900S Series 5.0.0.0 \u2013 v5.3.4.4, v5.4.0.0 \u2013 v5.6.0.20 permiten a un atacante acceder a una configuraci\u00f3n del sistema no documentada para cambiar la configuraci\u00f3n a trav\u00e9s de la red local con un usuario no autenticado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "psirt-info@cyber.jp.nec.com", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34226.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34226.json index e65972b2454..5008397a0b8 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34226.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34226.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34226", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.963", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-08-22T15:35:06.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en /php-sqlite-vms/?page=manage_visitor&id=1 en SourceCodester Visitor Management System 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s de los par\u00e1metros id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34226", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35386.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35386.json index dd8e33fe298..6579bab7470 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35386.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35386", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T14:15:12.400", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-08-22T15:35:07.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Un problema en Cesanta mjs 2.20.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n mjs_do_gc en el archivo mjs.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/cesanta/mjs/issues/286", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json new file mode 100644 index 00000000000..10532e9ca8b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36439.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36439", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T15:15:15.883", + "lastModified": "2024-08-22T15:15:15.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain access to the administrative web interface via the device password's hash value, without knowing the actual device password." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-038.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json new file mode 100644 index 00000000000..cbc05c9ae3a --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36440.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36440", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T15:15:15.977", + "lastModified": "2024-08-22T15:15:15.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-037.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json new file mode 100644 index 00000000000..116b2f87d3f --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36442.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36442", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T15:15:16.047", + "lastModified": "2024-08-22T15:15:16.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "cgi-bin/fdmcgiwebv2.cgi on Swissphone DiCal-RED 4009 devices allows an authenticated attacker to gain access to arbitrary files on the device's file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-039.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json new file mode 100644 index 00000000000..64ccdcef09b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36443.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36443", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T14:15:08.443", + "lastModified": "2024-08-22T14:15:08.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-036.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json new file mode 100644 index 00000000000..a4453959b55 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36444.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36444", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T15:15:16.117", + "lastModified": "2024-08-22T15:15:16.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "cgi-bin/fdmcgiwebv2.cgi on Swissphone DiCal-RED 4009 devices allows an unauthenticated attacker to gain access to device logs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-040.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json new file mode 100644 index 00000000000..472c0b809ed --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36445.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36445", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-22T15:15:16.187", + "lastModified": "2024-08-22T15:15:16.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-035.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36505.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36505.json index 505cc301504..65245bf602d 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36505.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36505.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36505", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-08-13T16:15:08.970", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:36:31.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@fortinet.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "psirt@fortinet.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.13", + "versionEndIncluding": "6.4.15", + "matchCriteriaId": "B26D3CC8-B77D-4C5C-B3AC-096679F47877" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.12", + "versionEndExcluding": "7.0.15", + "matchCriteriaId": "F754A050-02F5-4848-9065-5E15117B227E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.5", + "versionEndExcluding": "7.2.8", + "matchCriteriaId": "14113139-B64B-4069-A88F-D1999ED7EC18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.4", + "matchCriteriaId": "1FDDB5F3-D229-4208-9110-8860A03C8B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-012", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36775.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36775.json index 2764d2a23c1..ec68b60faf8 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36775.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36775", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.753", - "lastModified": "2024-07-16T14:20:42.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-22T15:35:07.603", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3858.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3858.json index 1ad62f00949..2fcc724d96c 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3858.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3858.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3858", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.613", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-08-22T15:35:08.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Era posible mutar un objeto JavaScript para que el JIT pudiera fallar mientras lo rastreaba. Esta vulnerabilidad afecta a Firefox < 125." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888892", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json index 66546f83601..fe6a97ea279 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39308", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T15:15:22.080", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:22:34.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security-advisories@github.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,30 +83,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rails_admin_project:rails_admin:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "5835771A-4E7F-409A-939E-8442D2E9A5CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rails_admin_project:rails_admin:*:*:*:*:*:ruby:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.3", + "matchCriteriaId": "516887D9-E69F-452C-B73F-7812CC6B4731" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/railsadminteam/rails_admin/commit/b5a287d82e2cbd1737a1a01e11ede2911cce7fef", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/railsadminteam/rails_admin/commit/d84b39884059c4ed50197cec8522cca029a17673", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/railsadminteam/rails_admin/issues/3686", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/railsadminteam/rails_admin/security/advisories/GHSA-8qgm-g2vv-vwvc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://rubygems.org/gems/rails_admin/versions/2.3.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://rubygems.org/gems/rails_admin/versions/3.1.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json index 8d978c06159..35c094a46b6 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41054", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:13.557", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T14:11:42.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: ufs: core: solucione el problema de ejecuci\u00f3n de ufshcd_clear_cmd Cuando ufshcd_clear_cmd corre con el ISR de finalizaci\u00f3n, el ISR establecer\u00e1 la etiqueta completada del puntero mq_hctx de la solicitud en NULL. Y la llamada de ufshcd_clear_cmd a ufshcd_mcq_req_to_hwq obtendr\u00e1 un puntero NULL KE. Devuelve el \u00e9xito cuando ISR completa la solicitud porque sq no necesita limpieza. El flujo de ejecuci\u00f3n es: Hilo A ufshcd_err_handler paso 1 ufshcd_try_to_abort_task ufshcd_cmd_inflight(true) paso 3 ufshcd_clear_cmd ... ufshcd_mcq_req_to_hwq blk_mq_unique_tag rq->mq_hctx->queue_num paso 5 Hilo ufs_mtk_mcq_int r(cq completar ISR) paso 2 scsi_done ... __blk_mq_free_request rq-> mq_hctx = NULO; paso 4 A continuaci\u00f3n se muestra el rastreo de KE: ufshcd_try_to_abort_task: cmd pendiente en el dispositivo. etiqueta = 6 No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000194 pc: [0xffffffd589679bf8] blk_mq_unique_tag+0x8/0x14 lr: [0xffffffd5862f95b4] ufshcd_mcq_sq_cleanup+0x6c/0x1cc _mod_ise] Cola de trabajo: ufs_eh_wq_0 ufshcd_err_handler [ufs_mediatek_mod_ise] Seguimiento de llamadas: dump_backtrace+0xf8 /0x148 show_stack+0x18/0x24 dump_stack_lvl+0x60/0x7c dump_stack+0x18/0x3c mrdump_common_die+0x24c/0x398 [mrdump] ipanic_die+0x20/0x34 [mrdump] notify_die+0x80/0xd8 die+0x94/0x2b8 __do_kernel_fault+0x264/0x298 do_page_fault+ 0xa4/0x4b8 do_translation_fault+0x38/0x54 do_mem_abort+0x58/0x118 el1_abort+0x3c/0x5c el1h_64_sync_handler+0x54/0x90 el1h_64_sync+0x68/0x6c blk_mq_unique_tag+0x8/0x14 clear_cmd+0x34/0x118 [ufs_mediatek_mod_ise] ufshcd_try_to_abort_task+0x2c8/0x5b4 [ufs_mediatek_mod_ise] ufshcd_err_handler +0xa7c/0xfa8 [ufs_mediatek_mod_ise] process_one_work+0x208/0x4fc trabajador_hilo+0x228/0x438 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.41", + "matchCriteriaId": "F8F0E46F-AE23-4E3C-94C2-982292314C2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.10", + "matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11d81233f4ebe6907b12c79ad7d8787aa4db0633", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9307a998cb9846a2557fdca286997430bee36a2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bed0896008334eeee4b4bfd7150491ca098cbf72", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json index ecea711b693..7fb504a4e88 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41055", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:13.620", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:11:00.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evita la eliminaci\u00f3n de la referencia NULL ptr en pfn_section_valid() La confirmaci\u00f3n 5ec8e8ea8b77 (\"mm/sparsemem: corrige la ejecuci\u00f3n al acceder a la secci\u00f3n_memoria->uso\") cambi\u00f3 pfn_section_valid() para agregar un READ_ONCE() llame a \"ms->usage\" para arreglar una ejecuci\u00f3n con section_deactivate() donde se puede borrar ms->usage. La llamada READ_ONCE(), por s\u00ed sola, no es suficiente para evitar la desreferencia al puntero NULL. Necesitamos comprobar su valor antes de desreferenciarlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.219", + "versionEndExcluding": "5.10.222", + "matchCriteriaId": "138634FF-1840-4C45-8CDE-6174B6F50352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.149", + "versionEndExcluding": "5.15.163", + "matchCriteriaId": "0720413E-F29A-4C0A-9B57-5158A778C4A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.76", + "versionEndExcluding": "6.1.100", + "matchCriteriaId": "6BFB68AD-DB7E-4C4C-B598-274D83D12C4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.15", + "versionEndExcluding": "6.6.41", + "matchCriteriaId": "9D8E9231-015C-48A6-BBDD-9DCEA3145858" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.9.10", + "matchCriteriaId": "6FAC1A24-181A-4DB7-801D-4BDF1B4E4116" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json index 8b1f47f4f96..406ac32f5bc 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41070", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:14.787", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:05:32.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: PPC: Book3S HV: Prevenir UAF en kvm_spapr_tce_attach_iommu_group() Al inform\u00f3 un posible use after free (UAF) en kvm_spapr_tce_attach_iommu_group(). Busca `stt` en tablefd, pero luego contin\u00faa us\u00e1ndolo despu\u00e9s de realizar fdput() en el fd devuelto. Despu\u00e9s de fdput(), otro hilo puede cerrar el tablefd. El cierre llama a kvm_spapr_tce_release() y luego a release_spapr_tce_table() (a trav\u00e9s de call_rcu()) que libera `stt`. Aunque hay llamadas a rcu_read_lock() en kvm_spapr_tce_attach_iommu_group(), no son suficientes para evitar la UAF, porque `stt` se usa fuera de las regiones bloqueadas. Con un retraso artificial despu\u00e9s de fdput() y un programa de espacio de usuario que desencadena la ejecuci\u00f3n, KASAN detecta la UAF: ERROR: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm] Lectura de tama\u00f1o 4 en direcci\u00f3n c000200027552c30 por tarea kvm-vfio/2505 CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1 Nombre de hardware: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35 -g1851b2a06 Seguimiento de llamadas de PowerNV: dump_stack_lvl+0xb4/0x108 (no confiable) print_report+0x2b4/0x6ec kasan_report+0x118/0x2b0 __asan_load4+0xb8/0xd0 kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm] kvm_vfio_set_attr+0x524/0xac0 [kvm] kvm_device_ioctl+0x144/0x240 [kvm] sys_ioctl+0x62c/0x1810 system_call_exception+0x190/0x440 system_call_vectored_common+0x15c/0x2ec ... Liberado por la tarea 0: ... kfree+0xec/0x3e0 release_spapr_tce_table+0xd4/0x11c [rcu_core+0x568/0 x16a0 handle_softirqs+0x23c /0x920 do_softirq_own_stack+0x6c/0x90 do_softirq_own_stack+0x58/0x90 __irq_exit_rcu+0x218/0x2d0 irq_exit+0x30/0x80 arch_local_irq_restore+0x128/0x230 arch_local_irq_enable+0x1c/0x 30 cpuidle_enter_state+0x134/0x5cc cpuidle_enter+0x6c/0xb0 call_cpuidle+0x7c/0x100 do_idle+0x394 /0x410 cpu_startup_entry+0x60/0x70 start_secondary+0x3fc/0x410 start_secondary_prolog+0x10/0x14 Solucionarlo retrasando fdput() hasta que `stt` ya no est\u00e9 en uso, que es efectivamente toda la funci\u00f3n. Para mantener el parche m\u00ednimo, agregue una llamada a fdput() en cada una de las rutas de retorno existentes. El trabajo futuro puede convertir la funci\u00f3n a limpieza de estilo goto o __cleanup. Con la soluci\u00f3n implementada, el caso de prueba ya no activa la UAF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.281", + "matchCriteriaId": "BCD1D392-BEF8-4D8D-B191-C64E1875241F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.223", + "matchCriteriaId": "12CD4E48-26A1-40B4-AF6A-1CC066193F4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.164", + "matchCriteriaId": "3D6B1E23-6E6C-4761-ACD4-EA687A95F56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.101", + "matchCriteriaId": "2B46438B-72B8-4053-8554-94AED3EB13EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.42", + "matchCriteriaId": "972274A2-D688-4C37-BE42-689B58B4C225" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.11", + "matchCriteriaId": "01E300B3-8B39-4A2D-8B03-4631433D3915" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4cdf6926f443c84f680213c7aafbe6f91a5fcbc0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f856023971f97fff74cfaf21b48ec320147b50a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82c7a4cf14aa866f8f7f09e662b02eddc49ee0bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9975f93c760a32453d7639cf6fcf3f73b4e71ffe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a986fa57fd81a1430e00b3c6cf8a325d6f894a63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b26c8c85463ef27a522d24fcd05651f0bb039e47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be847bb20c809de8ac124431b556f244400b0491", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json index 57f1eb4577a..4f1d1556ae5 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41073", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:15.020", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T14:11:28.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme: evitar payload de double free especial Si es necesario volver a intentar una solicitud de descarte y ese reintento puede fallar antes de agregar un nuevo payload especial, se producir\u00e1 un double free. Borre RQF_SPECIAL_LOAD cuando se limpie la solicitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.164", + "matchCriteriaId": "1FF9AD93-F189-4A07-8D09-3DD62D5077A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.101", + "matchCriteriaId": "2B46438B-72B8-4053-8554-94AED3EB13EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.42", + "matchCriteriaId": "972274A2-D688-4C37-BE42-689B58B4C225" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.11", + "matchCriteriaId": "01E300B3-8B39-4A2D-8B03-4631433D3915" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42314.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42314.json index 0302df01908..dfa91f7dab0 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42314.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42314", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:11.397", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:50:47.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige el use after free el mapa de extensi\u00f3n al agregar p\u00e1ginas a una biograf\u00eda comprimida En add_ra_bio_pages() estamos accediendo al mapa de extensi\u00f3n para calcular 'add_size' despu\u00e9s de que eliminamos nuestra referencia en el mapa de extensi\u00f3n, lo que resulta en un use-after-free. Solucione este problema calculando 'add_size' antes de eliminar nuestra referencia del mapa de extensi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "2676880F-A149-4412-81EC-C43CE29A7896" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8e7860543a94784d744c7ce34b78a2e11beefa5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7859ff398b6b656e1689daa860eb34837b4bb89", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c205565e0f2f439f278a4a94ee97b67ef7b56ae8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42315.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42315.json index 885c66769c9..f4462a5aedc 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42315.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42315", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:11.470", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:51:03.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: corrige un posible punto muerto en __exfat_get_dentry_set Al acceder a un archivo con m\u00e1s entradas que ES_MAX_ENTRY_NUM, la matriz bh se asigna en __exfat_get_entry_set. El problema es que el bh-array est\u00e1 asignado con GFP_KERNEL. No tiene sentido. En los siguientes casos, puede ocurrir un punto muerto para sbi->s_lock entre los dos procesos. CPU0 CPU1 ---- ---- kswapd balance_pgdat lock(fs_reclaim) exfat_iterate lock(&sbi->s_lock) exfat_readdir exfat_get_uniname_from_ext_entry exfat_get_dentry_set __exfat_get_dentry_set kmalloc_array ... lock(fs_reclaim) ... desalojar exfat_evict_inode lock(&sbi->s_lock) para arreglar esto, asignemos bh-array con GFP_NOFS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1d1970493c289e3f44b9ec847ed26a5dbdf56a62", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89fc548767a2155231128cb98726d6d2ea1256c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7ac198f8dba791e3144c4da48a5a9b95773ee4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42316.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42316.json index e2fc09b1bc9..af9cef5fe75 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42316.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42316", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:11.547", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:52:38.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mglru: corrige div-by-zero en vmpression_calc_level() evict_folios() utiliza una segunda pasada para recuperar las publicaciones que han pasado por la reescritura de p\u00e1ginas y quedan limpias antes de finalizar el primer pase, ya que folio_rotate_reclaimable() no puede manejar esos folios debido al aislamiento. El segundo paso intenta evitar un posible doble conteo deduciendo scan_control->nr_scanned. Sin embargo, esto puede resultar en un desbordamiento insuficiente de nr_scanned, bajo una condici\u00f3n en la que Shrink_folio_list() no incrementa nr_scanned, es decir, cuando falla folio_trylock(). El desbordamiento insuficiente puede causar que el divisor, es decir, escala=escaneado+reclamado en vmpression_calc_level(), se convierta en cero, lo que resulta en el siguiente bloqueo: [excepci\u00f3n RIP: vmpression_work_fn+101] Process_one_work en ffffffffa3313f2b Dado que scan_control->nr_scanned no tiene una sem\u00e1ntica establecida, la posible doble contabilizaci\u00f3n tiene riesgos m\u00ednimos. Por lo tanto, solucione el problema no deduciendo scan_control->nr_scanned en evict_folios()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "81F7EA03-5805-43D2-9A78-820250B70B32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8b671fe1a879923ecfb72dda6caf01460dd885ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8de7bf77f21068a5f602bb1e59adbc5ab533509d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a39e38be632f0e1c908d70d1c9cd071c03faf895", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6510f234c7d117790397f9bb150816b0a954a04", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json index 437bd802108..980347d0f77 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42552.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42552", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:05.933", - "lastModified": "2024-08-20T15:44:20.567", + "lastModified": "2024-08-22T15:35:09.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_room_history.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que el commit de Hotel Management System 91caab8 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro book_id en admin_room_history.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/topsky979/2386856df3f3ffa7bdc4738e24da4af3", diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json index c20fe850a79..2df8669ff2c 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42573", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:08.097", - "lastModified": "2024-08-21T13:44:48.360", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-22T14:35:09.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json index 0525b7b7c3f..8faaab1a03e 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42779", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.073", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:10.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de carga de archivos sin restricciones en \"/music/ajax.php?action=save_music\" en Kashipara Music Management System v1.0. Esto permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Music%20List.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json index ce617639107..ebfb4827314 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42781.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42781", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.227", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:11.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en \"/music/ajax.php?action=login\" de Kashipara Music Management System v1.0 permite a atacantes remotos ejecutar comandos SQL arbitrarios y omitir el inicio de sesi\u00f3n mediante el par\u00e1metro de correo electr\u00f3nico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Login.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json index 686ded93c76..2d4f99a8871 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42782", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.303", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:35:10.447", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en \"/music/ajax.php?action=find_music\" en Kashipara Music Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"buscar\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Find%20Music.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json index 76a3a788cef..5d3fd4e7ad1 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42784.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42784", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.630", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:12.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en \"/music/controller.php?page=view_music\" en Kashipara Music Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"id\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Music%20List.pdf", diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json index 481ac881007..365440f068f 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42785", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T18:15:10.707", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:35:11.450", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /music/index.php?page=view_playlist en Kashipara Music Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"id\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Playlist.pdf", diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json new file mode 100644 index 00000000000..705897032a1 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43398.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43398", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-22T15:15:16.440", + "lastModified": "2024-08-22T15:15:16.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-776" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ruby/rexml/releases/tag/v3.3.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json new file mode 100644 index 00000000000..095264b8de7 --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43785.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43785", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-22T15:15:16.670", + "lastModified": "2024-08-22T15:15:16.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "gitoxide An idiomatic, lean, fast & safe pure Rust implementation of Git. gitoxide-core, which provides most underlying functionality of the gix and ein commands, does not neutralize newlines, backspaces, or control characters\u2014including those that form ANSI escape sequences\u2014that appear in a repository's paths, author and committer names, commit messages, or other metadata. Such text may be written as part of the output of a command, as well as appearing in error messages when an operation fails. This sometimes allows an untrusted repository to misrepresent its contents and to alter or concoct error messages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-150" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Byron/gitoxide/security/advisories/GHSA-88g2-r9rw-g55h", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json new file mode 100644 index 00000000000..0a99e9612aa --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43787.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-43787", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-22T15:15:16.857", + "lastModified": "2024-08-22T15:15:16.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43828.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43828.json index 1942c29eab7..0c9bb78ab7d 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43828.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43828.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43828", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:08.720", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:41:50.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: corrige el bucle infinito al reproducir fast_commit Al realizar la reproducci\u00f3n fast_commit, puede ocurrir un bucle infinito debido a una estructura extend_status no inicializada. ext4_ext_determine_insert_hole() no detecta la repetici\u00f3n y llama a ext4_es_find_extent_range(), que regresar\u00e1 inmediatamente sin inicializar la variable 'es'. Debido a que 'es' contiene basura, puede ocurrir un desbordamiento de enteros causando un bucle infinito en esta funci\u00f3n, f\u00e1cilmente reproducible usando fstest generic/039. Esta confirmaci\u00f3n soluciona este problema inicializando incondicionalmente la estructura en la funci\u00f3n ext4_es_find_extent_range(). \u00a1Gracias a Zhang Yi por descubrir el verdadero problema!" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "3723F85C-99C4-4BA1-A411-426E0591769E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0619f7750f2b178a1309808832ab20d85e0ad121", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/181e63cd595c688194e07332f9944b3a63193de2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ed0496e383cb6de120e56991385dce70bbb87c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81f819c537d29932e4b9267f02411cbc8b355178", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/907c3fe532253a6ef4eb9c4d67efb71fab58c706", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6e67df64783e99a657ef2b8c834ba2bf54c539c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43833.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43833.json index e2b622acb36..70f61259c3b 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43833.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43833.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43833", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.040", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:42:46.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: media: v4l: async: corrige la desreferencia del puntero NULL al agregar enlaces auxiliares En v4l2_async_create_ancillary_links(), se crean enlaces auxiliares para subdispositivos de lentes y flash. Estos son enlaces de subdispositivo a subdispositivo y si el notificador as\u00edncrono est\u00e1 relacionado con un dispositivo V4L2, el subdispositivo de origen del enlace auxiliar es NULL, lo que lleva a una desreferencia del puntero NULL. Verifique que el campo sd del notificador no sea NULL en v4l2_async_create_ancillary_links(). [Sakari Ailus: Reformule el asunto y confirme ligeramente los mensajes.]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "1F2C2F2C-93A3-47B2-83D1-9ACD0285514A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/249212ceb4187783af3801c57b92a5a25d410621", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b4667ea67854f0b116fe22ad11ef5628c5b5b5f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b87e28050d9b0959de24574d587825cfab2f13fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe0f92fd5320b393e44ca210805e653ea90cc982", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43836.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43836.json index 042de10dbf1..e9f4333da54 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43836.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43836", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.250", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:43:26.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethtool: pse-pd: Arreglar posible null-deref Arreglar una posible desreferencia nula cuando un PSE soporta tanto c33 como PoDL, pero solo se especifica uno de los atributos netlink. Las capacidades de c33 o PoDL PSE ya est\u00e1n validadas en la llamada ethnl_set_pse_validate()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4cddb0f15ea9c62f81b4889ea69a99368cc63a86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e187690b125a297499eadeec53c32c5ed6d7436a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43837.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43837.json index 119d7b93215..03222de3cd1 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43837.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43837.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43837", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.320", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-22T15:44:03.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrigi\u00f3 la desreferencia del puntero nulo en resolve_prog_type() para BPF_PROG_TYPE_EXT Al cargar un programa EXT sin especificar `attr->attach_prog_fd`, el `prog->aux->dst_prog` ser\u00e1 nulo. En este momento, llamar a resolve_prog_type() en cualquier lugar dar\u00e1 como resultado una desreferencia del puntero nulo. Ejemplo de seguimiento de pila: [8.107863] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000004 [8.108262] Informaci\u00f3n de cancelaci\u00f3n de memoria: [8.108384] ESR = 0x0000000096000004 [8.108547] EC = 0x25: DABT (EL actual), IL = 32 bits [8.108722 ] SET = 0, FnV = 0 [8.108827] EA = 0, S1PTW = 0 [8.108939] FSC = 0x04: error de traducci\u00f3n de nivel 0 [8.109102] Informaci\u00f3n de cancelaci\u00f3n de datos: [8.109203] ISV = 0, ISS = 0x00000004, ISS2 = 00 [ 8.109399] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 8.109614] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 8.109836] tabla de p\u00e1ginas de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000101354000 [8.110011] [00000000000000004] pgd=0000000000000000, p4d=0000000000000000 [8.112624] Error interno: Vaya: 0000000096000 004 [#1] PREEMPT SMP [8.112783] M\u00f3dulos vinculados en: [8.113120] CPU: 0 PID: 99 Comm: may_access_dire No contaminado 6.10.0-rc3-next-20240613-dirty #1 [8.113230] Nombre de hardware: linux,dummy-virt (DT) [8.113390] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE= --) [8.113429] pc: may_access_direct_pkt_data+0x24/0xa0 [8.113746] lr: add_subprog_and_kfunc+0x634/0x8e8 [8.113798] sp: ffff80008283b9f0 [8.113813] x29: 83b9f0 x28: ffff800082795048 x27: 00000000000000001 [ 8.113881] x26: ffff0000c0bb2600 x25: 0000000000000000 x24: 0000000000000000 [8.113897] x23: ffff0000c1134000 x22: 000000000001864f x21: ffff0000c1138000 [8.113912] x20: 0000000000000001 x19: ffff0000c12b8000 x18: ffffffffffffffff [ 8.113929] x17: 0000000000000000 x16: 00000000000000000 x15: 0720072007200720 [ 8.113944] x14: 20072007200720 x13: 0720072007200720 x12: 0720072007200720 [8.113958] x11: 0720072007200720 x10: 0000000000f9fca4 x9: ffff80008021f4e4 [8.113991] x8: 0101010101010101 x7: 46f72705f6d656d x6: 000000001e0e0f5f [8.114006] x5: 000000000001864f x4: ffff0000c12b8000 x3: 000000000000001c [8.114020] x2: 00000000002 x1: 0000000000000000 x0: 0000000000000000 [ 8.114126] Seguimiento de llamadas: [8.114159] may_access_direct_pkt_data+0x24/0xa0 [8.114202] bpf_check+0x3bc/0x28c0 [8.114214] bpf_prog_load+0x658/0xa58 [8.114227] xc50/0x2250 [8.114240] __arm64_sys_bpf+0x28/0x40 [8.114254] invoke_syscall. constprop.0+0x54/0xf0 [8.114273] do_el0_svc+0x4c/0xd8 [8.114289] el0_svc+0x3c/0x140 [8.114305] el0t_64_sync_handler+0x134/0x150 [8.114331] _sync+0x168/0x170 [8.114477] C\u00f3digo: 7100707f 54000081 f9401c00 f9403800 (b9400403 ) [8.118672] ---[ end trace 0000000000000000 ]--- Una forma de solucionarlo es forzando que `attach_prog_fd` no est\u00e9 vac\u00edo cuando bpf_prog_load(). Pero esto provocar\u00e1 que se rompa la API `libbpf_probe_bpf_prog_type`, que utiliza el registro del verificador para sondear el tipo de programa y no registrar\u00e1 nada si rechazamos el programa EXT no v\u00e1lido antes de bpf_check(). Otra forma es agregando una verificaci\u00f3n nula en resolve_prog_type(). El problema fue introducido por el commit 4a9c7bbe2ed4 (\"bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT\") que quer\u00eda corregir la resoluci\u00f3n de tipos para los programas BPF_PROG_TYPE_TRACING. Antes de eso, la resoluci\u00f3n de tipo del programa BPF_PROG_TYPE_EXT en realidad sigue la siguiente l\u00f3gica: prog->aux->dst_prog ? prog->aux->dst_prog->tipo : prog->tipo; Implica que cuando el programa EXT a\u00fan no est\u00e1 adjunto a `dst_prog`, el tipo de programa debe ser EXT. Este c\u00f3digo funcion\u00f3 bien en el pasado. As\u00ed que sigue us\u00e1ndolo. Solucione este problema devolviendo `prog->type` para BPF_PROG_TYPE_EXT si `dst_prog` no est\u00e1 presente en resolve_prog_type()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "ADED9C16-75E2-47CC-A756-30929EBBF848" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9d40fd516aeae6779e3c84c6b96700ca76285847", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b29a880bb145e1f1c1df5ab88ed26b1495ff9f09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f7866c35873377313ff94398f17d425b28b71de1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fcac5feb06f31ee4c88bca9bf98d8bc3ca7d2615", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45163.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45163.json index 9a9bb77c515..409d0d7e7fe 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45163.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45163.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45163", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T04:15:20.247", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T15:35:12.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Mirai botnet hasta el 19 de agosto de 2024 maneja mal las conexiones TCP simult\u00e1neas al servidor CNC (comando y control). Las sesiones no autenticadas permanecen abiertas, lo que provoca un consumo de recursos. Por ejemplo, un atacante puede enviar un nombre de usuario reconocido (como root) o puede enviar datos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://cypressthatkid.medium.com/remote-dos-exploit-found-in-mirai-botnet-source-code-27a1aad284f1", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45166.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45166.json index 1a27fa161ee..adb7ffa12b8 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45166.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45166.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45166", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T04:15:24.467", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:13.183", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Debido a una validaci\u00f3n de entrada inadecuada, una deserializaci\u00f3n inadecuada y una restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria, IDOL2 es vulnerable a ataques de denegaci\u00f3n de servicio (DoS) y posiblemente a la ejecuci\u00f3n remota de c\u00f3digo. Hay una infracci\u00f3n de acceso y se sobrescribe el EIP despu\u00e9s de cinco inicios de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "http://download.uci.de/idol2/idol2Client_2_12.exe", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45168.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45168.json index 45d654644dc..f617bbe85f4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45168.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45168.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45168", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T04:15:27.190", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:13.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Los datos se transfieren a trav\u00e9s de un socket sin formato sin ning\u00fan mecanismo de autenticaci\u00f3n. Por tanto, los endpoints de comunicaci\u00f3n no son verificables." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "http://download.uci.de/idol2/idol2Client_2_12.exe", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45169.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45169.json index 6bff27971ca..e093e0db4c7 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45169.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45169.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45169", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T04:15:27.583", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T15:35:13.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Debido a una validaci\u00f3n de entrada inadecuada, una deserializaci\u00f3n inadecuada y una restricci\u00f3n inadecuada de las operaciones dentro de los l\u00edmites de un b\u00fafer de memoria, IDOL2 es vulnerable a ataques de denegaci\u00f3n de servicio (DoS) y posiblemente a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de la secuencia de bytes \\xB0\\x00\\x3c. ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "http://download.uci.de/idol2/idol2Client_2_12.exe", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json index af5d9359b79..266c0b42781 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4944.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4944", "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-07-09T03:15:02.270", - "lastModified": "2024-07-09T18:19:14.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T15:06:05.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "type": "Secondary", @@ -51,10 +81,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:watchguard:mobile_vpn_with_ssl:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.10.4", + "matchCriteriaId": "2CA32F06-03E0-48EA-A06D-203034ED7CD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00010", - "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3" + "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json index dd400cc7aeb..155328a5529 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5974", "sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "published": "2024-07-09T03:15:02.507", - "lastModified": "2024-07-09T18:19:14.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:26:55.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "type": "Secondary", @@ -51,10 +81,301 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.9.4", + "versionEndExcluding": "12.5.12", + "matchCriteriaId": "625777A6-D12E-4BBC-BBF0-F7ABE40CC8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.6", + "versionEndExcluding": "12.10.4", + "matchCriteriaId": "7349E570-8D36-4B19-9DBD-E352BB458F23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:watchguard:fireware:12.5.12:u1:*:*:*:*:*:*", + "matchCriteriaId": "2B644B61-D7D7-4658-96FC-3AB7D394CBA8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "947408A7-EC5A-43A0-A2F0-C51055F29BF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E472917E-D6E1-4C2D-B37D-E76FCC7307CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A8C7779-4466-4A9E-B191-929E7746DFF7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7867C903-6DB6-4E58-AD44-07BBB9C45E72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CE9A123-B769-4E56-845E-DC3DA6166C78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "180FAE8C-2E73-4C09-AA11-0C82A7715FA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BD5BB5D-12FC-4D49-A2FA-8886077457B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "309DBEF2-1D92-4641-827F-D99758B5FFA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBFBA966-E052-4350-9544-3B5D484DBB6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m4800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF1E586D-0E88-447A-95E8-5203EF869ADB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08422D7D-CA99-4303-B783-30F8CDCAC34C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59389EA2-3067-4AF8-AEC5-FE79E269C170" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445FA7CD-D0AE-4176-9AE5-293B918DE654" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B4A7366-0304-431E-B3E4-719BA575CEAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8512B4A-5269-4067-B9C6-475A4E8AD313" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_m690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "179C6166-87E1-44F8-B727-CDDE40C673D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D97A123-654D-40B0-A18B-FE4801BF4506" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t10-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "983AE311-F2BD-4260-839E-2D906B6E095A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t10-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28634F62-70D4-49F6-860F-8FE1B85707F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "626220F8-7F0C-4DD8-8001-12EA0A777A0D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t15-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "083919C1-A383-430A-B56C-13C6128266F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9295217E-C1A0-4A69-A0F0-C44814BB376C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t20-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4832E5E-E4ED-4222-B9A5-060FA6AA22DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E10A9DF-DD32-4E42-838D-E398B3451FBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t30-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29D260C9-BB0C-4546-9E56-0283B9332AC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t35:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E561A57F-91A5-4B3C-9F7D-62E9AB5163A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t35-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B691D60-C12E-49DA-9917-4513E4A57B55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t35-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F374AC3-0292-428B-AA39-F60980874160" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC853916-8BDC-4F7C-BA53-D6AB490A9444" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t40-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4267A4B5-4F48-4104-85E8-3F6B09FD2354" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t50:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D15B548-CB7C-44B6-A568-7F87652561D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t50-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07EB3F3A-E508-42EF-9D11-9BC77C35EA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3562304-0317-4A3C-B622-D5CE01CC97F9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t55-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "755CD8FA-C341-4C34-8005-A42C32BD85CF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t70:-:*:*:*:*:*:*:*", + "matchCriteriaId": "327BA50A-366A-4367-93B8-328EC0136FA7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_t80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D92ABD52-20F6-4AB1-801F-9E7B7B1B78A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm1520-rp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E7C021D-0C50-47A8-B8D6-27BE0FBD025C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm1525-rp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EF67525-E49F-4B2C-823B-8447E8450F27" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm2520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED8D9112-1504-4341-B2F9-9967B5D02790" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95BC88C9-324F-4803-97E4-91773827F4C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AADF6164-8A53-4023-B326-C3CA1A4DE0A8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm870:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42A6A10F-C0C1-415F-943D-9CFADC35CF73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:firebox_xtm870-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EF5490C-5BBD-476C-916E-26C5426A6069" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:fireboxcloud:-:*:*:*:*:*:*:*", + "matchCriteriaId": "158560A0-D694-41AF-A5F8-0F6FB3EFB8FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:fireboxt_nv5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EDA8CE73-14FB-443C-8085-388C61706A90" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:fireboxt_t25:*:*:*:*:*:*:*:*", + "matchCriteriaId": "55490F9D-F216-4A2C-B28D-6DE01CFD5DB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:fireboxt_t45:*:*:*:*:*:*:*:*", + "matchCriteriaId": "26488C22-70A1-434B-9FC2-7C0EB4E2696F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:fireboxt_t85:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C5EDF2C3-FDF2-4D97-A056-462AE61DBF8A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:fireboxv:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4ECAE1D7-9868-4730-B645-44CB1B6FDE96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:watchguard:xtmv:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72807176-5A59-4BFD-B6C0-2738D9FD3AB5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00011", - "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3" + "source": "5d1c2695-1a31-4499-88ae-e847036fd7e3", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6563.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6563.json index 501455e93ed..5bf803ec0af 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6563.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6563.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6563", "sourceIdentifier": "cve@asrg.io", "published": "2024-07-08T16:15:09.210", - "lastModified": "2024-07-09T14:19:19.300", + "lastModified": "2024-08-22T15:51:55.843", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -94,8 +94,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:rensas:arm-trusted-firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA50A6A9-9D25-4BBA-9FEA-ADC1A6CB0A99" + "criteria": "cpe:2.3:o:renesas:arm-trusted-firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16A2BDC3-F664-4132-8148-9DB849240F8B" } ] } diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6564.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6564.json index 7d799928433..755a5dcaf6c 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6564.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6564.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6564", "sourceIdentifier": "cve@asrg.io", "published": "2024-07-08T16:15:09.423", - "lastModified": "2024-07-09T14:19:14.760", + "lastModified": "2024-08-22T15:52:05.033", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:rensas:arm-trusted-firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA50A6A9-9D25-4BBA-9FEA-ADC1A6CB0A99" + "criteria": "cpe:2.3:o:renesas:arm-trusted-firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16A2BDC3-F664-4132-8148-9DB849240F8B" } ] } diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json index 53d4bc72c12..e8d733d586e 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json @@ -2,13 +2,13 @@ "id": "CVE-2024-6800", "sourceIdentifier": "product-cna@github.com", "published": "2024-08-20T20:15:09.910", - "lastModified": "2024-08-21T12:30:33.697", + "lastModified": "2024-08-22T15:15:17.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when utilizing SAML authentication with specific identity providers. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a\u00a0SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication.\u00a0This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program." + "value": "An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json index aaf9399b133..14c531a55ec 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7731", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-14T07:15:13.920", - "lastModified": "2024-08-14T13:00:37.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:40:00.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "twcert@cert.org.tw", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:secom:dr.id_access_control:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.6.3", + "matchCriteriaId": "A9406220-C56D-45EA-BD7D-1A613D4DCE84" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-8006-036f5-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-8005-c3c94-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7746.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7746.json index a366b927ed4..deba7bcf5a9 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7746.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7746", "sourceIdentifier": "cve@asrg.io", "published": "2024-08-13T16:15:09.573", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-22T14:40:44.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "cve@asrg.io", "type": "Secondary", @@ -73,10 +105,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.12", + "versionEndIncluding": "6.0", + "matchCriteriaId": "D590EA44-D2CF-4505-90BA-6D6A7483A311" + } + ] + } + ] + } + ], "references": [ { "url": "https://asrg.io/security-advisories/cve-2024-7746/", - "source": "cve@asrg.io" + "source": "cve@asrg.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7965.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7965.json index aaf943e824b..600e849ef6e 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7965.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7965.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7965", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:08.947", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:15.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inadecuada en V8 en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7967.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7967.json index 5e5a5737f17..887b98e1f19 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7967.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7967.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7967", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.060", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:16.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El desbordamiento del b\u00fafer del mont\u00f3n en fuentes en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-122" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json index df19124342e..96955c3a22a 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7971", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.277", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:17.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La confusi\u00f3n de tipos en V8 en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7972.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7972.json index 4d94fb2bad8..62f55cf259b 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7972.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7972.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7972", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.353", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T15:35:14.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inapropiada en V8 en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar potencialmente un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7973.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7973.json index 28972544b7a..ad191c78262 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7973.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7973.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7973", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.407", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T15:35:15.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El desbordamiento del b\u00fafer de mont\u00f3n en PDFium en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto realizar una lectura de memoria fuera de los l\u00edmites a trav\u00e9s de un archivo PDF manipulado. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-122" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7979.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7979.json index f15d3f8b200..8e7ecc813f7 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7979.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7979.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7979", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.747", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T15:35:16.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La validaci\u00f3n de datos insuficiente en el instalador de Google Chrome en Windows anterior a 128.0.6613.84 permiti\u00f3 a un atacante local realizar una escalada de privilegios a trav\u00e9s de un enlace simb\u00f3lico manipulado. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7980.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7980.json index d88fa037100..cffa47cb2f7 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7980.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7980.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7980", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.793", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T15:35:17.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La validaci\u00f3n de datos insuficiente en el instalador de Google Chrome en Windows anterior a 128.0.6613.84 permiti\u00f3 a un atacante local realizar una escalada de privilegios a trav\u00e9s de un enlace simb\u00f3lico manipulado. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8072.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8072.json index 481f198c7ca..89492da666c 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8072.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8072.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8072", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-08-22T08:15:04.360", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-08-22T14:35:18.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://research.jfrog.com/vulnerabilities/mage-ai-terminal-server-infoleak-jfsa-2024-001039574/", diff --git a/README.md b/README.md index 7a7912677b4..fe61d33f419 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-22T14:00:19.765020+00:00 +2024-08-22T16:00:17.779913+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-22T13:50:16.117000+00:00 +2024-08-22T15:59:11.740000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260934 +260943 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `9` -- [CVE-2024-43331](CVE-2024/CVE-2024-433xx/CVE-2024-43331.json) (`2024-08-22T12:15:05.600`) +- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T15:15:15.883`) +- [CVE-2024-36440](CVE-2024/CVE-2024-364xx/CVE-2024-36440.json) (`2024-08-22T15:15:15.977`) +- [CVE-2024-36442](CVE-2024/CVE-2024-364xx/CVE-2024-36442.json) (`2024-08-22T15:15:16.047`) +- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T14:15:08.443`) +- [CVE-2024-36444](CVE-2024/CVE-2024-364xx/CVE-2024-36444.json) (`2024-08-22T15:15:16.117`) +- [CVE-2024-36445](CVE-2024/CVE-2024-364xx/CVE-2024-36445.json) (`2024-08-22T15:15:16.187`) +- [CVE-2024-43398](CVE-2024/CVE-2024-433xx/CVE-2024-43398.json) (`2024-08-22T15:15:16.440`) +- [CVE-2024-43785](CVE-2024/CVE-2024-437xx/CVE-2024-43785.json) (`2024-08-22T15:15:16.670`) +- [CVE-2024-43787](CVE-2024/CVE-2024-437xx/CVE-2024-43787.json) (`2024-08-22T15:15:16.857`) ### CVEs modified in the last Commit -Recently modified CVEs: `136` +Recently modified CVEs: `68` -- [CVE-2024-7778](CVE-2024/CVE-2024-77xx/CVE-2024-7778.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7836](CVE-2024/CVE-2024-78xx/CVE-2024-7836.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7848](CVE-2024/CVE-2024-78xx/CVE-2024-7848.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-8071](CVE-2024/CVE-2024-80xx/CVE-2024-8071.json) (`2024-08-22T12:48:02.790`) -- [CVE-2024-8072](CVE-2024/CVE-2024-80xx/CVE-2024-8072.json) (`2024-08-22T12:48:02.790`) +- [CVE-2024-42784](CVE-2024/CVE-2024-427xx/CVE-2024-42784.json) (`2024-08-22T14:35:12.170`) +- [CVE-2024-42785](CVE-2024/CVE-2024-427xx/CVE-2024-42785.json) (`2024-08-22T15:35:11.450`) +- [CVE-2024-43828](CVE-2024/CVE-2024-438xx/CVE-2024-43828.json) (`2024-08-22T15:41:50.870`) +- [CVE-2024-43833](CVE-2024/CVE-2024-438xx/CVE-2024-43833.json) (`2024-08-22T15:42:46.827`) +- [CVE-2024-43836](CVE-2024/CVE-2024-438xx/CVE-2024-43836.json) (`2024-08-22T15:43:26.303`) +- [CVE-2024-43837](CVE-2024/CVE-2024-438xx/CVE-2024-43837.json) (`2024-08-22T15:44:03.417`) +- [CVE-2024-45163](CVE-2024/CVE-2024-451xx/CVE-2024-45163.json) (`2024-08-22T15:35:12.750`) +- [CVE-2024-45166](CVE-2024/CVE-2024-451xx/CVE-2024-45166.json) (`2024-08-22T14:35:13.183`) +- [CVE-2024-45168](CVE-2024/CVE-2024-451xx/CVE-2024-45168.json) (`2024-08-22T14:35:13.957`) +- [CVE-2024-45169](CVE-2024/CVE-2024-451xx/CVE-2024-45169.json) (`2024-08-22T15:35:13.507`) +- [CVE-2024-4944](CVE-2024/CVE-2024-49xx/CVE-2024-4944.json) (`2024-08-22T15:06:05.480`) +- [CVE-2024-5974](CVE-2024/CVE-2024-59xx/CVE-2024-5974.json) (`2024-08-22T14:26:55.657`) +- [CVE-2024-6563](CVE-2024/CVE-2024-65xx/CVE-2024-6563.json) (`2024-08-22T15:51:55.843`) +- [CVE-2024-6564](CVE-2024/CVE-2024-65xx/CVE-2024-6564.json) (`2024-08-22T15:52:05.033`) +- [CVE-2024-6800](CVE-2024/CVE-2024-68xx/CVE-2024-6800.json) (`2024-08-22T15:15:17.127`) +- [CVE-2024-7731](CVE-2024/CVE-2024-77xx/CVE-2024-7731.json) (`2024-08-22T14:40:00.913`) +- [CVE-2024-7746](CVE-2024/CVE-2024-77xx/CVE-2024-7746.json) (`2024-08-22T14:40:44.167`) +- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-22T14:35:15.280`) +- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-22T14:35:16.310`) +- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-22T14:35:17.313`) +- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-22T15:35:14.597`) +- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-22T15:35:15.597`) +- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-22T15:35:16.610`) +- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-22T15:35:17.610`) +- [CVE-2024-8072](CVE-2024/CVE-2024-80xx/CVE-2024-8072.json) (`2024-08-22T14:35:18.797`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4a116fb0bfd..7c3c61fdd44 100644 --- a/_state.csv +++ b/_state.csv @@ -6826,7 +6826,7 @@ CVE-2003-0059,0,0,9b467128aa7d52b1c0228e54a512232ea06b5094b0ca4328a1b19c18c086bb CVE-2003-0060,0,0,2b161e5e23ecaff15a71eedebc54308999fda54f3b03eb3f15e239e527ef079a,2020-01-21T15:44:53.820000 CVE-2003-0061,0,0,fb48c810402a59f1e816cce84765259427dd905ebafca590217d2c1d1a0a8ba6,2008-09-05T20:33:21.787000 CVE-2003-0062,0,0,220e4ca7fe7a82c24abb8933393b0872bef9fb76c3a861b86d6b6b6d3b45fd2c,2016-10-18T02:28:57.360000 -CVE-2003-0063,0,0,ee01a0b62202135b5aef25d174f06d5ff0494a3d156e239b43cef1109ece39f7,2024-06-15T10:15:10.083000 +CVE-2003-0063,0,1,08e8c1fb6e1a3ba6d45ede25c5a8a7fe5c4cbb47435d606b1c1c0fd9e8f62207,2024-08-22T15:35:00.600000 CVE-2003-0064,0,0,0f3d2197cadb1ae2a90294bd1e0ce23bd609779c42335a9bf1f6318b5e844d84,2018-10-30T16:26:22.763000 CVE-2003-0065,0,0,32c52cb2ff50eee0bd89462e579d28cc1a8537aa17f9ad12358b4b4edb43ab1e,2016-10-18T02:29:01.440000 CVE-2003-0066,0,0,77fac5544f85a414f7d717e1977ab442b656c9b7041d46aa7231df36ff38a87e,2016-10-18T02:29:02.690000 @@ -73024,7 +73024,7 @@ CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d117 CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000 CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000 CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000 -CVE-2014-9515,0,0,24be7155019de27e80399c6be5475ef64a6aedbe97577a256ae0a18f9a53e8b2,2024-07-19T14:15:02.500000 +CVE-2014-9515,0,1,152a4fc755c424efe371779645f9d6aeb10209c0f007f159e1b12840db4466e9,2024-08-22T15:35:01.630000 CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000 CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000 CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000 @@ -175250,7 +175250,7 @@ CVE-2021-31192,0,0,fd789248bf776790286911c1cb62d193d3758ca81ef93da2b769e43d45b36 CVE-2021-31193,0,0,077bb091684d98f26b6775e11540d1486855c8b0d31cece055f7164c231d488f,2023-08-02T00:15:14.130000 CVE-2021-31194,0,0,a881a4ba34181125ee9ae9d9c1b01593524b854565df4e5996e91bfacc287967,2023-08-02T00:15:14.223000 CVE-2021-31195,0,0,70601223ee123bbcfc6c70e498c7011bda164e6f4ddb34afe419d104ffa66b25,2023-08-02T00:15:14.323000 -CVE-2021-31196,0,0,fb93d3a83bfcd3219bb93cb91a6b6f7d1215b8129d82080460a2b924115c0821,2024-08-22T01:00:01.277000 +CVE-2021-31196,0,1,c90e7e86ad84b3fe62b6068d7900bac0e921351a4581cbb17e4034b5eadf7d04,2024-08-22T14:13:46.367000 CVE-2021-31198,0,0,c30b3a1c57145c6bd60798b28f43bf1b762d20c9da745906c3aa84d02e50db9f,2023-08-02T00:15:14.423000 CVE-2021-31199,0,0,6a10871a43e5aa3edee13eb1b7ba5d0cfbf7151ab2ede6f7ce968c12cd3946fc,2024-07-29T18:06:29.307000 CVE-2021-3120,0,0,08daa0568cd7cfafde23061c9f7b245e79e5316ac276c10375c44ea0d54bbceb,2023-02-01T02:23:04.767000 @@ -185169,7 +185169,7 @@ CVE-2021-44406,0,0,fd9d29980c886cd8d92b361798b055341bfc74bd83c68b86f68f4ee69f46f CVE-2021-44407,0,0,fc965d75536c4301ffc608c6a377219be0371ccfaa13e6eb2cdd097661de73f2,2022-10-25T17:36:38.547000 CVE-2021-44408,0,0,1796000f44b8bb0c7587aea014ccd33a035fe99707e11f2f4a04661f9e79f691,2022-10-25T17:36:11.647000 CVE-2021-44409,0,0,9f017a891d9381c3f0a4fba6c7252ab6afe26ce20cf4bb0ee24450da9e559bae,2022-10-25T17:36:06.460000 -CVE-2021-4441,0,1,17a07e10759c260a0cd509cd06d1cd4f406158fc942f07a440ba37973576cc08,2024-08-22T12:48:02.790000 +CVE-2021-4441,0,0,17a07e10759c260a0cd509cd06d1cd4f406158fc942f07a440ba37973576cc08,2024-08-22T12:48:02.790000 CVE-2021-44410,0,0,8987a8a08eefcb8e8639b8c36f8efac14850afcf28e1895fc8c826983a36d725,2022-10-25T17:35:59.223000 CVE-2021-44411,0,0,4c009c4c595fa0e30c202f045dec5c1accfd07f6c5c888dd57437e5f5fdd652a,2022-10-25T17:35:51.200000 CVE-2021-44412,0,0,9cedba985a18ced50920d0bc0b3286b490e9cc4a4b23c3bec22d94124fd12693,2022-10-25T17:35:35.607000 @@ -187601,7 +187601,7 @@ CVE-2022-0181,0,0,49bbaf20babae092248444f6ddc94fd7d8983bfce62fd846eee38d0176c6ca CVE-2022-0182,0,0,f0d9ba9007437f7d7a66a432fc0d00289cffd4600671c3cebf01d89438097bad,2022-01-24T20:27:33.607000 CVE-2022-0183,0,0,3b28f17534e16919c8c20dabb021bcf588ae9e948de688533d018739b0f1c29e,2022-01-26T15:46:06.490000 CVE-2022-0184,0,0,2796a1b3e55d24a7793b73561ae52ebe8b8c9bdb3af4ee6ae87dd4893719740c,2022-01-28T20:58:56.980000 -CVE-2022-0185,0,1,fa97d99fab19f9f20e8dabebad35032ae26d67e99d1532f842fa8ee1438933c2,2024-08-22T13:35:00.450000 +CVE-2022-0185,0,0,fa97d99fab19f9f20e8dabebad35032ae26d67e99d1532f842fa8ee1438933c2,2024-08-22T13:35:00.450000 CVE-2022-0186,0,0,02b43b39b42feadeed2a3b848b36fe00f387679041bd4cddc14b4f50f18f257c,2022-02-28T20:50:11.233000 CVE-2022-0188,0,0,b8ccca23290559a5b11ded28b5901c560a4c58d0a38271ad31544f41df963cc4,2023-11-07T03:41:08.873000 CVE-2022-0189,0,0,266c58e45b9d9e1080790386b72619f2a8170166f33a359753e82bc61cf4178b,2022-03-08T16:22:14.813000 @@ -195988,7 +195988,7 @@ CVE-2022-27482,0,0,36b6f1b97ebba78c42fbca698ce9c45dd58b63814d39b8408a6e4f47c85c7 CVE-2022-27483,0,0,547cae1c29ba4c8e34ce2ca3485c07e3564bbb8ad0bc933f56fe2bc4cfd995a2,2022-07-27T07:18:54.910000 CVE-2022-27484,0,0,b70ab124e3868d4300a35fe9373862610a18fbb62290ce37b9943e259b6259b4,2023-08-08T14:21:49.707000 CVE-2022-27485,0,0,89c71954a05af3cb3fa20c6d9b6c24ac726da380f9e9c148dcc8373b207c974a,2023-11-07T03:45:20.327000 -CVE-2022-27486,0,0,ca6a359675a9453943a436a34e3b289e6dfcd80ea8f91f900f1e2408a778ecee,2024-08-13T17:11:53.553000 +CVE-2022-27486,0,1,d9634ef51201dc92021cc40d6c68b96adffc3632fb81f86d8cb3b72dbf25443a,2024-08-22T14:29:44.627000 CVE-2022-27487,0,0,40352dcb6eab8d9a69c504241370e01f28a37002d1641a037d7821aac682f726,2023-11-07T03:45:20.453000 CVE-2022-27488,0,0,6e31ddd90d81cb2ce85c8657468174115b85ad3aef674059057db057dfb8f7e7,2024-01-18T15:48:06.043000 CVE-2022-27489,0,0,81b540b09f87c477cd65ccdf38f3c4e50b2037d1b2ce7272f3b17e5d12163420,2023-11-07T03:45:20.570000 @@ -196038,7 +196038,7 @@ CVE-2022-27537,0,0,4f323c390ae67bf4d4a49e2bfbd872c09defecbb2392cd2942a41e6707998 CVE-2022-27538,0,0,9d3139694e40c37c446ec1b8a15ba025f469f19e9dade9e273a97b6d4bdaa89a,2023-02-16T21:59:04.027000 CVE-2022-27539,0,0,fc9e4c3c8111f15c12cce968358404e33bcb8d28f4b40ea515ad7c623c1ce1b4,2023-06-28T20:09:40.707000 CVE-2022-2754,0,0,a0d5346a2857741d9627a2bd4d0e70d2226ccc2da26068426ace52410fbe6f90,2022-09-21T06:28:06.090000 -CVE-2022-27540,0,0,c7a2e01f21c744aaf1fad5f226c4a727dc6c9cfe76c05321ee737be76079a8ba,2024-07-01T12:37:24.220000 +CVE-2022-27540,0,1,4e084977308d1f9bcabf9d7df04d1976d0bace484b39561703f7e6e0558a479c,2024-08-22T15:35:02.633000 CVE-2022-27541,0,0,e68146274941a4057a248c3e754148a97011afa1498ab0865f0f238b16aa3f0d,2023-06-28T20:09:53.083000 CVE-2022-27544,0,0,1742c2d20287265afbbbc0e653c2ad62768620600f695fc6956c35b3d20f219a,2022-07-27T22:40:03.920000 CVE-2022-27545,0,0,4b0da5810298d30534b12b64765c5d5fe3946cfa485df7f3f365142546bec22f,2022-07-27T22:36:45.790000 @@ -198276,7 +198276,7 @@ CVE-2022-30284,0,0,3f682ca57ebd600d22ba889ad73f2f828b756b846c709580dd1eb4fc8ff92 CVE-2022-30285,0,0,b074e639bdd1cfbb52847b7e52d2b4be281d99afaf667c29503ba6a3ad501b78,2023-08-08T14:22:24.967000 CVE-2022-30286,0,0,2303d5314d85878656f33a9936c3e0fb956f5ed156c51c5b48466ed0f6800766,2022-05-16T18:47:04.993000 CVE-2022-30287,0,0,b5f11e39986f9100b6b8734e101ef752eb839b0487a3bb33aaf4a311f1a73f6f,2023-08-08T14:22:24.967000 -CVE-2022-30288,0,0,c9420c58a48eccf59c08d12cc8fce6841028743d672b102d4c40e0b622bbdb6c,2024-08-03T07:15:50.983000 +CVE-2022-30288,0,1,48ea3ecf9aaac83590785bb6ce37caa8952e2c2e688dea389d99a3208bdefd89,2024-08-22T15:35:03.537000 CVE-2022-30289,0,0,7d69849dbf9b399d69de8d247e85d4aafbb60d0b9c5d1c4cee4af233a0b20cdf,2022-07-11T13:36:15.213000 CVE-2022-3029,0,0,75565c82e64f54277abff1006121e0fbc6d3431900f0f15c48c79db2248b3a97,2023-11-07T03:50:43.043000 CVE-2022-30290,0,0,5feec6389aa4a5512393fc0b6c74470cca733f66a5d7ba7d901e67757d98c69e,2023-08-08T14:22:24.967000 @@ -210268,7 +210268,7 @@ CVE-2022-45859,0,0,e348c03f2d659f2f5386e4f909b6e1cb2796eaee095e3e655cb0987893244 CVE-2022-4586,0,0,0aa055d519b6e153850ccca55806ee707b733003747c3a50acc7fbfa7cffac55,2023-11-07T03:58:14.667000 CVE-2022-45860,0,0,19ff9249ce30a9b49b0ef71436486c56cd636a8a1ff2b9bc5fc6dacb75c5ac16,2023-11-07T03:54:54.520000 CVE-2022-45861,0,0,ce9a5217138c4f0b88d9c1f1c18264fd40036371397c206a84c6003fd1ed0947,2023-11-07T03:54:54.773000 -CVE-2022-45862,0,0,1966029ad95b5d718b11e8218360539a7d84a88f1231f9eeaaaa7b3dcf5ed745,2024-08-13T17:11:53.553000 +CVE-2022-45862,0,1,3b22c1b4147b0d5e3363ef563a6a04aa1f2320431b3f3284c2ba49a20118fc59,2024-08-22T14:32:16.823000 CVE-2022-45866,0,0,d74e30c203376ee64b52bc0674dadc3d7e6655262995eb7d10ab3de283c1a2c3,2023-11-07T03:54:55.003000 CVE-2022-45867,0,0,9683286023a0db7745466ef67dbea5f2d24359816c975944697b49893f1ea929,2023-01-10T03:23:59.953000 CVE-2022-45868,0,0,c81f731922d209a11898651a91a4d106607ad1989f6cc83a36eca554d71b85d5,2024-08-03T15:15:31.327000 @@ -212410,53 +212410,53 @@ CVE-2022-48898,0,0,db123fbf5ec577b4cc5c353572831875154cf4dfd348ca1511458d53d92f2 CVE-2022-48899,0,0,307122423943779556534a3fc536d67a546d19e3083d1df8d83008bd134af184,2024-08-21T12:30:33.697000 CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000 CVE-2022-48900,0,0,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000 -CVE-2022-48901,0,1,3815d0d738961db5521290f57f22252e380bbcd01c63de9a8b81c61ebbbee0bc,2024-08-22T12:48:02.790000 -CVE-2022-48902,0,1,3ff6d9302279291bb1d2e9eb863851e121ffad98e92de69140f6f831e1fba7cf,2024-08-22T12:48:02.790000 -CVE-2022-48903,0,1,8ad23f64034f68803476665343be6aea5551252dc2139948d5ac32150ff6e5ca,2024-08-22T12:48:02.790000 -CVE-2022-48904,0,1,05aa7a4e86729d93721fc78bcca8932138c75da702bb3ee60cc3ff2e2a679912,2024-08-22T12:48:02.790000 -CVE-2022-48905,0,1,3266a56719a8523cbff76088b0907bf01416cd4e4e38cc796ad252025a0b42a5,2024-08-22T12:48:02.790000 -CVE-2022-48906,0,1,c2f0bd8fdb3f9a1521c9786412ee3fe2aa6827f19cf3b8ae2736d679036a4d9a,2024-08-22T12:48:02.790000 -CVE-2022-48907,0,1,c188f4c8814bd9f6f98170405a233fa28ff4041ac65d379bf8e057f090f743c6,2024-08-22T12:48:02.790000 -CVE-2022-48908,0,1,0aed4270fe80d33fe1f58219e7c39a3b34f4f44a034115446ff65263275c1da9,2024-08-22T12:48:02.790000 -CVE-2022-48909,0,1,60753974402d7b9dc0b7da2840cff75c54ff83e7db7e3cd742fa083f4cbfd72e,2024-08-22T12:48:02.790000 +CVE-2022-48901,0,0,3815d0d738961db5521290f57f22252e380bbcd01c63de9a8b81c61ebbbee0bc,2024-08-22T12:48:02.790000 +CVE-2022-48902,0,0,3ff6d9302279291bb1d2e9eb863851e121ffad98e92de69140f6f831e1fba7cf,2024-08-22T12:48:02.790000 +CVE-2022-48903,0,0,8ad23f64034f68803476665343be6aea5551252dc2139948d5ac32150ff6e5ca,2024-08-22T12:48:02.790000 +CVE-2022-48904,0,0,05aa7a4e86729d93721fc78bcca8932138c75da702bb3ee60cc3ff2e2a679912,2024-08-22T12:48:02.790000 +CVE-2022-48905,0,0,3266a56719a8523cbff76088b0907bf01416cd4e4e38cc796ad252025a0b42a5,2024-08-22T12:48:02.790000 +CVE-2022-48906,0,0,c2f0bd8fdb3f9a1521c9786412ee3fe2aa6827f19cf3b8ae2736d679036a4d9a,2024-08-22T12:48:02.790000 +CVE-2022-48907,0,0,c188f4c8814bd9f6f98170405a233fa28ff4041ac65d379bf8e057f090f743c6,2024-08-22T12:48:02.790000 +CVE-2022-48908,0,0,0aed4270fe80d33fe1f58219e7c39a3b34f4f44a034115446ff65263275c1da9,2024-08-22T12:48:02.790000 +CVE-2022-48909,0,0,60753974402d7b9dc0b7da2840cff75c54ff83e7db7e3cd742fa083f4cbfd72e,2024-08-22T12:48:02.790000 CVE-2022-4891,0,0,a455b0842f19c717ee670b5db60155cb5018f293a7aaf3547e3c50a0a475a09d,2024-05-17T02:17:01.767000 -CVE-2022-48910,0,1,c49907901e2444dc6fb276986d8fa7581490f1e186329d0375e706884b0faf75,2024-08-22T12:48:02.790000 -CVE-2022-48911,0,1,b66c8472f6855508ff6f6a7b1b64d3f2605476613ce462c2bb964595732f5764,2024-08-22T12:48:02.790000 -CVE-2022-48912,0,1,bc2a2daaa3b38a68e53fbf8d9c97ac70c6915414f0359c7ec4f2980ad0abde6c,2024-08-22T12:48:02.790000 -CVE-2022-48913,0,1,13c5f6805a21422f3cbdd0c8dd38766023838486158b2d75d57883e5de7b7695,2024-08-22T12:48:02.790000 -CVE-2022-48914,0,1,17a954177f70a24d9987d801118d084e4480c7c3850b7fa42f10a93117b17e59,2024-08-22T12:48:02.790000 -CVE-2022-48915,0,1,0b1fbcc9a6997478047f46007fdf7710031f4d070e9f8556b269c63077533d0f,2024-08-22T12:48:02.790000 -CVE-2022-48916,0,1,8f20ce1d1c5363f5f68e39b98839eaf52bfa07c01964cca89491dcdb59190093,2024-08-22T12:48:02.790000 -CVE-2022-48917,0,1,58439b65e36dbb2ade45a1620a3a14ca27906f33b947d1f0a9005280949a5eee,2024-08-22T12:48:02.790000 -CVE-2022-48918,0,1,a06ecdecdb3be4f4b6eb324472cfffcf7ceef19b2a53970b6146c71dc16cae1e,2024-08-22T12:48:02.790000 -CVE-2022-48919,0,1,7bfca989d0f16a5cbff28fbb03b7f902adac3eae36b615fa584b6f6041df7bf9,2024-08-22T12:48:02.790000 +CVE-2022-48910,0,0,c49907901e2444dc6fb276986d8fa7581490f1e186329d0375e706884b0faf75,2024-08-22T12:48:02.790000 +CVE-2022-48911,0,0,b66c8472f6855508ff6f6a7b1b64d3f2605476613ce462c2bb964595732f5764,2024-08-22T12:48:02.790000 +CVE-2022-48912,0,0,bc2a2daaa3b38a68e53fbf8d9c97ac70c6915414f0359c7ec4f2980ad0abde6c,2024-08-22T12:48:02.790000 +CVE-2022-48913,0,0,13c5f6805a21422f3cbdd0c8dd38766023838486158b2d75d57883e5de7b7695,2024-08-22T12:48:02.790000 +CVE-2022-48914,0,0,17a954177f70a24d9987d801118d084e4480c7c3850b7fa42f10a93117b17e59,2024-08-22T12:48:02.790000 +CVE-2022-48915,0,0,0b1fbcc9a6997478047f46007fdf7710031f4d070e9f8556b269c63077533d0f,2024-08-22T12:48:02.790000 +CVE-2022-48916,0,0,8f20ce1d1c5363f5f68e39b98839eaf52bfa07c01964cca89491dcdb59190093,2024-08-22T12:48:02.790000 +CVE-2022-48917,0,0,58439b65e36dbb2ade45a1620a3a14ca27906f33b947d1f0a9005280949a5eee,2024-08-22T12:48:02.790000 +CVE-2022-48918,0,0,a06ecdecdb3be4f4b6eb324472cfffcf7ceef19b2a53970b6146c71dc16cae1e,2024-08-22T12:48:02.790000 +CVE-2022-48919,0,0,7bfca989d0f16a5cbff28fbb03b7f902adac3eae36b615fa584b6f6041df7bf9,2024-08-22T12:48:02.790000 CVE-2022-4892,0,0,a02afb40fce024abebfb05a40298b81994dfc2b7567f3762fdb2b328cbdbe6a9,2024-05-17T02:17:01.897000 -CVE-2022-48920,0,1,b393f9096ec2dd749ea58d3cba07e0b6170f7ce1e47bde6c059e20f2b353f3a4,2024-08-22T12:48:02.790000 -CVE-2022-48921,0,1,565ba181b0f1f2dfc9fe72312b91e9931d175894bd53f2b2a8229bd70f9ca157,2024-08-22T12:48:02.790000 -CVE-2022-48922,0,1,485fd7b1352c6198add8f08095b571046478ed9662200df59a8f5eef93ca9987,2024-08-22T12:48:02.790000 -CVE-2022-48923,0,1,7c871d7f7fad4b7b8cc0fef537eadf3094068942b00174225e14cad2e67b8948,2024-08-22T12:48:02.790000 -CVE-2022-48924,0,1,e0bfb77d6c7b779c400d1b544938bf3cb6f80aae09edffc19024f5e7977cec33,2024-08-22T12:48:02.790000 -CVE-2022-48925,0,1,ff5926614a83baf0935fe0e95a03c9378350f3a649913fba8b288632dbffad29,2024-08-22T12:48:02.790000 -CVE-2022-48926,0,1,96fecd682b27cf2de3915a440e56df1865f27383d104b4ed458351fa9431ab6b,2024-08-22T12:48:02.790000 -CVE-2022-48927,0,1,a44e4b6ae745d40a786daa9c270c73173da73b553dac3a7d44f4764c34800a42,2024-08-22T12:48:02.790000 -CVE-2022-48928,0,1,f8e81bb3574539f8abb783ecf51d34de3de3e7ff77ae69ee3a320f5eff944b6d,2024-08-22T12:48:02.790000 -CVE-2022-48929,0,1,f4cda031ac7c4aa132b3cf10147d34cbd29cdba8e6462b4c07fea2241e6f5ce7,2024-08-22T12:48:02.790000 +CVE-2022-48920,0,0,b393f9096ec2dd749ea58d3cba07e0b6170f7ce1e47bde6c059e20f2b353f3a4,2024-08-22T12:48:02.790000 +CVE-2022-48921,0,0,565ba181b0f1f2dfc9fe72312b91e9931d175894bd53f2b2a8229bd70f9ca157,2024-08-22T12:48:02.790000 +CVE-2022-48922,0,0,485fd7b1352c6198add8f08095b571046478ed9662200df59a8f5eef93ca9987,2024-08-22T12:48:02.790000 +CVE-2022-48923,0,0,7c871d7f7fad4b7b8cc0fef537eadf3094068942b00174225e14cad2e67b8948,2024-08-22T12:48:02.790000 +CVE-2022-48924,0,0,e0bfb77d6c7b779c400d1b544938bf3cb6f80aae09edffc19024f5e7977cec33,2024-08-22T12:48:02.790000 +CVE-2022-48925,0,0,ff5926614a83baf0935fe0e95a03c9378350f3a649913fba8b288632dbffad29,2024-08-22T12:48:02.790000 +CVE-2022-48926,0,0,96fecd682b27cf2de3915a440e56df1865f27383d104b4ed458351fa9431ab6b,2024-08-22T12:48:02.790000 +CVE-2022-48927,0,0,a44e4b6ae745d40a786daa9c270c73173da73b553dac3a7d44f4764c34800a42,2024-08-22T12:48:02.790000 +CVE-2022-48928,0,0,f8e81bb3574539f8abb783ecf51d34de3de3e7ff77ae69ee3a320f5eff944b6d,2024-08-22T12:48:02.790000 +CVE-2022-48929,0,0,f4cda031ac7c4aa132b3cf10147d34cbd29cdba8e6462b4c07fea2241e6f5ce7,2024-08-22T12:48:02.790000 CVE-2022-4893,0,0,e5120248272b3a04098ac5e53563854b20f8eec46dd8a336f605680da692549d,2023-11-07T03:59:15.230000 -CVE-2022-48930,0,1,f4814afe4f8412d22f471d4b42c41a39289b07c6b527361cd94120f7cf64166c,2024-08-22T12:48:02.790000 -CVE-2022-48931,0,1,d5215ce4f6e7bf10dfe8eda34e306f21ac23decacbdf3e56afc51d77eb9002c5,2024-08-22T12:48:02.790000 -CVE-2022-48932,0,1,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf21e,2024-08-22T12:48:02.790000 -CVE-2022-48933,0,1,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000 -CVE-2022-48934,0,1,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000 -CVE-2022-48935,0,1,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000 -CVE-2022-48936,0,1,e5e6490031bd8ea6058d99325de9d6a29afe230573f54734a35addab474fa07c,2024-08-22T12:48:02.790000 -CVE-2022-48937,0,1,98eb258fb5480a0a64ad578f4d7d0745fa4dca07cb91f4b45bfd63f9aff98e4e,2024-08-22T12:48:02.790000 -CVE-2022-48938,0,1,966938e7530b15ebcc13eb90d4c2c84b75d163c5cb28b3caf3980b5de4d95ca5,2024-08-22T12:48:02.790000 -CVE-2022-48939,0,1,d87216561f7a780dc797ba3a4cd412fbc9fe7377390bfa15f8570e808e36ecb7,2024-08-22T12:48:02.790000 +CVE-2022-48930,0,0,f4814afe4f8412d22f471d4b42c41a39289b07c6b527361cd94120f7cf64166c,2024-08-22T12:48:02.790000 +CVE-2022-48931,0,0,d5215ce4f6e7bf10dfe8eda34e306f21ac23decacbdf3e56afc51d77eb9002c5,2024-08-22T12:48:02.790000 +CVE-2022-48932,0,0,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf21e,2024-08-22T12:48:02.790000 +CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000 +CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000 +CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000 +CVE-2022-48936,0,0,e5e6490031bd8ea6058d99325de9d6a29afe230573f54734a35addab474fa07c,2024-08-22T12:48:02.790000 +CVE-2022-48937,0,0,98eb258fb5480a0a64ad578f4d7d0745fa4dca07cb91f4b45bfd63f9aff98e4e,2024-08-22T12:48:02.790000 +CVE-2022-48938,0,0,966938e7530b15ebcc13eb90d4c2c84b75d163c5cb28b3caf3980b5de4d95ca5,2024-08-22T12:48:02.790000 +CVE-2022-48939,0,0,d87216561f7a780dc797ba3a4cd412fbc9fe7377390bfa15f8570e808e36ecb7,2024-08-22T12:48:02.790000 CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000 -CVE-2022-48940,0,1,6c2232d064008b51de41e3883361ae471cfa4d2baa265f94b3c9f5e081cb809f,2024-08-22T12:48:02.790000 -CVE-2022-48941,0,1,7c688a7c244fb68615ed7d5d279e538ad5249bed2a7dc9d2630d8d33ed1bdedb,2024-08-22T12:48:02.790000 -CVE-2022-48942,0,1,a81a7889c84bb2f83037b09e273a2b372457cf8542aa9c966659f5b1dd1186d9,2024-08-22T12:48:02.790000 -CVE-2022-48943,0,1,d7eecc45f74def44aad3b02137059c63161b61532700973d2208c6f9f55014f2,2024-08-22T12:48:02.790000 +CVE-2022-48940,0,0,6c2232d064008b51de41e3883361ae471cfa4d2baa265f94b3c9f5e081cb809f,2024-08-22T12:48:02.790000 +CVE-2022-48941,0,0,7c688a7c244fb68615ed7d5d279e538ad5249bed2a7dc9d2630d8d33ed1bdedb,2024-08-22T12:48:02.790000 +CVE-2022-48942,0,0,a81a7889c84bb2f83037b09e273a2b372457cf8542aa9c966659f5b1dd1186d9,2024-08-22T12:48:02.790000 +CVE-2022-48943,0,0,d7eecc45f74def44aad3b02137059c63161b61532700973d2208c6f9f55014f2,2024-08-22T12:48:02.790000 CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000 CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000 CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000 @@ -216811,7 +216811,7 @@ CVE-2023-22695,0,0,b5917e5149b915696badd85daf09f72e8639a5436da286f9d7651eb863e4d CVE-2023-22696,0,0,bb60c4afa6f619bda4d5f258a4840b89ee1307f2674bc8e9c2e7e703c8675d12,2023-05-16T21:25:22.240000 CVE-2023-22698,0,0,1a5709eb80cfb92bd3ed92b38627c6a737191cd821464eb362bbeed514a39398,2023-04-28T03:44:28.200000 CVE-2023-22699,0,0,a7441b107bb264286416ed9d3fc434137df8e7d7758dc3d857f27ab189400997,2024-03-25T13:47:14.087000 -CVE-2023-2270,0,1,a1057111ea3073789a593113e36ff471e6ef293e8ab3004bb6fd2a7a1c0a7565,2024-08-22T13:15:04.820000 +CVE-2023-2270,0,0,a1057111ea3073789a593113e36ff471e6ef293e8ab3004bb6fd2a7a1c0a7565,2024-08-22T13:15:04.820000 CVE-2023-22700,0,0,d586af827018cfbff4045d3523910576297d96f4f073b1fccd400c4610496028,2023-11-07T04:07:15.027000 CVE-2023-22702,0,0,3fdc269bc0f2a2b6c3e8672df60be4c04280e7338add33548788771bfb76b8e0,2023-11-07T04:07:15.113000 CVE-2023-22703,0,0,28370d95808961d9d26f0ad096967a2e0a9fe95a84fa61cab7f30dc849d56606,2023-05-22T17:12:55.480000 @@ -217882,7 +217882,7 @@ CVE-2023-24062,0,0,7349391aa1b91dc2f7dd35a217ddf473498cadeb29f5897b6dc518a785304 CVE-2023-24063,0,0,c7aaa53e06b05b465c4c303b4d1d80d1b86df5b05165165b121a99c122768787,2024-08-19T19:04:47.293000 CVE-2023-24064,0,0,ea608bd85f328e25ad346566e820e40989eae34a1962a7913afeb3fd2bab99c5,2024-08-19T19:04:26.627000 CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000 -CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000 +CVE-2023-24068,0,1,efa89cea43eacdbe090acdc4021643fdac80fc9f7fb2eacafd76af63322c0b8f,2024-08-22T15:35:03.853000 CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000 CVE-2023-2407,0,0,4e7522c024a3236b8f81276c0b7a8a72f2eafc2c8b2dbc8b1918850286948fce,2023-11-07T04:12:37.020000 CVE-2023-24070,0,0,a03e8a943e32b6cd457e58b59335ffecc5d8fc731aaf6b71cf658947deaef048,2024-01-09T02:55:33.710000 @@ -219600,7 +219600,7 @@ CVE-2023-26208,0,0,6d0f4dc6d724abcb907704fe533b579a8e93c30a273129ba89479b697be9d CVE-2023-26209,0,0,7d59b19062f3260362329b8fb9d5c15b2ae02a8836d5bca5cb172fc8c782b133,2023-11-07T04:09:30.447000 CVE-2023-2621,0,0,7f94a2689b6229804f06a0491733acc8b775ae9f925cf1e972b069fef12e261e,2023-11-08T20:24:04.207000 CVE-2023-26210,0,0,99c2d6b2b1b10e12d31bdc0b224bc3d023d9d7cc443b37d4e2e13fe1d6018bbf,2023-11-07T04:09:30.613000 -CVE-2023-26211,0,0,0353f969282fdc23b27a4dd6f4be6f94b38022f67eebb6b9ee9530e78b8ed6b6,2024-08-13T17:11:53.553000 +CVE-2023-26211,0,1,5a263dd7d2e3150aad12bb103fa2fbf5877e875e68ee83bc46d00b52837b4027,2024-08-22T14:33:54.453000 CVE-2023-26213,0,0,9fca21a4f0ef9105b70445769c776c24e65be74243dac24bc6ee96342368114c,2023-03-10T14:53:13.973000 CVE-2023-26214,0,0,9e7b174c5aaea2917c7d88fd07688e669455d4f2f30624879fd03413171a17b0,2023-03-02T18:26:30.863000 CVE-2023-26215,0,0,79741706e0402cd903a56cce97eb88259c18de371ac6ef6ea150277ca6ac8145,2023-06-01T20:34:27.187000 @@ -222570,7 +222570,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000 CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000 CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000 -CVE-2023-29929,0,1,6e328a7115739fc9a6f658723a1504ea401ff9bc6fd40aaaaf4e9cf810b89bd4,2024-08-22T12:48:02.790000 +CVE-2023-29929,0,0,6e328a7115739fc9a6f658723a1504ea401ff9bc6fd40aaaaf4e9cf810b89bd4,2024-08-22T12:48:02.790000 CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000 CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000 CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000 @@ -230197,7 +230197,7 @@ CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec05 CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000 CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000 CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000 -CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000 +CVE-2023-40110,0,1,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000 CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000 CVE-2023-40112,0,0,4ddec6ab2662940b93a3dc42430a4fadcac48159b9ef1e91d81653103c488b43,2024-02-16T13:37:55.033000 CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000 @@ -231623,7 +231623,7 @@ CVE-2023-41915,0,0,eb4af7dc255b20820c2223dbb394a71a5ac4fe4f18ba74d3375c99078da8c CVE-2023-41916,0,0,6b34ea5d9b717fe7b3229f20e3b3555c4c2b60ad9d42b075d34a5ff3a8572cc7,2024-07-16T18:06:13.463000 CVE-2023-41917,0,0,f3161e8d6c620e45be8c901747b972f5e1c375ee92e6d63bc7e00bef339a5387,2024-07-02T12:09:16.907000 CVE-2023-41918,0,0,0856e5fa41285db5b029ff0214e8d51ede0087304c24a711546183f0175c9d9e,2024-07-02T12:09:16.907000 -CVE-2023-41919,0,1,f8d35904c25a74a26f55998c96c61a6b3450167ea33b5f8e9817a25e2f0baf6f,2024-08-22T13:44:19.347000 +CVE-2023-41919,0,0,f8d35904c25a74a26f55998c96c61a6b3450167ea33b5f8e9817a25e2f0baf6f,2024-08-22T13:44:19.347000 CVE-2023-4192,0,0,b2cba7a400850bcefaf038a201054703a1f389a9c415fd37d13b2654a5f7d6d1,2024-05-17T02:31:25.590000 CVE-2023-41920,0,0,f99f28378501ba77833478b3317263646d41fe7c60021dbbc2409955fd4a63d6,2024-07-02T12:09:16.907000 CVE-2023-41921,0,0,85da7b95ea0791c0dcc258e060fd4dfad3edf939d208c0566032631c2404b5dc,2024-07-02T12:09:16.907000 @@ -232393,7 +232393,7 @@ CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43 CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000 CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000 CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000 -CVE-2023-42945,0,0,a06b1aec09c4d06c83c2ecc43e93c97ac1de84ec55101d5962c5f9ba2c7586a9,2024-02-22T19:07:27.197000 +CVE-2023-42945,0,1,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000 CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000 CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000 CVE-2023-42948,0,0,e60e6a270a4159f47177637c1f0213b5b06987cbaccbf7c2b067805f6ba007e7,2024-08-12T15:43:25.587000 @@ -235263,7 +235263,7 @@ CVE-2023-4723,0,0,a7b5d9fe62bfe417bf7a01ca914351b9a139cb64decca1c52b45f88bca778b CVE-2023-47230,0,0,8c9ea53aeba7fb8dc01a6d3d446631ba61b08e735e3638033e92bc7eff978922,2023-11-16T23:42:46.737000 CVE-2023-47231,0,0,0e56d6a53e9dffcad55f29918057657f20586c9cd9de1621fecc7e52cf2c944b,2023-11-15T16:21:11.800000 CVE-2023-47233,0,0,6a6dbaf8f067fa8b9ee025869bebffd314b509a9e4a321b94211adf000ea7deb,2024-06-27T13:15:52.623000 -CVE-2023-47234,0,0,27d98418da39b1b8478d0068b18a3ae859609b992f5d9490cc9a1de888a7f54d,2024-04-28T07:15:08.703000 +CVE-2023-47234,0,1,c0b750c83f29ad2eb543e31817525b502e810fc43a7032b6a3e3b95afaf2d447,2024-08-22T15:35:04.480000 CVE-2023-47235,0,0,b75caa87f8a3a2600e2a80e9d7122ca67645d01789e6d8aacfb2b04849ef8ebd,2024-07-03T01:42:11.777000 CVE-2023-47236,0,0,b3e204de76f54e6e3f6ebb929e777f0a8ba1d0aae0254c73ae685244df53a883,2023-12-28T20:07:16.600000 CVE-2023-47237,0,0,3ebc1ce6a5413647a9dd520607d2ca86d15d269ba64f5051655b2d6b2994c39a,2023-11-15T02:25:41.300000 @@ -238754,7 +238754,7 @@ CVE-2023-52372,0,0,15bf2071dc5da824a9df6bfd38af92c18dd9fd6f2d339d50b05268dc8c69c CVE-2023-52373,0,0,b688042e235deab3885c2fa0dca42afdbe734d6e8b4da6930a3ca13df8c7b884,2024-02-20T19:50:53.960000 CVE-2023-52374,0,0,c3e1b0b58b2485371f036ee611aa6749f15d30b59aa2e7e645694aa3a34e19b3,2024-02-20T19:50:53.960000 CVE-2023-52375,0,0,8b1124f491eac6a9625ff675ba683400b5b7d3f23a913d0d79196202d05c38ba,2024-02-20T19:50:53.960000 -CVE-2023-52376,0,0,966c0b9afbf77fef7dc680bf9065060f324b30ed0f773f88e03a29b8b0b46d13,2024-02-20T19:50:53.960000 +CVE-2023-52376,0,1,83a4ff733e5d799164c7ebb5fc1c6d2bc436056e3b5dd111bbf28970a41696b3,2024-08-22T14:35:03.367000 CVE-2023-52377,0,0,b7bb8dcb6ccf72aa22b68fe6a7295a9e9583539669264335e5baefdd8fb2b023,2024-02-20T19:50:53.960000 CVE-2023-52378,0,0,7d972f87df9155825bdca8688e6d1bd2426c7da77f9fdbba23cf94fc02560c06,2024-02-20T19:50:53.960000 CVE-2023-52379,0,0,93b64dbad4e7209449b731f7d3e953f0a7c364b7d5a6a5a8e4913ba277d5b0b1,2024-08-01T13:45:38.070000 @@ -239524,7 +239524,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000 CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000 CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000 -CVE-2023-5517,0,0,26e3e6fafe454abaf4b4ad12726b9973f42b178b2b11bba1c8c43796396e7f70,2024-05-03T13:15:20.990000 +CVE-2023-5517,0,1,092f5a23d77e754c9b42cabd4ac07b9f18ffe376c4c7e384c57bdabfb0330954,2024-08-22T14:35:04.137000 CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000 CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000 CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000 @@ -241107,7 +241107,7 @@ CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d90 CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000 CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000 CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000 -CVE-2024-0038,0,0,ea347078d5115696feec8ec271b749eacff96a2d3bca9777e248043aee98fcbc,2024-02-16T13:37:51.433000 +CVE-2024-0038,0,1,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000 CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000 CVE-2024-0040,0,0,cb768c0c56422d8be59b8ead41b2abde5abcab3c6641c5456375c74ed8738c47,2024-08-01T13:45:55.990000 CVE-2024-0041,0,0,b813d6bcf6c48b25cab056ec33aebf10f8835e0ad83b4b9b3e3dda0209c4933b,2024-02-16T13:37:51.433000 @@ -243102,7 +243102,7 @@ CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000 CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000 -CVE-2024-20417,0,1,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 +CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 @@ -243115,12 +243115,12 @@ CVE-2024-20450,0,0,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35 CVE-2024-20451,0,0,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000 CVE-2024-20454,0,0,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6ed1,2024-08-07T19:09:46.290000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 -CVE-2024-20466,0,1,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000 +CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 CVE-2024-20479,0,0,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 -CVE-2024-20486,0,1,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 -CVE-2024-20488,0,1,fc6ca65423793d813adb7786a7f4f54ac29768af74ad6292f06d6517e15ea15f,2024-08-22T12:48:02.790000 +CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 +CVE-2024-20488,0,0,fc6ca65423793d813adb7786a7f4f54ac29768af74ad6292f06d6517e15ea15f,2024-08-22T12:48:02.790000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 @@ -243924,7 +243924,7 @@ CVE-2024-21505,0,0,ac0ac0b92aa442242744d7f06340b74d855d239685d011ca9f10bc456a81b CVE-2024-21506,0,0,0501aa9e15543c672d3de96d3e8d3d0c1c21afb2e19e663e8d9159c8a48b6b13,2024-06-05T15:15:11.173000 CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15ce9,2024-08-01T13:46:44.883000 CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000 -CVE-2024-21509,0,1,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000 +CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000 CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000 CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000 CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000 @@ -244090,7 +244090,7 @@ CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214 CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fccbe,2024-06-13T18:36:45.417000 CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000 -CVE-2024-21757,0,0,dad59f553668d8465c8ff77bb9e41235e6f40562131ee80a7115a635475146c0,2024-08-13T17:11:53.553000 +CVE-2024-21757,0,1,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000 CVE-2024-21759,0,0,6a61d7cb7523f60aeda71efe4ce4dc64f1500a7a1399f02108eff6d901e5e1da,2024-07-09T18:18:38.713000 CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000 CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000 @@ -244454,7 +244454,7 @@ CVE-2024-22239,0,0,9ea71bafa19cd131168ec7436d9ae98e5c9a50c32fb4550df539f9890cb5c CVE-2024-2224,0,0,b7ed9c2b9de420f7dfef45eac495d93dd8573ef5087b0e0970c5333ab24ff4be,2024-04-10T13:24:22.187000 CVE-2024-22240,0,0,d7299eca430a3db2169c91a2dcf2392e54a6cf25183980860f34a8511f88e9e1,2024-02-10T04:11:57.463000 CVE-2024-22241,0,0,43dae529a9c9ad0aafe69e774734bac33e826cd26512a1ce15473d96a6d6b08b,2024-02-10T04:11:46.267000 -CVE-2024-22243,0,0,90ca5a82d477941dd2956b1967ed67005d8f946e08ee126e4e1b2583a16735ff,2024-06-10T18:15:25.757000 +CVE-2024-22243,0,1,72bca4806f3b46de2a1156654366dff0ac55a619786286afeabc5852a2a6c520,2024-08-22T15:35:05.027000 CVE-2024-22244,0,0,eedd59a55d37d004f47a47d330c84ea460b68618fc0176589f1e06dacf7dd073,2024-06-11T13:54:12.057000 CVE-2024-22245,0,0,b849e44010c7e6432b450e48e41da9a7dd3343f7e5f0bfd8d7ff7052eea57b33,2024-08-01T23:15:31.903000 CVE-2024-22246,0,0,76171b54a9144a796e871026656a5c18298d50d46b7b4fd57d1a0e8c44956850,2024-07-03T01:47:08.260000 @@ -245199,14 +245199,14 @@ CVE-2024-23462,0,0,89eee1bc8417ec5c165498a10c45118559ef0ab7b53f75c35dd8c8aeefb82 CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d98980c9,2024-04-30T17:52:35.057000 CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000 CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000 -CVE-2024-23466,0,0,63423335f501e582f6269fc9353787aeb4dadd9ceac96da8594c28144e574628,2024-07-18T12:28:43.707000 +CVE-2024-23466,0,1,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000 CVE-2024-23467,0,0,5c86ed0c4cd13fd5925dd08e4b0d9d462c31ba7560e982c8660271250292a002,2024-07-18T12:28:43.707000 CVE-2024-23468,0,0,7442e7a1f95905e4c846579344b9b898257e33405e23ada18e8a7677ffa37903,2024-07-18T12:28:43.707000 CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000 CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000 CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000 CVE-2024-23471,0,0,fe11efd17d8239a398506b0c207c833c4f64b5421ad9bbfff0c7a3f2189764bd,2024-07-18T12:28:43.707000 -CVE-2024-23472,0,0,9a4b2e7518963b9428772791dd10c9920fae883a7f99eac490a84e4c123ba003,2024-07-18T12:28:43.707000 +CVE-2024-23472,0,1,121ca4221b4eb99e581b7a9e5e1e275d159863d781beeaa8fc9490d7cd94a082,2024-08-22T15:59:11.740000 CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000 CVE-2024-23474,0,0,5b83eda1571f8d586afa7fdf61e84b7ee80ad4b928c31e2fb19bed55c0b0f5c1,2024-07-18T12:28:43.707000 CVE-2024-23475,0,0,c393da98bbb9d83c6eda41c7438e97e9e7abcbedc909c6a49411cef32a15193c,2024-07-18T12:28:43.707000 @@ -245968,7 +245968,7 @@ CVE-2024-24740,0,0,055e621299fb8cfa25051c1c9b5b6e90ccf0de6c197861466b8c657e95fd4 CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000 CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000 CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000 -CVE-2024-24746,0,0,defb0ef90b2139aa53bf339236fc77bf79326f67417ba29c5ac9186485b8b499,2024-05-01T18:15:14.767000 +CVE-2024-24746,0,1,40e7bceff1c25e6b9953ddd3810454050ac129de5e60f835bc00a18b7d10c7b8,2024-08-22T14:35:07.450000 CVE-2024-24747,0,0,c7102f6cbbbb54dbf174b4ec9b33188c1d6a88ca038e451e81aa538a223d6e72,2024-02-09T15:18:00.510000 CVE-2024-24748,0,0,5f49ffc2835721d9b1ffe4198862561f4a25b7f09882de4d4811a0ddce7110f1,2024-03-17T22:38:29.433000 CVE-2024-24749,0,0,38d4307753926d528fb1dee6ba588b6843344e7264e3e2eed6b33ca60b1a13c5,2024-07-01T16:37:39.040000 @@ -246599,7 +246599,7 @@ CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000 CVE-2024-25637,0,0,6b107052af4924b87ae030a7574b9b21f62a146f03952919ea9b1d4b0e21ed3d,2024-06-27T12:47:19.847000 CVE-2024-25638,0,0,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000 -CVE-2024-25639,0,0,2e0133ad446d332cd68f57f778e89c8682ede3319349a698b825e88d07ce11db,2024-07-08T15:49:22.437000 +CVE-2024-25639,0,1,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf568353474b7,2024-08-22T14:59:56.757000 CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000 CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000 CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000 @@ -248664,7 +248664,7 @@ CVE-2024-28197,0,0,ebbb24c53b214da61c59aa1ed3fd40540422fb963b886ee042ae1143b19df CVE-2024-28198,0,0,478780fd06156bb317c277271c317897bdf49ef10b75d957b6978fee8df3f074,2024-03-12T12:40:13.500000 CVE-2024-28199,0,0,f82035624a0dd113a6f9a403dbf859b5c93aae6b204d264d2f86fe2f7beae2a7,2024-03-12T12:40:13.500000 CVE-2024-2820,0,0,e6da693a8f1a842c7812c843359506e760cdf3aeb2d5913e84708f1d3b4168fa,2024-05-17T02:38:32.343000 -CVE-2024-28200,0,1,848f47156b7dea97a9f192a57ecb65c4366a740aa5ada8f7c8eccf77e8193637,2024-08-22T13:36:13.033000 +CVE-2024-28200,0,0,848f47156b7dea97a9f192a57ecb65c4366a740aa5ada8f7c8eccf77e8193637,2024-08-22T13:36:13.033000 CVE-2024-2821,0,0,c2b44894dd7f88b2b849e5ba19097fd13ba6654511fb9e687a8b00c577041545,2024-05-17T02:38:32.443000 CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9650,2024-08-05T20:35:06.830000 CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000 @@ -249099,10 +249099,10 @@ CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808 CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000 CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000 CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000 -CVE-2024-28987,0,1,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000 +CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 -CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000 -CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000 +CVE-2024-28992,0,1,dcb8c493077168591aebe4d60d7719870f581d45ce48e73108abe9067fb629eb,2024-08-22T15:56:58.207000 +CVE-2024-28993,0,1,9c5125da7327315f017a58b350f8b638b25e9c0dcede224162aff682993b7d59,2024-08-22T15:54:56.087000 CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000 CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000 CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000 @@ -249882,7 +249882,7 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000 -CVE-2024-3016,0,0,de2146827057d4173ad33d38353b5e127fb8228c688e81e98737f0f3b35e8a6f,2024-05-14T16:11:39.510000 +CVE-2024-3016,0,1,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000 CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000 CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000 @@ -250134,7 +250134,7 @@ CVE-2024-30414,0,0,e64c669e53c2987f3547fe2d3f570a685cb932dd6dc71edd2e9b0531a95f3 CVE-2024-30415,0,0,f281fed7c3faa7dc041e240ec4e6ac1c46962cc31332fe749fb4d64177e3d2e4,2024-04-08T18:48:40.217000 CVE-2024-30416,0,0,d291744711f1dbb5817510d2d6fc5de3fe8fd84c6a61838c148f9e7cfacc8058,2024-08-01T13:50:07.780000 CVE-2024-30417,0,0,454137694c003758247b4c0acabe990dae4347bce9b044c8ece06c3d4e475793,2024-04-08T18:48:40.217000 -CVE-2024-30418,0,0,1df5cc20895f4454a18a9db65101208a879bcf1e74b024a952998a5645fb82f8,2024-04-08T18:48:40.217000 +CVE-2024-30418,0,1,dd8da8af4bd8164eb1f999131e29375420efd11048e6bd1ecc6b7ea8936ad00d,2024-08-22T15:35:05.833000 CVE-2024-30419,0,0,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000 CVE-2024-3042,0,0,b51852dae1f5eba8e99dd3aba03255977b2f1344b1da87286dbd9f450156442b,2024-05-17T02:39:41.680000 CVE-2024-30420,0,0,c7aa765232ba482242d297cfff54623d69e480ef9ec026f910cf7643167f5bd5,2024-08-19T20:35:12.223000 @@ -251334,7 +251334,7 @@ CVE-2024-3222,0,0,57632d7e58038bae9be25dcea3482f307de0a31f331213554dd2d325ef2109 CVE-2024-32228,0,0,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000 CVE-2024-32229,0,0,46cfde26330a35dd5af3aef05c7164d23baa98664713e164e4ba017a64475da0,2024-07-08T14:18:28.213000 CVE-2024-3223,0,0,ea7ad0974e81e86878848176b870b25d4ede66377ba0daa6f895cdaeb06d9607,2024-05-17T02:39:47.627000 -CVE-2024-32230,0,1,4b1256fc34c85ba913ebeb5578bba52040a1b8980ff138f27db5cea5a8c9e8e4,2024-08-22T13:24:40.597000 +CVE-2024-32230,0,0,4b1256fc34c85ba913ebeb5578bba52040a1b8980ff138f27db5cea5a8c9e8e4,2024-08-22T13:24:40.597000 CVE-2024-32231,0,0,e3ff33887d60df14bdea85ccf477fb1420b52bde0ed776b8984f5e679a5e1a71,2024-08-19T13:00:23.117000 CVE-2024-32236,0,0,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000 CVE-2024-32238,0,0,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000 @@ -251920,7 +251920,7 @@ CVE-2024-32931,0,0,9326e9f8b392349334a86865ecc959dc7773de2f71f9497f72eb74e7b458d CVE-2024-32932,0,0,4fb6f83f101b5683d5a8c45180e3a23cd3f8e2d3acfb194a28f95ea68de1746c,2024-07-02T17:44:45.700000 CVE-2024-32936,0,0,23e0b37e344ddd92e30dd7d9ca686ba35ea7eca4cd8b4bf43262492fe54966c0,2024-06-24T19:26:47.037000 CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743878,2024-07-05T12:55:51.367000 -CVE-2024-32939,0,1,11e80ba2575da64eea1e59fabb5af0f80cf4de4d72cd6e77bcf2884a55e98e75,2024-08-22T12:48:02.790000 +CVE-2024-32939,0,0,11e80ba2575da64eea1e59fabb5af0f80cf4de4d72cd6e77bcf2884a55e98e75,2024-08-22T12:48:02.790000 CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,4fb2f2be57e3c45f28985f6208cc39a6b7c152924d34534ee51269b999eeb2f4,2024-05-28T12:39:28.377000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 @@ -252732,7 +252732,7 @@ CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a2 CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000 CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd8dc,2024-05-14T16:12:23.490000 CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 -CVE-2024-34226,0,0,ee0bf03dfbb7276f0e585da87dd55a8f54aaadf529a97ab40343d543468cb68c,2024-05-14T16:12:23.490000 +CVE-2024-34226,0,1,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000 CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000 CVE-2024-34230,0,0,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000 CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000 @@ -253278,7 +253278,7 @@ CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9 CVE-2024-35116,0,0,a563a8223baddb703f5fd1f07e904d7e927e5f21b3c89fcbd6f74db44a319ee0,2024-08-21T14:46:12.917000 CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 -CVE-2024-35124,0,1,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000 +CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 CVE-2024-35136,0,0,7ce7700127cc7b6ccc2ab53565555e162fb44eed59671a9c3566dce17204010c,2024-08-15T13:01:10.150000 CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000 @@ -253288,7 +253288,7 @@ CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794 CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000 CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 -CVE-2024-35151,0,1,380c3880e2cf7167b57192ea0a62886feb3d1fb9781e130286f4e29cc6acc88c,2024-08-22T12:48:02.790000 +CVE-2024-35151,0,0,380c3880e2cf7167b57192ea0a62886feb3d1fb9781e130286f4e29cc6acc88c,2024-08-22T12:48:02.790000 CVE-2024-35152,0,0,b41d5d8fb05afbf50d1ef06fd658b7850273eedb06cda6e29568f6ff2e26d7a2,2024-08-15T13:01:10.150000 CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000 CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 @@ -253456,7 +253456,7 @@ CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125 CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000 CVE-2024-35384,0,0,80c459d6b8b92f35efd27c83c865d17dc86005bdbc1e6e04541d28ddd40786f0,2024-08-01T13:52:39.203000 CVE-2024-35385,0,0,398a0815629caee79e0ed577c05dcef42bd37c568d9a41ae8597fc88574b3380,2024-07-03T02:01:39.520000 -CVE-2024-35386,0,0,0d71ba29986ccea865e900a0b900b22bba600b21e14a5ae1918159d6fb15df4c,2024-05-21T16:54:26.047000 +CVE-2024-35386,0,1,2a720bc530e0efacea62f463c2514e39604e38d3d34515573bee595bfa4c9346,2024-08-22T15:35:07.413000 CVE-2024-35387,0,0,c15fdfd7d84f50c783e9e09361abe37993b474b133a90ed661a9f7fadb59afd8,2024-07-03T02:01:40.300000 CVE-2024-35388,0,0,830a86b36926f5e0687c6d41178a5d819df1e34c94732e02a8d2ad4cef75400a,2024-07-03T02:01:41.110000 CVE-2024-3539,0,0,187a49c7d3510ecfca5f59edc68d9b81cca1aa600a7ff6a291f1b4fc3dfb6d98,2024-06-26T18:15:15.653000 @@ -254275,7 +254275,13 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046 CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 +CVE-2024-36439,1,1,552cc6bf9f3a854c35497dfa977c3d093556dbdf2425977771abb27b0df0b30f,2024-08-22T15:15:15.883000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 +CVE-2024-36440,1,1,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000 +CVE-2024-36442,1,1,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000 +CVE-2024-36443,1,1,6b41f9be21c37101e04a2af5bcb1ed0de69466c478ef5ba6e2afaead6470be36,2024-08-22T14:15:08.443000 +CVE-2024-36444,1,1,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000 +CVE-2024-36445,1,1,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000 CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000 CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 @@ -254319,7 +254325,7 @@ CVE-2024-36500,0,0,32af1afd4bbbe42fa4488d4c1e5cc6ce476ad041bd1fdba49949cbef0ad81 CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc1e8,2024-07-16T16:25:49.413000 CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000 CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 -CVE-2024-36505,0,0,47b91e9f770848829fdb796215d6588f3aee41b7ab32e37ff03a4c466180e874,2024-08-13T17:11:53.553000 +CVE-2024-36505,0,1,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-36518,0,0,064cad3de67032c4f830b8ce3196cfd8df79e51094d50317231dcf250dd1a617,2024-08-12T13:41:36.517000 CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000 @@ -254427,7 +254433,7 @@ CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d4 CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000 CVE-2024-36773,0,0,720de74f1ee0644bf544aa650aaafc650bba06adb51118d8aad2d248b0937337,2024-08-02T17:05:08.087000 CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000 -CVE-2024-36775,0,0,f07b67642f75fd9d913fa22115fe66980fe2b4386b82775fae07bc9d05d87899,2024-07-16T14:20:42.573000 +CVE-2024-36775,0,1,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000 CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000 CVE-2024-3678,0,0,469a9707bf4a10787b83dfdbba79cfb824cfe86b743e31553512cd5fa81bcd6d,2024-04-26T12:58:17.720000 CVE-2024-36782,0,0,a26ba637b3d65bc93f6cef8eab2e486cb22e0f173ff0b09ffa5f5054e7e91e9a,2024-07-03T02:03:36.797000 @@ -254802,7 +254808,7 @@ CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e786480 CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000 CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000 CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14628,2024-08-05T12:41:45.957000 -CVE-2024-37287,0,1,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 +CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000 @@ -255559,8 +255565,8 @@ CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a3 CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000 CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000 CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000 -CVE-2024-38501,0,1,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000 -CVE-2024-38502,0,1,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000 +CVE-2024-38501,0,0,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000 +CVE-2024-38502,0,0,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000 CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000 CVE-2024-38504,0,0,4c5e9d4e31ce363d990483052f136d892b9e9d476c16b9ba9ffe4f7ab7d68bdb,2024-06-20T12:44:01.637000 CVE-2024-38505,0,0,b17f43381c815e52625008a26f98d511f617e1d606d0689fa471d4457a2ae811,2024-06-20T12:44:01.637000 @@ -255644,7 +255650,7 @@ CVE-2024-38576,0,0,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362 CVE-2024-38577,0,0,4c84519c5a14d83bf1e1afda58945cc2b4924597691a0e5a8782c751132e779f,2024-08-01T20:13:24.763000 CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000 CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000 -CVE-2024-3858,0,0,d11e2dcbca33c3f05cbcbfaae57c5af41c33fe71a136462d5a229c7addfc2568,2024-04-17T12:48:31.863000 +CVE-2024-3858,0,1,dd053838f3e277a81d969816e65a4f781c68054bd6d54d527d61add36147e05e,2024-08-22T15:35:08.807000 CVE-2024-38580,0,0,f767d8c72e121e64fa886da74166c0eb1f56d7af5ff19f167059ca44868c4cb6,2024-06-20T12:44:01.637000 CVE-2024-38581,0,0,163d2599f0d04bac3fcda8729bc91618b1a33a7c58994982f4ff41f06afb0603,2024-08-01T20:12:00.623000 CVE-2024-38582,0,0,5bf2ab3765292126c7b2b3caf98adbacc937c1d69982e23478c39937ea0c9383,2024-07-15T07:15:10.780000 @@ -256018,7 +256024,7 @@ CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000 CVE-2024-39306,0,0,8e446f8cd38382555b776a84edd1102287cdb22d9e95652344c53f12d26a921f,2024-08-19T14:15:22.423000 CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000 -CVE-2024-39308,0,0,9b87f813f1d0c3d047f0b3cb0fa602208ca4159a3cdabc0e55a7e199b0ded98f,2024-07-08T15:49:22.437000 +CVE-2024-39308,0,1,391a33c40d65efbb21a3e72856c5b6e7c78acfc8a536f5e714b7e384392790dc,2024-08-22T14:22:34.320000 CVE-2024-39309,0,0,136c09ae402132cc087ad5758d406eac21c47491362259de052db9baf065bd3e,2024-07-02T12:09:16.907000 CVE-2024-3931,0,0,dc3222ede6dc2fc1538ac21332ba32552f7a481ab27e70085114f0462848e6c7,2024-06-06T20:15:13.933000 CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000 @@ -256149,7 +256155,7 @@ CVE-2024-39482,0,0,2e53f7f56d22a34ce6ad819626880e479ce6053c61a068f9f1a515a60263c CVE-2024-39483,0,0,d36581a3f952605fa4deddb55b42f749ee06fd7a8fd95b57c25fb72ba28ba332,2024-07-08T18:00:08.430000 CVE-2024-39484,0,0,a445c76503df3c2b08ea3e5bff9e0551e6280c35730c3d8354635c9d4c9c04c5,2024-07-08T18:01:56.137000 CVE-2024-39485,0,0,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000 -CVE-2024-39486,0,1,53993c58f90918b7c97876ffca7dc269893e47fb56c6e517d9e82dcf2f998636,2024-08-22T13:48:52.847000 +CVE-2024-39486,0,0,53993c58f90918b7c97876ffca7dc269893e47fb56c6e517d9e82dcf2f998636,2024-08-22T13:48:52.847000 CVE-2024-39487,0,0,07f5386c1bdf0075b39a52e9355dbebed54d46b5a78637d307e6a04462c33cf2,2024-08-21T17:18:01.117000 CVE-2024-39488,0,0,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000 CVE-2024-39489,0,0,c63175d29bd941720feca94efc3f3a1164cbdc8d8d5c1251ffb632e82e90379f,2024-07-31T14:50:26.330000 @@ -256231,7 +256237,7 @@ CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd780649 CVE-2024-39570,0,0,477f2cc2b899254fd1996622a7d04056a7ae423def8bf935cbc64caf51d26e12,2024-07-09T18:19:14.047000 CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff34f,2024-07-09T18:19:14.047000 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 -CVE-2024-39576,0,1,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 +CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000 @@ -256345,9 +256351,9 @@ CVE-2024-39740,0,0,03acc910317a10fe912464b7efeeb485740a2ca83e55d3c05a65c84915618 CVE-2024-39741,0,0,829c9dc10ec61ebda2ab0b49cc6a9c5e79410be7630ee14de90c81590961617f,2024-07-16T14:03:33.243000 CVE-2024-39742,0,0,d2c383b6f83715e80ad86c53a5952b482038888e11ae903f4721eb34788c653c,2024-08-07T16:08:52.997000 CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc129,2024-08-07T16:10:15.813000 -CVE-2024-39744,0,1,0661d6019507664d10c4b717683438c5d079f28b35dfbeb05107ecc28c082587,2024-08-22T12:48:02.790000 -CVE-2024-39745,0,1,a50367fdbf2df652a9fdb73419a9d966ebef321c155b9932df6fdc66bbd5af76,2024-08-22T12:48:02.790000 -CVE-2024-39746,0,1,0e20ca81d9d325bdeee73b70da8ce4b47d626b09ef1d79c40ba99deb3dbd446d,2024-08-22T12:48:02.790000 +CVE-2024-39744,0,0,0661d6019507664d10c4b717683438c5d079f28b35dfbeb05107ecc28c082587,2024-08-22T12:48:02.790000 +CVE-2024-39745,0,0,a50367fdbf2df652a9fdb73419a9d966ebef321c155b9932df6fdc66bbd5af76,2024-08-22T12:48:02.790000 +CVE-2024-39746,0,0,0e20ca81d9d325bdeee73b70da8ce4b47d626b09ef1d79c40ba99deb3dbd446d,2024-08-22T12:48:02.790000 CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 @@ -256359,7 +256365,7 @@ CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 -CVE-2024-39810,0,1,8ffe6106cd3f81e6397f53ddc73e570adbc9f3eccdaec8333407da88229b5c23,2024-08-22T12:48:02.790000 +CVE-2024-39810,0,0,8ffe6106cd3f81e6397f53ddc73e570adbc9f3eccdaec8333407da88229b5c23,2024-08-22T12:48:02.790000 CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2cc8,2024-08-20T17:14:18.587000 CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000 CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000 @@ -256376,7 +256382,7 @@ CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f3 CVE-2024-3983,0,0,96266c916334fb5a02e4aa53ae15055a84c8153845733e53311fdb712a51a549,2024-08-01T14:35:11.540000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-39832,0,0,6234d17b9478f93b770d730f2c819b00d4af0dd333bfbc3cf8b2152550951f28,2024-08-01T16:45:25.400000 -CVE-2024-39836,0,1,870699baa42666cb61b0f053e07cca54b7f29f07a2740a233a926d9e677f37c3,2024-08-22T12:48:02.790000 +CVE-2024-39836,0,0,870699baa42666cb61b0f053e07cca54b7f29f07a2740a233a926d9e677f37c3,2024-08-22T12:48:02.790000 CVE-2024-39837,0,0,c60120742f41154fefe3eaf4e38584ef459a2d1a28dab13e5a0225dc3e52fb1e,2024-08-01T16:45:25.400000 CVE-2024-39838,0,0,f1d266ac929ac8ff4f1b378f7710d38ca9858e2e9c50d8f3f7b866349ff32783,2024-08-05T12:41:45.957000 CVE-2024-39839,0,0,c4552c9b1ee7cea8a178134078e247b54a0ce7f628fb8b4d8589f1118253544d,2024-08-01T16:45:25.400000 @@ -256665,7 +256671,7 @@ CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f CVE-2024-40689,0,0,b737e3a1f88271d05934916a1e9611bb299eb972b578fcd1907e65284f8f8a13,2024-07-29T14:12:08.783000 CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000 CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000 -CVE-2024-40697,0,1,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000 +CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067bb31,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000 @@ -256768,7 +256774,7 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000 -CVE-2024-40886,0,1,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000 +CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000 CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000 CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000 @@ -256942,10 +256948,10 @@ CVE-2024-41050,0,0,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1 CVE-2024-41051,0,0,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000 CVE-2024-41052,0,0,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000 CVE-2024-41053,0,0,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000 -CVE-2024-41054,0,0,54d000610420765de59a42fcd6b0218f3e2dc53e9697b03d4c5cf83c4402e430,2024-07-29T16:21:52.517000 -CVE-2024-41055,0,0,499100fd75a0a01af0a661e5f3f470cfc510510f055a9070bfb5cea9bafe2b0b,2024-07-29T16:21:52.517000 +CVE-2024-41054,0,1,fb57c1b2d87b0db4b758e5bf9759b6f07aa083fd8f9d243c55e175c8a5861a4a,2024-08-22T14:11:42.053000 +CVE-2024-41055,0,1,1a51f4529531a736115b87aea4e8a73346ad127f99905a25f3e6e7343b3d1385,2024-08-22T14:11:00.903000 CVE-2024-41056,0,0,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000 -CVE-2024-41057,0,1,a55a0fad7ba15203e2b4b26c71efab49706c9bb2ce1d966486e4544f6f91ab8a,2024-08-22T13:38:03.577000 +CVE-2024-41057,0,0,a55a0fad7ba15203e2b4b26c71efab49706c9bb2ce1d966486e4544f6f91ab8a,2024-08-22T13:38:03.577000 CVE-2024-41058,0,0,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000 CVE-2024-41059,0,0,a3e848e0f22cf6429fd584bc8b1d0becbc43af3e8de05f6d70f42a052cdb4353,2024-07-29T16:21:52.517000 CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000 @@ -256960,34 +256966,34 @@ CVE-2024-41067,0,0,0efab6bb0225a9dd01a2c48c612b8c9b17f157652f45c02a997409b99216f CVE-2024-41068,0,0,204dddbf2c3055c6474c497e009d780021b3a3ba131c505449bf528ad22a3199,2024-07-29T16:21:52.517000 CVE-2024-41069,0,0,66906a938ffa21542183270372c452da3dca88c60e17c7adf5b30603bb4e6f9d,2024-07-29T16:21:52.517000 CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000 -CVE-2024-41070,0,0,b917467999536edbed0db36d7409a62ce0e397f1bec88e19fba513af1aeb0d41,2024-07-29T16:21:52.517000 +CVE-2024-41070,0,1,01d1361dcf471afa5275cde4037db2ad5e839a7c0db4ba0fc938ed41752f9a1e,2024-08-22T14:05:32.407000 CVE-2024-41071,0,0,177c0b40693c47d1cfe95645d274ca4f188f21ea0538c600baca1cfb2270342f,2024-07-29T16:21:52.517000 CVE-2024-41072,0,0,9708e45d2def4fb738b5d02d9d55acf1fa8c399eb790a4b712e28e9b74f333ba,2024-07-29T16:21:52.517000 -CVE-2024-41073,0,0,9429bfd27084dc522f39499985354d00abe783b73d0a957ee4fd10df6c6ae75e,2024-07-29T16:21:52.517000 +CVE-2024-41073,0,1,cab647062b5f8d3239ead637a6bf28b2a45d5584465cb4fcbc7b276fb13535b4,2024-08-22T14:11:28.697000 CVE-2024-41074,0,0,f542082ddf599a04b16950f50752f817590bbf66500823b9fc1bcea6a4f3fe4f,2024-07-29T16:21:52.517000 CVE-2024-41075,0,0,7e5f7e52455b6252728f795318b0692091849e92df2f13b0fc7d4653c500eb13,2024-07-29T16:21:52.517000 -CVE-2024-41076,0,1,16a9781840e0a19b08b657bc21d37f0f27b0c19f577ebc677bd3e135db214aff,2024-08-22T13:23:39.187000 +CVE-2024-41076,0,0,16a9781840e0a19b08b657bc21d37f0f27b0c19f577ebc677bd3e135db214aff,2024-08-22T13:23:39.187000 CVE-2024-41077,0,0,624c12a81b5da2ca28754283bf1be5845da17d15a71a3309a4b7d9f34f9a714f,2024-07-29T16:21:52.517000 CVE-2024-41078,0,0,ac799525eff030bc0944058938e2136e8bedebdc2ca1a398b3a004427e84d2d5,2024-07-29T16:21:52.517000 CVE-2024-41079,0,0,195d83914ecf533f64d9473e7a01094e98909e6d193fb5c78da4c3efe06a0ebc,2024-07-29T16:21:52.517000 -CVE-2024-41080,0,1,e07cf84bc9ad2e3e8b83775cb16613ee74bca75d2a4275631dc2d3efdbc5f8f3,2024-08-22T13:39:43.347000 +CVE-2024-41080,0,0,e07cf84bc9ad2e3e8b83775cb16613ee74bca75d2a4275631dc2d3efdbc5f8f3,2024-08-22T13:39:43.347000 CVE-2024-41081,0,0,fff01037a051da08a2263944184820fc75504da30cc90ba25587a48f6e5bdd35,2024-07-29T16:21:52.517000 CVE-2024-41082,0,0,8c96018251a7f231d9567ce1460824d8249a158be4d0c82fcdc62e42366a49b9,2024-07-29T16:21:52.517000 CVE-2024-41083,0,0,dff5dc6a7165d8b682758090410b05b21412e86ab2996b0805e7e8a0c1a5ecb8,2024-07-29T16:21:52.517000 -CVE-2024-41084,0,1,975b4f65d1ddddbe933a79acbb8ff50321f78b90f366199bfb15c938f6a9f0df,2024-08-22T13:18:10.240000 -CVE-2024-41085,0,1,7a252ed8d051109fc55cff4bd64a22fd8a720ee57ad5e8f6e64433e61c3fa3c2,2024-08-22T13:16:24.190000 +CVE-2024-41084,0,0,975b4f65d1ddddbe933a79acbb8ff50321f78b90f366199bfb15c938f6a9f0df,2024-08-22T13:18:10.240000 +CVE-2024-41085,0,0,7a252ed8d051109fc55cff4bd64a22fd8a720ee57ad5e8f6e64433e61c3fa3c2,2024-08-22T13:16:24.190000 CVE-2024-41086,0,0,def1e72f4af73afb05473009bf28654fb55be728733d04a1cb558efe55809b1e,2024-07-29T16:21:52.517000 CVE-2024-41087,0,0,58c38c74c158e439afdb46cfb9959ea78813107a1e241ba0d714928a41f4075e,2024-08-08T18:00:03.977000 -CVE-2024-41088,0,1,b43ead55fe1783beb062b9c0bad4f5d8fc111ffa367d1676f510a593678b71af,2024-08-22T13:16:08.143000 +CVE-2024-41088,0,0,b43ead55fe1783beb062b9c0bad4f5d8fc111ffa367d1676f510a593678b71af,2024-08-22T13:16:08.143000 CVE-2024-41089,0,0,38c98937ddcf0489f642c6e9ec7fba9f1ecb4dca47f05ab2326eea2df7749aea,2024-08-08T17:50:48.727000 CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56b40,2024-07-29T14:12:08.783000 CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000 CVE-2024-41092,0,0,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000 CVE-2024-41093,0,0,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000 -CVE-2024-41094,0,1,fd3c100ca3cf33e414c8572772cb645c4163d4d9a6ad8085d9e85c0721dd0693,2024-08-22T13:15:40.843000 +CVE-2024-41094,0,0,fd3c100ca3cf33e414c8572772cb645c4163d4d9a6ad8085d9e85c0721dd0693,2024-08-22T13:15:40.843000 CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000 CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000 -CVE-2024-41097,0,1,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000 +CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000 CVE-2024-41098,0,0,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000 CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000 @@ -257148,7 +257154,7 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000 -CVE-2024-41572,0,1,ab40cf80c59b95a1ebd2f7b9ce0b0eac0ef9840c48fb790d9e4d27dbb6725659,2024-08-22T12:48:02.790000 +CVE-2024-41572,0,0,ab40cf80c59b95a1ebd2f7b9ce0b0eac0ef9840c48fb790d9e4d27dbb6725659,2024-08-22T12:48:02.790000 CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 @@ -257166,7 +257172,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 -CVE-2024-41623,0,1,f3c5b0f57e119ddfc16e10af982bd34e72c36ca954417a804caf07a43ab221b8,2024-08-22T13:50:16.117000 +CVE-2024-41623,0,0,f3c5b0f57e119ddfc16e10af982bd34e72c36ca954417a804caf07a43ab221b8,2024-08-22T13:50:16.117000 CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 @@ -257254,7 +257260,7 @@ CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-41773,0,0,e915a596fb7e1ca4e452145ef4744da8e1b8ffba9e32d109e0437370be6438d6,2024-08-21T12:30:33.697000 -CVE-2024-41774,0,1,42da2543a9388f5e4e9842b30e9bac4ae3d1d3acc4938c24e268b95f522142f0,2024-08-22T13:27:39.753000 +CVE-2024-41774,0,0,42da2543a9388f5e4e9842b30e9bac4ae3d1d3acc4938c24e268b95f522142f0,2024-08-22T13:27:39.753000 CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000 @@ -257408,7 +257414,7 @@ CVE-2024-42052,0,0,af8a8292a6e99512114005b6f9d58ed4fc7c685aefbfc72a703623fe55284 CVE-2024-42053,0,0,a6062e6a4bcd11b760655238c4a48736a58caa8e1af15eed073e37dfa30638ab,2024-08-01T13:59:21.227000 CVE-2024-42054,0,0,7cefcb5df710c5d52c7b44743e7320cbb773b7864f3adff97191d41734299500,2024-07-29T14:12:08.783000 CVE-2024-42055,0,0,38832abf63aaabdc907feb9726d6725f630aba764b55549d89c565bd77d3378b,2024-07-29T14:12:08.783000 -CVE-2024-42056,0,1,7329b0826f2ec4772be6e46132e4b6ca6ebfb74e104c0ef7e371bdd29dff8257,2024-08-22T12:48:02.790000 +CVE-2024-42056,0,0,7329b0826f2ec4772be6e46132e4b6ca6ebfb74e104c0ef7e371bdd29dff8257,2024-08-22T12:48:02.790000 CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000 CVE-2024-42062,0,0,4478fdb9b22ea23c1311199bc27883e40d46ca58109e564d83bc2207123d372b,2024-08-19T14:15:22.663000 CVE-2024-42063,0,0,ab1fc80f4d5a337fc787a5927c5a2799f0f954cb8192994c0bb80d8c74f4b1de,2024-07-29T16:21:52.517000 @@ -257453,7 +257459,7 @@ CVE-2024-42098,0,0,8a4ff599a1d3537153a17ab56baf7b7f5c48f0c9fee61b69ebcae9dd8a773 CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b006a,2024-07-30T13:32:45.943000 CVE-2024-4210,0,0,3de0526bc7ee4d2ee3e85387e784b47b575c14d9043bdb29c130980f21c212c3,2024-08-08T13:04:18.753000 CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000 -CVE-2024-42101,0,1,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000 +CVE-2024-42101,0,0,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000 CVE-2024-42102,0,0,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000 CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000 CVE-2024-42104,0,0,afcbe4f1517f0991a2f8be927dec0a5aee82a58d76a6b63d0d1ad5734deb68fb,2024-07-30T13:32:45.943000 @@ -257630,9 +257636,9 @@ CVE-2024-42310,0,0,7629386c3f41aa6a34e41a6c5d349fabbd9abea6dcdeef93571adcc63039d CVE-2024-42311,0,0,ee026ffaa3435a8fee00e98fff3782a46b4f2eff532aed7bff974de91275ee18,2024-08-19T12:59:59.177000 CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000 CVE-2024-42313,0,0,f319d0057aa3cd90f1188c53e50e737fae9be2ccf322f07044c4d422a41859d3,2024-08-19T12:59:59.177000 -CVE-2024-42314,0,0,8aa67462e0e9b4d4dc4529a08e1d3b792177e1111a519ed972296122b97281bc,2024-08-19T12:59:59.177000 -CVE-2024-42315,0,0,d39e1c5a9741e4f497363cf7739f163883ad331987a363bf39fee0df15c4e5be,2024-08-19T12:59:59.177000 -CVE-2024-42316,0,0,0239a008a917b126c59698068cd78dd2d230edc6a30bd25f3a9ffde53fc4420a,2024-08-19T12:59:59.177000 +CVE-2024-42314,0,1,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000 +CVE-2024-42315,0,1,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000 +CVE-2024-42316,0,1,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000 CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a573,2024-08-19T12:59:59.177000 CVE-2024-42318,0,0,9010727792eb410d1e9ad3b39440509d19383e8fe33f90305bb640c17c956a4b,2024-08-19T12:59:59.177000 CVE-2024-42319,0,0,eb5fc32e810c02d0e4bc3b0d9ebaf0ea35abaefd35cea63e1339820db2a46ad1,2024-08-19T12:59:59.177000 @@ -257688,7 +257694,7 @@ CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4 CVE-2024-42400,0,0,e23fa86955810ac61993a53dac28992470f4d4df1a643f460294725e3f989414,2024-08-07T15:17:46.717000 CVE-2024-42408,0,0,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 -CVE-2024-42411,0,1,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000 +CVE-2024-42411,0,0,360764fbabb5526d62eb9cda2dd54e09c418816d92416be6dbb84277b3e794f4,2024-08-22T12:48:02.790000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 CVE-2024-42434,0,0,9a2fab3c0bfcfe26ad4bc7e023423fbf9916073a1831f3237f47ba85a53a41b9,2024-08-14T17:49:14.177000 @@ -257748,7 +257754,7 @@ CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b98 CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000 CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000 CVE-2024-42550,0,0,fc040a9fdb9874d1ee6063db817db51f08698296778147bc870cf1ae6bde398f,2024-08-21T17:24:59.627000 -CVE-2024-42552,0,0,05029fbe912027602aebaf8833cf288ec3cd361d07011e6c98e55751bb0bdc6e,2024-08-20T15:44:20.567000 +CVE-2024-42552,0,1,b6da6172bfaee31e780122f380efcaf48a37ee35d069ec9b3f7a187aa14d2135,2024-08-22T15:35:09.600000 CVE-2024-42553,0,0,2423da66b36b5ac46e4d328e5cb18cc8071803cc838cae0003cc2096a1c3dcbb,2024-08-20T16:35:22.120000 CVE-2024-42554,0,0,e7093d400617647f295578e1e2a0acba43985e714edb761c848d698d7a6942ea,2024-08-20T15:44:20.567000 CVE-2024-42555,0,0,0a22b9ad39decd5ee3fb21d58c15efa0c29c80c6617d4653453476c140cafc1c,2024-08-20T16:35:23.320000 @@ -257771,7 +257777,7 @@ CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc CVE-2024-42570,0,0,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000 CVE-2024-42571,0,0,1c554bb814a228d2952a27acace697648b5faf72b3d0b65c235a3480b0e47c2a,2024-08-20T15:44:20.567000 CVE-2024-42572,0,0,8a27d950b3f1c9ad5db7a77b1ee249eea67e2798f67a1d2d16a37bd410483cab,2024-08-21T16:35:10.263000 -CVE-2024-42573,0,0,c4d9e0f6d8b833e2509d8c2910fa5ba22120e6bbd03b4460129e761d76e30cf4,2024-08-21T13:44:48.360000 +CVE-2024-42573,0,1,00fbca41f1add93c23ba10874512b85c0d8d54a0b0357866c6b56806fe4c20af,2024-08-22T14:35:09.667000 CVE-2024-42574,0,0,aa616629d677652eb91e6bb032b777df1c13de96e0b62fbe4b20bbe0e1fe4f9a,2024-08-21T13:44:39.147000 CVE-2024-42575,0,0,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e7197a,2024-08-21T13:43:06.420000 CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000 @@ -257859,16 +257865,16 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000 -CVE-2024-42777,0,1,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000 -CVE-2024-42778,0,1,cbd3903a79923424c789bda04b10d0059fc6638bf85821cf7827574c1f012c42,2024-08-22T12:48:02.790000 -CVE-2024-42779,0,1,8b0019d18eb18c48c501c9596910d1e6d7959913f68a801b1d0ddc0d917975ed,2024-08-22T12:48:02.790000 -CVE-2024-42780,0,1,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000 -CVE-2024-42781,0,1,c7d2eec0a2ad53c0f5026c55411fbdd4e13ccda1c9e45e42511fa55d9f942874,2024-08-22T12:48:02.790000 -CVE-2024-42782,0,1,3c8d9e8a7456b4276422f7adc718e8e576e662d3211523fc51973ca4c89a8cfc,2024-08-22T12:48:02.790000 -CVE-2024-42783,0,1,51b01d67e90dd0e5b487abeb0faf3db05121eacfedd764dc830d4e6e024a03dc,2024-08-22T12:48:02.790000 -CVE-2024-42784,0,1,a5dee07139c237f23e96b11e435316682bb55a83d28409a61db28aca6ac3df0a,2024-08-22T12:48:02.790000 -CVE-2024-42785,0,1,af17701ad5396ad504383ea3b7d32d0aef9cefcef2ab17f8d0aa704a208552c8,2024-08-22T12:48:02.790000 -CVE-2024-42786,0,1,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000 +CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000 +CVE-2024-42778,0,0,cbd3903a79923424c789bda04b10d0059fc6638bf85821cf7827574c1f012c42,2024-08-22T12:48:02.790000 +CVE-2024-42779,0,1,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000 +CVE-2024-42780,0,0,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000 +CVE-2024-42781,0,1,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000 +CVE-2024-42782,0,1,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000 +CVE-2024-42783,0,0,51b01d67e90dd0e5b487abeb0faf3db05121eacfedd764dc830d4e6e024a03dc,2024-08-22T12:48:02.790000 +CVE-2024-42784,0,1,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000 +CVE-2024-42785,0,1,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000 +CVE-2024-42786,0,0,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 @@ -257941,7 +257947,7 @@ CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000 CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 -CVE-2024-43033,0,1,99cabe3267561648c475535e19333b9cef7520f92aec3b6c534e35c1c6ff27a7,2024-08-22T12:48:02.790000 +CVE-2024-43033,0,0,99cabe3267561648c475535e19333b9cef7520f92aec3b6c534e35c1c6ff27a7,2024-08-22T12:48:02.790000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000 CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 @@ -258085,7 +258091,7 @@ CVE-2024-43328,0,0,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965 CVE-2024-43329,0,0,26a74de26b02346cc9aef959a49d84425cfcd1e61c70d1d7eb5550839aec98ac,2024-08-19T12:59:59.177000 CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000 CVE-2024-43330,0,0,18c9cc1b418e02c0186c70603a33b75d4945832a6fdc2ddcfc149e88ac786f4b,2024-08-19T12:59:59.177000 -CVE-2024-43331,1,1,4e09e4b4d53e8f961ef11d51941ee4646cb7ff13dcf07be6e13619d097dba721,2024-08-22T12:48:02.790000 +CVE-2024-43331,0,0,4e09e4b4d53e8f961ef11d51941ee4646cb7ff13dcf07be6e13619d097dba721,2024-08-22T12:48:02.790000 CVE-2024-43335,0,0,dde6dc17375e74f502f7f2bfa9005d811d4652c2ebc27ff9b5ef0997127127d2,2024-08-19T12:59:59.177000 CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000 CVE-2024-43342,0,0,ee642e0e72d4e0e4ec6b9a91be938e0b4b5b569cf7ce0c2f528a0acbf756353e,2024-08-19T12:59:59.177000 @@ -258126,6 +258132,7 @@ CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa095 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 CVE-2024-43396,0,0,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000 CVE-2024-43397,0,0,264c2f81cd99428d5aa158f1dc2af7c3c349186ea362901e061722c9a7a0394f,2024-08-20T15:44:20.567000 +CVE-2024-43398,1,1,a88a0edf1fdebfdbb2faeb4a91b7e6ae77f78605c717ab0209af377bd1e321d9,2024-08-22T15:15:16.440000 CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000 CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000 CVE-2024-43400,0,0,a74902014f54105a8fa235ae36e5688fa3ffdb525b8d03b30be1350fafa88962,2024-08-20T16:10:29.987000 @@ -258177,13 +258184,15 @@ CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b3 CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000 CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000 CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 +CVE-2024-43785,1,1,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000 +CVE-2024-43787,1,1,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000 CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000 CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f47472ea,2024-08-19T21:11:28.327000 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000 -CVE-2024-43813,0,1,23490cfe8e9593e896598724b2d4ad1701c8f9a379695f53fe665b270ee6b035,2024-08-22T12:48:02.790000 +CVE-2024-43813,0,0,23490cfe8e9593e896598724b2d4ad1701c8f9a379695f53fe665b270ee6b035,2024-08-22T12:48:02.790000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000 CVE-2024-43817,0,0,7d65ded527da72f977763f6595da9be484a0a5a4216969a1232f7957de06d139,2024-08-19T12:59:59.177000 @@ -258198,17 +258207,17 @@ CVE-2024-43824,0,0,3e6d9611c9c00713f2825d42dd41c9169c00e57ef1735c1ac7eade065567c CVE-2024-43825,0,0,130af7d96288110e02aee1e7600bdbf8c5cd66dfe2f98ab074c672e68f4722cd,2024-08-19T12:59:59.177000 CVE-2024-43826,0,0,a71e01ef1f7bf0e81ff2e96aa2e3536879a0a625a8e0f17873ad3f06283b51ad,2024-08-19T12:59:59.177000 CVE-2024-43827,0,0,cf65368434e7a2b682a9d717038e50932b650d5aee79f4ae380ff9863f20dec9,2024-08-19T12:59:59.177000 -CVE-2024-43828,0,0,7969df769811aea8d83499a81c83fb6921e17e2bc505af8cdf542c1791f85ec1,2024-08-19T12:59:59.177000 +CVE-2024-43828,0,1,34d93531989f41b09094ffb798c3bd14e32cc02dc3ecd2194ff28e1c3f3ed704,2024-08-22T15:41:50.870000 CVE-2024-43829,0,0,cb6e8b0f01b87b3f7e043e1ec20f970771e88fee11f056198306c40048ba4acc,2024-08-19T12:59:59.177000 CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000 CVE-2024-43830,0,0,0c202a646bcfaaaa39d2cb27400c7552b5186a7ed520c033e84fbd5365796f5a,2024-08-19T12:59:59.177000 CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090039,2024-08-19T12:59:59.177000 CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000 -CVE-2024-43833,0,0,3623983768678ca1b7e3f00acbdb47e103a563cf9e4c20db4939639c491abcae,2024-08-19T12:59:59.177000 +CVE-2024-43833,0,1,b30b83d76397439bef43f76504d35264f0368821411284c2b15462cf53f03404,2024-08-22T15:42:46.827000 CVE-2024-43834,0,0,76e2d6369e7d6ad23c4c79e5f16adb028cca8d18769694b501fae11b3f998575,2024-08-19T12:59:59.177000 CVE-2024-43835,0,0,311ffd76c4938846026877fe43e10ffa3dcd91fe42160a62635c5b77934d0f9c,2024-08-19T12:59:59.177000 -CVE-2024-43836,0,0,e40f27d7c22c42b777214dacc18f4f4a4afb5940ec1e235e66db76610b2d41d9,2024-08-19T12:59:59.177000 -CVE-2024-43837,0,0,c031af4d870b7a85a7d24b59c46c59d5e784335aad5a9d79633dbb431212f88e,2024-08-19T12:59:59.177000 +CVE-2024-43836,0,1,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000 +CVE-2024-43837,0,1,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000 CVE-2024-43838,0,0,aea18ddc95b4597b8fcc9d42c5f12cf2294cab2381941209a829361028b9d783,2024-08-19T12:59:59.177000 CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721fa2,2024-08-19T12:59:59.177000 CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000 @@ -258376,12 +258385,12 @@ CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f808 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 -CVE-2024-45163,0,1,dac3c0603de130ab8540a26c8055432d5c062a3f7c051e2931169a7ba082b28c,2024-08-22T12:48:02.790000 -CVE-2024-45165,0,1,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 -CVE-2024-45166,0,1,30a13f635ae394772fb1cb05c43443734516ac2853e37f29f36358e77178fc4e,2024-08-22T12:48:02.790000 -CVE-2024-45167,0,1,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000 -CVE-2024-45168,0,1,3aa538d4b13e0bd4bef927902f0e011916a51acfbdb35fa9329938fabd916397,2024-08-22T12:48:02.790000 -CVE-2024-45169,0,1,d5b7a4092be80e1fc6bb56ce6edeb69aeff6e2af0ca8e47f8778f7eb7b1f0312,2024-08-22T12:48:02.790000 +CVE-2024-45163,0,1,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 +CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 +CVE-2024-45166,0,1,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000 +CVE-2024-45167,0,0,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000 +CVE-2024-45168,0,1,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000 +CVE-2024-45169,0,1,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000 CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000 @@ -258764,7 +258773,7 @@ CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6f CVE-2024-4941,0,0,13ca0e2a0167ec0b910e07ee313a5634910f0ad60753924b6a13637e3feff21f,2024-06-07T14:56:05.647000 CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000 CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000 -CVE-2024-4944,0,0,ac9c6def8fc9c7dc631cf9d0723f6329f24a35e87e842473e4e56b6a226bcf00,2024-07-09T18:19:14.047000 +CVE-2024-4944,0,1,4c179510d1e03e5badefb2baa5976b22075fd8af2558d89d09a0401516cd83b3,2024-08-22T15:06:05.480000 CVE-2024-4945,0,0,30a0ab1a0c03dbd140fcf7c71669ea9d01e0f4e5f56736f7caa84678a6833359,2024-06-04T19:20:54.767000 CVE-2024-4946,0,0,c62331c31cdff2ac998e7e200ab6653707e57767349d786cb3712d85549cf2ad,2024-06-04T19:20:54.867000 CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c64636,2024-08-14T17:07:05.277000 @@ -259308,7 +259317,7 @@ CVE-2024-5575,0,0,1d8c4bc7bfefa9359f03236311a531b02997d0972adc424dea9dbc344e7a3d CVE-2024-5576,0,0,fb4e227ac1bca19b4b9b0346951bcae4e9457605b7b3160f8ccda6cb8cea0d35,2024-08-20T15:44:20.567000 CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000 CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000 -CVE-2024-5583,0,1,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000 +CVE-2024-5583,0,0,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000 CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000 @@ -259525,7 +259534,7 @@ CVE-2024-5844,0,0,cb741198deb8b5f70d2d0ce9c33e3416f6a940b998b67b99e17d7bffff2c68 CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f75,2024-07-03T02:09:29.493000 CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000 CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000 -CVE-2024-5849,0,1,fbe9d86260db9e8cb798cbf32808a8f11473199e781c5d214bea36c9875add83,2024-08-22T13:39:08.797000 +CVE-2024-5849,0,0,fbe9d86260db9e8cb798cbf32808a8f11473199e781c5d214bea36c9875add83,2024-08-22T13:39:08.797000 CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000 CVE-2024-5852,0,0,17ae123c3ebaa5002b861453d278a4e3499e2a8a6baca11a20783ec79d4cdcf1,2024-08-07T22:19:34.977000 CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000 @@ -259614,7 +259623,7 @@ CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360b CVE-2024-5971,0,0,01d70de536a697a1c65e871f029e293b5051eed9b63fc3f224826d44a6d72378,2024-08-12T13:38:38.567000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000 -CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 +CVE-2024-5974,0,1,6465747ebb7259fe338ca54f64293ac9e5e639bde8c31a40e65e3d25cce88c2a,2024-08-22T14:26:55.657000 CVE-2024-5975,0,0,fa255d4ef912d8f8da76e1022132a17caf8538a1c8cca7df81e3eaadac5c5086,2024-08-01T14:00:06.617000 CVE-2024-5976,0,0,77b9cc86c9238f37d2799be9bfcfd76dc8bf6ab8aad4ffdc48881bdede83c5f6,2024-08-16T17:53:25.450000 CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da75815823,2024-07-19T18:27:34.967000 @@ -259946,7 +259955,7 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 -CVE-2024-6386,0,1,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000 +CVE-2024-6386,0,0,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000 CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000 @@ -259961,7 +259970,7 @@ CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a5 CVE-2024-6405,0,0,2f2aaf52bab49b757e1ad90b974deb9c303ecc0ebed2850b0a99dd7bdb5e4a9a,2024-08-20T14:00:07.663000 CVE-2024-6407,0,0,12314028e09ddfd135bb748e0530e9ce4aee25dcaa6c2bae62524650d54b655f,2024-07-12T16:36:34.747000 CVE-2024-6408,0,0,560f6344922c296035b0717025e77a13b366c296a6767546b7234de1c853f80b,2024-08-01T14:00:21.483000 -CVE-2024-6409,0,1,d03bed2522a44d8d30b0fbdef22fdffc2ceac2387d4eef8f2a106ccc58f0cb97,2024-08-22T13:15:05.147000 +CVE-2024-6409,0,0,d03bed2522a44d8d30b0fbdef22fdffc2ceac2387d4eef8f2a106ccc58f0cb97,2024-08-22T13:15:05.147000 CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 CVE-2024-6412,0,0,ac3e0b4dd9dc421ed7bc50bb0eaac729f5a46e72227bdeb5f2fc2db7ccb48399,2024-08-01T18:35:24.697000 @@ -260067,8 +260076,8 @@ CVE-2024-6558,0,0,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a7 CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000 CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000 CVE-2024-6562,0,0,c488d352cd932104260f046b393896c928145bbead702bb6d934eaf0d4ce07f3,2024-08-12T13:41:36.517000 -CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 -CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 +CVE-2024-6563,0,1,4bb6d856aecb1061fe7ddf667198467d6782b1525c7ac168b9de1fadd66e576f,2024-08-22T15:51:55.843000 +CVE-2024-6564,0,1,f3f35528bc1f72a04108e7734af6c8785498b4db6bab388deb8ec67a1e375b50,2024-08-22T15:52:05.033000 CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000 CVE-2024-6566,0,0,d6506e8698f9fc48107baf6879b3d68aa0d41c6ff56f3284c695ecacd8e825b0,2024-07-29T14:12:08.783000 CVE-2024-6567,0,0,9de7307cc0759fd9897fd3f0912c6bf0e2680673968bc0cc458d792904193dbe,2024-08-02T12:59:43.990000 @@ -260223,7 +260232,7 @@ CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc8 CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000 CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000 CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000 -CVE-2024-6800,0,0,905f179e2d4ab3f1a642369f80acd1cb09cf2cc4719cb8c0b853076a876bd4d3,2024-08-21T12:30:33.697000 +CVE-2024-6800,0,1,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 CVE-2024-6802,0,0,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000 CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 @@ -260248,7 +260257,7 @@ CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d CVE-2024-6864,0,0,25a84b435d49ce11c1c73a942909d4d326ce5027935626546ef4f0b2e3fcaea1,2024-08-20T15:44:20.567000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 -CVE-2024-6870,0,1,f30a59ad4d3e5d7ab3aab5c1edbf3352165250c19b74a834d706a4e44e5c4817,2024-08-22T12:48:02.790000 +CVE-2024-6870,0,0,f30a59ad4d3e5d7ab3aab5c1edbf3352165250c19b74a834d706a4e44e5c4817,2024-08-22T12:48:02.790000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 @@ -260584,7 +260593,7 @@ CVE-2024-7377,0,0,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f CVE-2024-7378,0,0,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000 CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000 CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000 -CVE-2024-7384,0,1,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000 +CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000 @@ -260779,8 +260788,8 @@ CVE-2024-7702,0,0,e27f5381e9bb8a84bfa26aea9f03ffdd10a0850905e3e50b7398b3507d10ce CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000 CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000 CVE-2024-7705,0,0,ba2446d549e3c4265501aacae0f49b053f84e0be1e1ff6443743a7ef69ec83bb,2024-08-13T12:58:25.437000 -CVE-2024-7706,0,1,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000 -CVE-2024-7707,0,1,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000 +CVE-2024-7706,0,0,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000 +CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000 CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 @@ -260790,7 +260799,7 @@ CVE-2024-7724,0,0,2140d53b1531a123a76a6a3dc8b0dd231e5c8087b65471a97b5981e4adc896 CVE-2024-7725,0,0,d259c6d5729bf44a1338f2a16127fec02c9b65e8cb1e5bc73a0892db20205863,2024-08-21T17:24:59.627000 CVE-2024-7728,0,0,c0ed30007f00488b5c62db3cfd8f859193059df346d1ebce1c04c936068d2a21,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,b303d5d4be15b474d481a2bd874b63765444e7a77fd0332a4aa454ee055ae189,2024-08-14T13:00:37.107000 -CVE-2024-7731,0,0,4a861aabf412f4b5069dda19ca66661f2d33b6edc7ffa683ebdfa08ec3de8567,2024-08-14T13:00:37.107000 +CVE-2024-7731,0,1,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d22,2024-08-14T13:00:37.107000 CVE-2024-7733,0,0,bb60f9c1721a7d7267312f0897dbc581707f825a01d4c52185c190045c2c2268,2024-08-14T02:07:05.410000 CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000 @@ -260799,7 +260808,7 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0 CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000 CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000 CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000 -CVE-2024-7746,0,0,57c293bd84bcc81db971f993e54710083e23fbaa2d9a714afae737b9c1e2cedc,2024-08-13T17:11:53.553000 +CVE-2024-7746,0,1,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000 CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000 CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000 CVE-2024-7750,0,0,ae9806ea563d7ef9ab418b33b0dd9169de6692e64ddca227f95ec3ceb4e78bc1,2024-08-19T17:48:40.913000 @@ -260810,7 +260819,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000 CVE-2024-7775,0,0,e3301a5d8f77ad443eb31f53865c4d76f2f8fe202d331dbc3155c9382724cc8e,2024-08-20T15:44:20.567000 CVE-2024-7777,0,0,71bd18c058a843cc648eaac1d1574a0ec472525bb01fac803805d8a41dba271b,2024-08-20T15:44:20.567000 -CVE-2024-7778,0,1,d7760055142d57d64e6b8ded706286da456067aa22ab7711d3accd82c1875020,2024-08-22T12:48:02.790000 +CVE-2024-7778,0,0,d7760055142d57d64e6b8ded706286da456067aa22ab7711d3accd82c1875020,2024-08-22T12:48:02.790000 CVE-2024-7780,0,0,d93ffb279aea8f39f6fd963d66033ac1d11eb19c0e769bfec592ca965c19db92,2024-08-20T15:44:20.567000 CVE-2024-7782,0,0,8f8c7ec0917c77b4eac4d0691ad6fd872581e8976dc54163f3db95fe52f021ae,2024-08-20T15:44:20.567000 CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000 @@ -260837,7 +260846,7 @@ CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f CVE-2024-7831,0,0,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000 CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000 CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 -CVE-2024-7836,0,1,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000 +CVE-2024-7836,0,0,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000 @@ -260845,7 +260854,7 @@ CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f954176 CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000 CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000 CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b0256f,2024-08-19T13:00:23.117000 -CVE-2024-7848,0,1,31570509da53a47c219b7f7137684c2eb7fe32ac785f0a0f3abce302cddf7c35,2024-08-22T12:48:02.790000 +CVE-2024-7848,0,0,31570509da53a47c219b7f7137684c2eb7fe32ac785f0a0f3abce302cddf7c35,2024-08-22T12:48:02.790000 CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000 CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000 CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000 @@ -260905,31 +260914,31 @@ CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193 CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000 CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000 CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 -CVE-2024-7964,0,1,8822f6b0f0610850bdf35210ea8c688feaf1f86028ec6dbf869e1fa875ccb60c,2024-08-22T12:48:02.790000 -CVE-2024-7965,0,1,d0c0273875073cc0c6fec509196298f43b177986c40336f2637705c644f6cc8b,2024-08-22T12:48:02.790000 -CVE-2024-7966,0,1,bfc4dcef3c5ead5653786d3a4b93da692b661a8241304cdd64aab76d453ac1d2,2024-08-22T12:48:02.790000 -CVE-2024-7967,0,1,294e06380d5fc96610b127cbe1ba42c5ee199172a86cd4f0671ce2810e954aed,2024-08-22T12:48:02.790000 -CVE-2024-7968,0,1,0ebd8028130b08086583f2e4531b9cd31f970806eb24b143727e1e6e521961f5,2024-08-22T12:48:02.790000 -CVE-2024-7969,0,1,aa07c52d9525fdaa1180f7ff2dbd0076c66d561ef11dc8515b79089ee13f0362,2024-08-22T12:48:02.790000 -CVE-2024-7971,0,1,2e343147e9fc9924d1239f1cbe04e91a7db99e6690424e63396ec3de7989a805,2024-08-22T12:48:02.790000 -CVE-2024-7972,0,1,a809bd7827790b4f8cf43f3d303cd62d3bff7ba72355c06f4379608a1fbd4349,2024-08-22T12:48:02.790000 -CVE-2024-7973,0,1,20a121889ac72f8203068027a4420d046332082287e407ad6ccee31f161109ed,2024-08-22T12:48:02.790000 -CVE-2024-7974,0,1,c6bac75b54c27669e52a449b9a88647f34bd6ebea8da4faee12acd929ef504f5,2024-08-22T12:48:02.790000 -CVE-2024-7975,0,1,52128ff84c744d1b190f65e7e327a1f36e2267fddcf188901cfc28d850ae5349,2024-08-22T12:48:02.790000 -CVE-2024-7976,0,1,f4323ba6e769363619b25624a388acbb9ef8dd02a9844111618d9bccec1ec677,2024-08-22T12:48:02.790000 -CVE-2024-7977,0,1,cb03e76d70d875478cbce54a8fac8cf14535f3d8b92869a3662e5af0a00fa301,2024-08-22T12:48:02.790000 -CVE-2024-7978,0,1,fac0e6ae590e44513f6f54583d29dc6e4263f99b9f6fb091ee007b07e379e63d,2024-08-22T12:48:02.790000 -CVE-2024-7979,0,1,62a68586269e5fa21b76d417f797452d67a75b3315df3d49524589c8cef7c40f,2024-08-22T12:48:02.790000 -CVE-2024-7980,0,1,ccee37d7e5dba26ef25946dd35c049fa24b47615e5dd4aa71009ab6bb548075c,2024-08-22T12:48:02.790000 -CVE-2024-7981,0,1,09a1fc9846d85ff0684e8acda10679cdc6d747c523e3f84989fb6a6f8203bb91,2024-08-22T12:48:02.790000 +CVE-2024-7964,0,0,8822f6b0f0610850bdf35210ea8c688feaf1f86028ec6dbf869e1fa875ccb60c,2024-08-22T12:48:02.790000 +CVE-2024-7965,0,1,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000 +CVE-2024-7966,0,0,bfc4dcef3c5ead5653786d3a4b93da692b661a8241304cdd64aab76d453ac1d2,2024-08-22T12:48:02.790000 +CVE-2024-7967,0,1,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000 +CVE-2024-7968,0,0,0ebd8028130b08086583f2e4531b9cd31f970806eb24b143727e1e6e521961f5,2024-08-22T12:48:02.790000 +CVE-2024-7969,0,0,aa07c52d9525fdaa1180f7ff2dbd0076c66d561ef11dc8515b79089ee13f0362,2024-08-22T12:48:02.790000 +CVE-2024-7971,0,1,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000 +CVE-2024-7972,0,1,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000 +CVE-2024-7973,0,1,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000 +CVE-2024-7974,0,0,c6bac75b54c27669e52a449b9a88647f34bd6ebea8da4faee12acd929ef504f5,2024-08-22T12:48:02.790000 +CVE-2024-7975,0,0,52128ff84c744d1b190f65e7e327a1f36e2267fddcf188901cfc28d850ae5349,2024-08-22T12:48:02.790000 +CVE-2024-7976,0,0,f4323ba6e769363619b25624a388acbb9ef8dd02a9844111618d9bccec1ec677,2024-08-22T12:48:02.790000 +CVE-2024-7977,0,0,cb03e76d70d875478cbce54a8fac8cf14535f3d8b92869a3662e5af0a00fa301,2024-08-22T12:48:02.790000 +CVE-2024-7978,0,0,fac0e6ae590e44513f6f54583d29dc6e4263f99b9f6fb091ee007b07e379e63d,2024-08-22T12:48:02.790000 +CVE-2024-7979,0,1,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000 +CVE-2024-7980,0,1,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000 +CVE-2024-7981,0,0,09a1fc9846d85ff0684e8acda10679cdc6d747c523e3f84989fb6a6f8203bb91,2024-08-22T12:48:02.790000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000 CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 -CVE-2024-8033,0,1,3f316f7e9198aca7c5aa2e36e772dc32f2f22bce30d787bfae16b53392d884ef,2024-08-22T12:48:02.790000 -CVE-2024-8034,0,1,eaa926608d388e32154f035cf3b7a3d924c2e30d7f24b96fbcf3a9d5002cba03,2024-08-22T12:48:02.790000 -CVE-2024-8035,0,1,3aa95c98d3128ccdb489242c18c77df884328f4a8925b81f2020dee2c13aaf80,2024-08-22T12:48:02.790000 -CVE-2024-8071,0,1,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000 -CVE-2024-8072,0,1,dea70fe205a37f055aa5b98ea5450d522ccba6e4b509676caab88178aa124d29,2024-08-22T12:48:02.790000 +CVE-2024-8033,0,0,3f316f7e9198aca7c5aa2e36e772dc32f2f22bce30d787bfae16b53392d884ef,2024-08-22T12:48:02.790000 +CVE-2024-8034,0,0,eaa926608d388e32154f035cf3b7a3d924c2e30d7f24b96fbcf3a9d5002cba03,2024-08-22T12:48:02.790000 +CVE-2024-8035,0,0,3aa95c98d3128ccdb489242c18c77df884328f4a8925b81f2020dee2c13aaf80,2024-08-22T12:48:02.790000 +CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000 +CVE-2024-8072,0,1,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000